summaryrefslogtreecommitdiff
path: root/day2/more-secrets-of-crpyto.txt
diff options
context:
space:
mode:
authorPhil Burton <phil@d3r.com>2019-02-25 13:37:59 +0000
committerPhil Burton <phil@d3r.com>2019-02-25 13:37:59 +0000
commit3431e667a5c6475043ebfd97b43a3fdc4b078596 (patch)
treecd9eb1249e42de8ee1c7e99fd83cb7f091637b7c /day2/more-secrets-of-crpyto.txt
parent4e8368f4d847e5c1352302fc53658dfab2c72a9b (diff)
Refactor and clean up notesHEADmaster
Diffstat (limited to 'day2/more-secrets-of-crpyto.txt')
-rw-r--r--day2/more-secrets-of-crpyto.txt53
1 files changed, 53 insertions, 0 deletions
diff --git a/day2/more-secrets-of-crpyto.txt b/day2/more-secrets-of-crpyto.txt
new file mode 100644
index 0000000..0246a58
--- /dev/null
+++ b/day2/more-secrets-of-crpyto.txt
@@ -0,0 +1,53 @@
+# Crypto
+Christopher Riley
+@giveupalready
+https://github.com/carnage
+
+## Overview:
+Why do we need crypto?
+
+- Confidentiality
+- Key Ex
+- Identity
+- Authentication
+
+## Asymmetric Crypto
+- Symmetric crypto faster, asymmetric slower and computational expensive
+- RSA
+ - slightly old
+ - Needs 2048+ size keys
+
+## Elliptic curve crypto
+- Dot function
+- Key exchange with shared key created from a -> aG -> aGb <- bG <- b
+- Week to man in the middle
+
+## Web of trust
+- How can we safely pass the key over an unsecured channel
+- Just blindly trust on first use (like ssh)
+
+## The trusted third party
+- Get a 3rd actor to meet Alice and Bob to add trust
+
+## hash functions
+- md5 weak
+- sha good
+
+# Merkel tree
+- Hash chunks
+- Combine chunks and hash
+- Can work out which parts are wrong
+- good for static data
+- hash tree
+
+## Block chain
+- Use block chain to share trusted messages
+
+
+
+
+
+
+
+--------
+Web of trust, trust once, trust forever