diff options
author | Phil Burton <phil@d3r.com> | 2019-02-25 13:37:59 +0000 |
---|---|---|
committer | Phil Burton <phil@d3r.com> | 2019-02-25 13:37:59 +0000 |
commit | 3431e667a5c6475043ebfd97b43a3fdc4b078596 (patch) | |
tree | cd9eb1249e42de8ee1c7e99fd83cb7f091637b7c /day2/second-crypto.txt | |
parent | 4e8368f4d847e5c1352302fc53658dfab2c72a9b (diff) |
Diffstat (limited to 'day2/second-crypto.txt')
-rw-r--r-- | day2/second-crypto.txt | 51 |
1 files changed, 0 insertions, 51 deletions
diff --git a/day2/second-crypto.txt b/day2/second-crypto.txt deleted file mode 100644 index 18d5324..0000000 --- a/day2/second-crypto.txt +++ /dev/null @@ -1,51 +0,0 @@ -# Crypto - -## Overview: -Why do we need crypto? - -- Confidentiality -- Key Ex -- Identity -- Authentication - -## Asymetric Cryto -- Symmetric crypto faster, asymmetric slower and computational expensive -- RSA - - slightly old - - Needs 2048+ size keys - -## eliptic curve crypto -- Dot function -- Key exchange with shared key created from a -> aG -> aGb <- bG <- b -- Week to man in the middle - -## Web of trust -- How can we safely pass the key over an unsecured channel -- Just blindly trust on first use (like ssh) - -## The trusted third party -- Get a 3rd actor to meet Alice and Bob to add trust - -## hash functions -- md5 weak -- sha good - -# Merkel tree -- Hash chunks -- Combine chunks and hash -- Can work out which parts are wrong -- good for static data -- hash tree - -## BLock chain -- Use block chain to share trusted messages - -@giveupalready -https://github.com/carnage - - - - - --------- -Web of trust, trust once, trust forever |