diff options
author | Phil Burton <phil@d3r.com> | 2019-02-25 13:37:59 +0000 |
---|---|---|
committer | Phil Burton <phil@d3r.com> | 2019-02-25 13:37:59 +0000 |
commit | 3431e667a5c6475043ebfd97b43a3fdc4b078596 (patch) | |
tree | cd9eb1249e42de8ee1c7e99fd83cb7f091637b7c /day2/more-secrets-of-crpyto.txt | |
parent | 4e8368f4d847e5c1352302fc53658dfab2c72a9b (diff) |
Diffstat (limited to 'day2/more-secrets-of-crpyto.txt')
-rw-r--r-- | day2/more-secrets-of-crpyto.txt | 53 |
1 files changed, 53 insertions, 0 deletions
diff --git a/day2/more-secrets-of-crpyto.txt b/day2/more-secrets-of-crpyto.txt new file mode 100644 index 0000000..0246a58 --- /dev/null +++ b/day2/more-secrets-of-crpyto.txt @@ -0,0 +1,53 @@ +# Crypto +Christopher Riley +@giveupalready +https://github.com/carnage + +## Overview: +Why do we need crypto? + +- Confidentiality +- Key Ex +- Identity +- Authentication + +## Asymmetric Crypto +- Symmetric crypto faster, asymmetric slower and computational expensive +- RSA + - slightly old + - Needs 2048+ size keys + +## Elliptic curve crypto +- Dot function +- Key exchange with shared key created from a -> aG -> aGb <- bG <- b +- Week to man in the middle + +## Web of trust +- How can we safely pass the key over an unsecured channel +- Just blindly trust on first use (like ssh) + +## The trusted third party +- Get a 3rd actor to meet Alice and Bob to add trust + +## hash functions +- md5 weak +- sha good + +# Merkel tree +- Hash chunks +- Combine chunks and hash +- Can work out which parts are wrong +- good for static data +- hash tree + +## Block chain +- Use block chain to share trusted messages + + + + + + + +-------- +Web of trust, trust once, trust forever |