Modern Crypto

Check out our free course!

Cryptography has come a long long way since the time of Caesar. Now, just about everything we do relies on math. Math, it turns out, is very hard to beat if it is done properly. Math can tell you that it is provably impossible for an attacker to decrypt something earlier than the heat death of the sun. That is pretty awesome. If you find yourself trying to beat math, you're probably attacking the wrong part of the problem. Learn about encryption below.

  1. You've already read this, but use it to answer the HW. https://web.archive.org/web/20170704130139/https://www.usna.edu/CyberDept/sy110/lec/cryptSymmEnc/lec.html
  2. What is symmetric encryption?
  3. Do the HW: https://web.archive.org/web/20170704130139/https://www.usna.edu/CyberDept/sy110//lec/cryptSymmEnc/hw/hw.pdf
  4. Read this: https://web.archive.org/web/20170704130139/https://www.usna.edu/CyberDept/sy110/lec/cryptAsymmEnc/lec.html
  5. What is asymmetric encryption?
  6. Do the HW: https://web.archive.org/web/20170704130139/https://www.usna.edu/CyberDept/sy110/lec/cryptAsymmEnc/hw/hw.pdf

Read this: https://ssd.eff.org/en/module/what-encryption

Now here is a slightly more technical primer on how real world cryptography works.

Read this: https://ssd.eff.org/en/module/introduction-public-key-cryptography-and-pgp

Alright, now that you have an idea of what encryption is, read this https://danielmiessler.com/study/encoding-encryption-hashing-obfuscation/ and explain the differences between the ideas explained.

Visit the course page!

Hoppers Roppers 2020            Date: 2020-06-10 23:03:16

results matching ""

    No results matching ""