Download - E-Security · E-Security 1. Cryptography Fundamentals. 2. Symmetric Key Encryption. 3. Hashing and MAC. 4. Asymmetric (Public) Key Encryption. 5. Key Exchange.

Transcript
Page 1: E-Security · E-Security 1. Cryptography Fundamentals. 2. Symmetric Key Encryption. 3. Hashing and MAC. 4. Asymmetric (Public) Key Encryption. 5. Key Exchange.

E-Security1.CryptographyFundamentals. 2.SymmetricKeyEncryption. 3.HashingandMAC.4.Asymmetric(Public)KeyEncryption.5.KeyExchange.6.TrustandDigitalCertificates.7.Tunnelling.8.CryptocurrenciesandBlockchain.9.FutureCryptography.10.HostSecurity. ProfBillBuchananOBE https://asecuritysite.com/encryption https://asecuritysite.com/esecurity

Page 2: E-Security · E-Security 1. Cryptography Fundamentals. 2. Symmetric Key Encryption. 3. Hashing and MAC. 4. Asymmetric (Public) Key Encryption. 5. Key Exchange.

Disclaimer

• Encryptionworksgreat,untilitdoesn't.• Encryptionworksgreat,aslongasnoonemakesamistake.

• Encryptionworksgreat,unlesssomethinggoeswrong.

• Encryptionworksgreat,aslongaseverythingworksright.

Page 3: E-Security · E-Security 1. Cryptography Fundamentals. 2. Symmetric Key Encryption. 3. Hashing and MAC. 4. Asymmetric (Public) Key Encryption. 5. Key Exchange.

Module Delivery Website

esecurityworkspace.slack.com

@billatnapier

github.com/billbuchanan/esecurity

Overleaf

asecuritysite.com

youtube.com

Page 4: E-Security · E-Security 1. Cryptography Fundamentals. 2. Symmetric Key Encryption. 3. Hashing and MAC. 4. Asymmetric (Public) Key Encryption. 5. Key Exchange.

Module Delivery Website

github.com/billbuchanan/esecurity

Overleafyoutube.com

Lectures/LabDemos Courseworksubmission

Labs

Page 5: E-Security · E-Security 1. Cryptography Fundamentals. 2. Symmetric Key Encryption. 3. Hashing and MAC. 4. Asymmetric (Public) Key Encryption. 5. Key Exchange.

Draft TimetableWebsite

Page 6: E-Security · E-Security 1. Cryptography Fundamentals. 2. Symmetric Key Encryption. 3. Hashing and MAC. 4. Asymmetric (Public) Key Encryption. 5. Key Exchange.

Overview

Page 7: E-Security · E-Security 1. Cryptography Fundamentals. 2. Symmetric Key Encryption. 3. Hashing and MAC. 4. Asymmetric (Public) Key Encryption. 5. Key Exchange.

1.FundamentalsTraditionalCiphers. Key-basedEncryption.EncodingMethods. FrequencyAnalysis. GCD. RandomNumbers. PrimeNumbers.BigIntegers. EncryptionOperators(MOD,XORandShift). ProfBillBuchananOBE https://asecuritysite.com/encryption

Page 8: E-Security · E-Security 1. Cryptography Fundamentals. 2. Symmetric Key Encryption. 3. Hashing and MAC. 4. Asymmetric (Public) Key Encryption. 5. Key Exchange.

2.SymmetricKeyBasics BlockorStream? SecretKeyMethodsSaltingAES 3DESChaCha20/Poly1305 KeyEntropyProfBillBuchananOBE https://asecuritysite.com/encryption

Page 9: E-Security · E-Security 1. Cryptography Fundamentals. 2. Symmetric Key Encryption. 3. Hashing and MAC. 4. Asymmetric (Public) Key Encryption. 5. Key Exchange.

3.HashingandMAC HashingMethods. Cracking. TypicalMethods:MD5,SHA-1,SHA-3,LM,Bcrypt,PBKDF2HashedPasswords. TimedOneTimePasswords. MessageAuthenticationCodes(MACs). ProfBillBuchananOBE https://asecuritysite.com/encryption

Page 10: E-Security · E-Security 1. Cryptography Fundamentals. 2. Symmetric Key Encryption. 3. Hashing and MAC. 4. Asymmetric (Public) Key Encryption. 5. Key Exchange.

4.AsymmetricKeyPrinciples.RSA. EllipticCurve. UsingPrivateKeytoAuthenticate. PGP:SignedEmail. ProfBillBuchananOBE https://asecuritysite.com/encryption

Page 11: E-Security · E-Security 1. Cryptography Fundamentals. 2. Symmetric Key Encryption. 3. Hashing and MAC. 4. Asymmetric (Public) Key Encryption. 5. Key Exchange.

5.KeyExchangePrinciples.Diffie-Hellman(DH). Passingthesecretkeywithkeyexchange.EllipticCurveDiffie-Hellman(ECDH)ProfBillBuchananOBE https://asecuritysite.com/encryption

Page 12: E-Security · E-Security 1. Cryptography Fundamentals. 2. Symmetric Key Encryption. 3. Hashing and MAC. 4. Asymmetric (Public) Key Encryption. 5. Key Exchange.

6.TrustandDigitalCertificates Principles.TrustInfrastructures. PKIInfrastructure. CreatingSignedCertificates.Signatures(ECDSA,Hashed-based). ProfBillBuchananOBE https://asecuritysite.com/encryption

Page 13: E-Security · E-Security 1. Cryptography Fundamentals. 2. Symmetric Key Encryption. 3. Hashing and MAC. 4. Asymmetric (Public) Key Encryption. 5. Key Exchange.

7.TunnellingSSL/TLS.Keygeneration/keyexchange.SSH.IPSec.ProfBillBuchananOBE https://asecuritysite.com/encryption

Page 14: E-Security · E-Security 1. Cryptography Fundamentals. 2. Symmetric Key Encryption. 3. Hashing and MAC. 4. Asymmetric (Public) Key Encryption. 5. Key Exchange.

8.Blockchain&Cryptocurrencies Principles.Bitcoin.Ethereum. SmartContracts. ProfBillBuchananOBE https://asecuritysite.com/encryption

Page 15: E-Security · E-Security 1. Cryptography Fundamentals. 2. Symmetric Key Encryption. 3. Hashing and MAC. 4. Asymmetric (Public) Key Encryption. 5. Key Exchange.

9.FutureCryptoZeroknowledgeproof.Homomorphicencryption.Light-weightcrypto.Quantum-robustcryptography. ProfBillBuchananOBE https://asecuritysite.com/encryption

Page 16: E-Security · E-Security 1. Cryptography Fundamentals. 2. Symmetric Key Encryption. 3. Hashing and MAC. 4. Asymmetric (Public) Key Encryption. 5. Key Exchange.

E-Security1.CryptographyFundamentals. 2.SymmetricKeyEncryption. 3.HashingandMAC.4.Asymmetric(Public)KeyEncryption.5.KeyExchange.6.TrustandDigitalCertificates.7.Tunnelling.8.CryptocurrenciesandBlockchain.9.FutureCryptography.10.HostSecurity. ProfBillBuchananOBE https://asecuritysite.com/encryption https://asecuritysite.com/esecurity