summaryrefslogtreecommitdiff
path: root/day2/second-crypto.txt
diff options
context:
space:
mode:
authorPhil Burton <phil@d3r.com>2019-02-25 13:37:59 +0000
committerPhil Burton <phil@d3r.com>2019-02-25 13:37:59 +0000
commit3431e667a5c6475043ebfd97b43a3fdc4b078596 (patch)
treecd9eb1249e42de8ee1c7e99fd83cb7f091637b7c /day2/second-crypto.txt
parent4e8368f4d847e5c1352302fc53658dfab2c72a9b (diff)
Refactor and clean up notesHEADmaster
Diffstat (limited to 'day2/second-crypto.txt')
-rw-r--r--day2/second-crypto.txt51
1 files changed, 0 insertions, 51 deletions
diff --git a/day2/second-crypto.txt b/day2/second-crypto.txt
deleted file mode 100644
index 18d5324..0000000
--- a/day2/second-crypto.txt
+++ /dev/null
@@ -1,51 +0,0 @@
-# Crypto
-
-## Overview:
-Why do we need crypto?
-
-- Confidentiality
-- Key Ex
-- Identity
-- Authentication
-
-## Asymetric Cryto
-- Symmetric crypto faster, asymmetric slower and computational expensive
-- RSA
- - slightly old
- - Needs 2048+ size keys
-
-## eliptic curve crypto
-- Dot function
-- Key exchange with shared key created from a -> aG -> aGb <- bG <- b
-- Week to man in the middle
-
-## Web of trust
-- How can we safely pass the key over an unsecured channel
-- Just blindly trust on first use (like ssh)
-
-## The trusted third party
-- Get a 3rd actor to meet Alice and Bob to add trust
-
-## hash functions
-- md5 weak
-- sha good
-
-# Merkel tree
-- Hash chunks
-- Combine chunks and hash
-- Can work out which parts are wrong
-- good for static data
-- hash tree
-
-## BLock chain
-- Use block chain to share trusted messages
-
-@giveupalready
-https://github.com/carnage
-
-
-
-
-
---------
-Web of trust, trust once, trust forever