E-Security · E-Security 1. Cryptography Fundamentals. 2. Symmetric Key Encryption. 3. Hashing and...

Post on 13-Jun-2020

19 views 0 download

Transcript of E-Security · E-Security 1. Cryptography Fundamentals. 2. Symmetric Key Encryption. 3. Hashing and...

E-Security1.CryptographyFundamentals. 2.SymmetricKeyEncryption. 3.HashingandMAC.4.Asymmetric(Public)KeyEncryption.5.KeyExchange.6.TrustandDigitalCertificates.7.Tunnelling.8.CryptocurrenciesandBlockchain.9.FutureCryptography.10.HostSecurity. ProfBillBuchananOBE https://asecuritysite.com/encryption https://asecuritysite.com/esecurity

Disclaimer

• Encryptionworksgreat,untilitdoesn't.• Encryptionworksgreat,aslongasnoonemakesamistake.

• Encryptionworksgreat,unlesssomethinggoeswrong.

• Encryptionworksgreat,aslongaseverythingworksright.

Module Delivery Website

esecurityworkspace.slack.com

@billatnapier

github.com/billbuchanan/esecurity

Overleaf

asecuritysite.com

youtube.com

Module Delivery Website

github.com/billbuchanan/esecurity

Overleafyoutube.com

Lectures/LabDemos Courseworksubmission

Labs

Draft TimetableWebsite

Overview

1.FundamentalsTraditionalCiphers. Key-basedEncryption.EncodingMethods. FrequencyAnalysis. GCD. RandomNumbers. PrimeNumbers.BigIntegers. EncryptionOperators(MOD,XORandShift). ProfBillBuchananOBE https://asecuritysite.com/encryption

2.SymmetricKeyBasics BlockorStream? SecretKeyMethodsSaltingAES 3DESChaCha20/Poly1305 KeyEntropyProfBillBuchananOBE https://asecuritysite.com/encryption

3.HashingandMAC HashingMethods. Cracking. TypicalMethods:MD5,SHA-1,SHA-3,LM,Bcrypt,PBKDF2HashedPasswords. TimedOneTimePasswords. MessageAuthenticationCodes(MACs). ProfBillBuchananOBE https://asecuritysite.com/encryption

4.AsymmetricKeyPrinciples.RSA. EllipticCurve. UsingPrivateKeytoAuthenticate. PGP:SignedEmail. ProfBillBuchananOBE https://asecuritysite.com/encryption

5.KeyExchangePrinciples.Diffie-Hellman(DH). Passingthesecretkeywithkeyexchange.EllipticCurveDiffie-Hellman(ECDH)ProfBillBuchananOBE https://asecuritysite.com/encryption

6.TrustandDigitalCertificates Principles.TrustInfrastructures. PKIInfrastructure. CreatingSignedCertificates.Signatures(ECDSA,Hashed-based). ProfBillBuchananOBE https://asecuritysite.com/encryption

7.TunnellingSSL/TLS.Keygeneration/keyexchange.SSH.IPSec.ProfBillBuchananOBE https://asecuritysite.com/encryption

8.Blockchain&Cryptocurrencies Principles.Bitcoin.Ethereum. SmartContracts. ProfBillBuchananOBE https://asecuritysite.com/encryption

9.FutureCryptoZeroknowledgeproof.Homomorphicencryption.Light-weightcrypto.Quantum-robustcryptography. ProfBillBuchananOBE https://asecuritysite.com/encryption

E-Security1.CryptographyFundamentals. 2.SymmetricKeyEncryption. 3.HashingandMAC.4.Asymmetric(Public)KeyEncryption.5.KeyExchange.6.TrustandDigitalCertificates.7.Tunnelling.8.CryptocurrenciesandBlockchain.9.FutureCryptography.10.HostSecurity. ProfBillBuchananOBE https://asecuritysite.com/encryption https://asecuritysite.com/esecurity