E-Security · E-Security 1. Cryptography Fundamentals. 2. Symmetric Key Encryption. 3. Hashing and...

16
E-Security 1. Cryptography Fundamentals. 2. Symmetric Key Encryption. 3. Hashing and MAC. 4. Asymmetric (Public) Key Encryption. 5. Key Exchange. 6. Trust and Digital Certificates. 7. Tunnelling. 8. Cryptocurrencies and Blockchain. 9. Future Cryptography. 10. Host Security. Prof Bill Buchanan OBE https://asecuritysite.com/encryption https://asecuritysite.com/esecurity

Transcript of E-Security · E-Security 1. Cryptography Fundamentals. 2. Symmetric Key Encryption. 3. Hashing and...

Page 1: E-Security · E-Security 1. Cryptography Fundamentals. 2. Symmetric Key Encryption. 3. Hashing and MAC. 4. Asymmetric (Public) Key Encryption. 5. Key Exchange.

E-Security1.CryptographyFundamentals. 2.SymmetricKeyEncryption. 3.HashingandMAC.4.Asymmetric(Public)KeyEncryption.5.KeyExchange.6.TrustandDigitalCertificates.7.Tunnelling.8.CryptocurrenciesandBlockchain.9.FutureCryptography.10.HostSecurity. ProfBillBuchananOBE https://asecuritysite.com/encryption https://asecuritysite.com/esecurity

Page 2: E-Security · E-Security 1. Cryptography Fundamentals. 2. Symmetric Key Encryption. 3. Hashing and MAC. 4. Asymmetric (Public) Key Encryption. 5. Key Exchange.

Disclaimer

• Encryptionworksgreat,untilitdoesn't.• Encryptionworksgreat,aslongasnoonemakesamistake.

• Encryptionworksgreat,unlesssomethinggoeswrong.

• Encryptionworksgreat,aslongaseverythingworksright.

Page 3: E-Security · E-Security 1. Cryptography Fundamentals. 2. Symmetric Key Encryption. 3. Hashing and MAC. 4. Asymmetric (Public) Key Encryption. 5. Key Exchange.

Module Delivery Website

esecurityworkspace.slack.com

@billatnapier

github.com/billbuchanan/esecurity

Overleaf

asecuritysite.com

youtube.com

Page 4: E-Security · E-Security 1. Cryptography Fundamentals. 2. Symmetric Key Encryption. 3. Hashing and MAC. 4. Asymmetric (Public) Key Encryption. 5. Key Exchange.

Module Delivery Website

github.com/billbuchanan/esecurity

Overleafyoutube.com

Lectures/LabDemos Courseworksubmission

Labs

Page 5: E-Security · E-Security 1. Cryptography Fundamentals. 2. Symmetric Key Encryption. 3. Hashing and MAC. 4. Asymmetric (Public) Key Encryption. 5. Key Exchange.

Draft TimetableWebsite

Page 6: E-Security · E-Security 1. Cryptography Fundamentals. 2. Symmetric Key Encryption. 3. Hashing and MAC. 4. Asymmetric (Public) Key Encryption. 5. Key Exchange.

Overview

Page 7: E-Security · E-Security 1. Cryptography Fundamentals. 2. Symmetric Key Encryption. 3. Hashing and MAC. 4. Asymmetric (Public) Key Encryption. 5. Key Exchange.

1.FundamentalsTraditionalCiphers. Key-basedEncryption.EncodingMethods. FrequencyAnalysis. GCD. RandomNumbers. PrimeNumbers.BigIntegers. EncryptionOperators(MOD,XORandShift). ProfBillBuchananOBE https://asecuritysite.com/encryption

Page 8: E-Security · E-Security 1. Cryptography Fundamentals. 2. Symmetric Key Encryption. 3. Hashing and MAC. 4. Asymmetric (Public) Key Encryption. 5. Key Exchange.

2.SymmetricKeyBasics BlockorStream? SecretKeyMethodsSaltingAES 3DESChaCha20/Poly1305 KeyEntropyProfBillBuchananOBE https://asecuritysite.com/encryption

Page 9: E-Security · E-Security 1. Cryptography Fundamentals. 2. Symmetric Key Encryption. 3. Hashing and MAC. 4. Asymmetric (Public) Key Encryption. 5. Key Exchange.

3.HashingandMAC HashingMethods. Cracking. TypicalMethods:MD5,SHA-1,SHA-3,LM,Bcrypt,PBKDF2HashedPasswords. TimedOneTimePasswords. MessageAuthenticationCodes(MACs). ProfBillBuchananOBE https://asecuritysite.com/encryption

Page 10: E-Security · E-Security 1. Cryptography Fundamentals. 2. Symmetric Key Encryption. 3. Hashing and MAC. 4. Asymmetric (Public) Key Encryption. 5. Key Exchange.

4.AsymmetricKeyPrinciples.RSA. EllipticCurve. UsingPrivateKeytoAuthenticate. PGP:SignedEmail. ProfBillBuchananOBE https://asecuritysite.com/encryption

Page 11: E-Security · E-Security 1. Cryptography Fundamentals. 2. Symmetric Key Encryption. 3. Hashing and MAC. 4. Asymmetric (Public) Key Encryption. 5. Key Exchange.

5.KeyExchangePrinciples.Diffie-Hellman(DH). Passingthesecretkeywithkeyexchange.EllipticCurveDiffie-Hellman(ECDH)ProfBillBuchananOBE https://asecuritysite.com/encryption

Page 12: E-Security · E-Security 1. Cryptography Fundamentals. 2. Symmetric Key Encryption. 3. Hashing and MAC. 4. Asymmetric (Public) Key Encryption. 5. Key Exchange.

6.TrustandDigitalCertificates Principles.TrustInfrastructures. PKIInfrastructure. CreatingSignedCertificates.Signatures(ECDSA,Hashed-based). ProfBillBuchananOBE https://asecuritysite.com/encryption

Page 13: E-Security · E-Security 1. Cryptography Fundamentals. 2. Symmetric Key Encryption. 3. Hashing and MAC. 4. Asymmetric (Public) Key Encryption. 5. Key Exchange.

7.TunnellingSSL/TLS.Keygeneration/keyexchange.SSH.IPSec.ProfBillBuchananOBE https://asecuritysite.com/encryption

Page 14: E-Security · E-Security 1. Cryptography Fundamentals. 2. Symmetric Key Encryption. 3. Hashing and MAC. 4. Asymmetric (Public) Key Encryption. 5. Key Exchange.

8.Blockchain&Cryptocurrencies Principles.Bitcoin.Ethereum. SmartContracts. ProfBillBuchananOBE https://asecuritysite.com/encryption

Page 15: E-Security · E-Security 1. Cryptography Fundamentals. 2. Symmetric Key Encryption. 3. Hashing and MAC. 4. Asymmetric (Public) Key Encryption. 5. Key Exchange.

9.FutureCryptoZeroknowledgeproof.Homomorphicencryption.Light-weightcrypto.Quantum-robustcryptography. ProfBillBuchananOBE https://asecuritysite.com/encryption

Page 16: E-Security · E-Security 1. Cryptography Fundamentals. 2. Symmetric Key Encryption. 3. Hashing and MAC. 4. Asymmetric (Public) Key Encryption. 5. Key Exchange.

E-Security1.CryptographyFundamentals. 2.SymmetricKeyEncryption. 3.HashingandMAC.4.Asymmetric(Public)KeyEncryption.5.KeyExchange.6.TrustandDigitalCertificates.7.Tunnelling.8.CryptocurrenciesandBlockchain.9.FutureCryptography.10.HostSecurity. ProfBillBuchananOBE https://asecuritysite.com/encryption https://asecuritysite.com/esecurity