The Basics of Cryptography

31
CRYPTOGRAPHY THE BASICS by JAMES HALL

description

A talk I did on Cryptography at Hey!Stac http://hey.wearestac.com/

Transcript of The Basics of Cryptography

Page 1: The Basics of Cryptography

CRYPTOGRAPHYTHE BASICS

by JAMES HALL

Page 2: The Basics of Cryptography

DIRECTOR/FOUNDER AT

Page 3: The Basics of Cryptography

jsPDF JAVASCRIPT PDF GENERATION LIBRARY

Page 4: The Basics of Cryptography

WHAT ISCRYPTOGRAPHY?

Page 5: The Basics of Cryptography

DEMO

Page 6: The Basics of Cryptography

A CIPHERIS A DIGITAL

LOCK

Page 7: The Basics of Cryptography

CAESAR CIPHERUSED IN WARSAROUND 50BC

Page 8: The Basics of Cryptography

ABCDEFGHIJKLM

XYZABCDEFGHIJ

Page 9: The Basics of Cryptography

ABCDEFGHIJKLM

XYZABCDEFGHIJ

Page 10: The Basics of Cryptography

Shift Cipher

I LOVE FREE BROWNIES

I LOVE FREE BROWNIES

Input

Output

0Shift Value (Key)

Page 11: The Basics of Cryptography

Shift Cipher

I LOVE FREE BROWNIES

J MPWF GSFF CSPXOJFT

Input

Output

1Shift Value (Key)

Page 12: The Basics of Cryptography

Shift Cipher

I LOVE FREE BROWNIES

K NQXG HTGG DTQYPKGU

Input

Output

Shift Value (Key)

2

Page 13: The Basics of Cryptography

One-Time Pad

ILOVEFREEBROWNIES

KLREJNUNGBSXZVNNU

Input

Output

Key

20395839201938592

Page 14: The Basics of Cryptography

STREAM CIPHER

ILOVEFREEBROWNIESInput

Output

78943Key (Shared secret)

Key stream (PRNG)

06947294068240593

IQXZLHAIEHZQANNNV

Page 15: The Basics of Cryptography

HOW TO GET ASHAREDSECRET

(WITH THIS ONE WEIRD TRICK)

Page 16: The Basics of Cryptography

TOM HARRY

EVE

Page 17: The Basics of Cryptography

TOM HARRY

EVE

Page 18: The Basics of Cryptography

TOM HARRY

EVE

Page 19: The Basics of Cryptography

TOM HARRY

EVE

Page 20: The Basics of Cryptography

TOM HARRY

EVE

Page 21: The Basics of Cryptography

TOM HARRY

EVE

Page 22: The Basics of Cryptography

TOM HARRY

EVE

Page 23: The Basics of Cryptography
Page 24: The Basics of Cryptography

A LOCK ICONDOESN’T MEANYOU’RE SECURE

Page 25: The Basics of Cryptography

FORGED GOOGLE.COM CERTS

USED TO SPYon 300,000 Iranian users

Page 26: The Basics of Cryptography

SSLIS BROKEN

Page 27: The Basics of Cryptography
Page 28: The Basics of Cryptography
Page 29: The Basics of Cryptography
Page 30: The Basics of Cryptography

Stanford JavaScriptCrypto Library

Page 31: The Basics of Cryptography

ANY QUESTIONS?