diff options
Diffstat (limited to 'day2/second-crypto.txt')
-rw-r--r-- | day2/second-crypto.txt | 51 |
1 files changed, 0 insertions, 51 deletions
diff --git a/day2/second-crypto.txt b/day2/second-crypto.txt deleted file mode 100644 index 18d5324..0000000 --- a/day2/second-crypto.txt +++ /dev/null @@ -1,51 +0,0 @@ -# Crypto - -## Overview: -Why do we need crypto? - -- Confidentiality -- Key Ex -- Identity -- Authentication - -## Asymetric Cryto -- Symmetric crypto faster, asymmetric slower and computational expensive -- RSA - - slightly old - - Needs 2048+ size keys - -## eliptic curve crypto -- Dot function -- Key exchange with shared key created from a -> aG -> aGb <- bG <- b -- Week to man in the middle - -## Web of trust -- How can we safely pass the key over an unsecured channel -- Just blindly trust on first use (like ssh) - -## The trusted third party -- Get a 3rd actor to meet Alice and Bob to add trust - -## hash functions -- md5 weak -- sha good - -# Merkel tree -- Hash chunks -- Combine chunks and hash -- Can work out which parts are wrong -- good for static data -- hash tree - -## BLock chain -- Use block chain to share trusted messages - -@giveupalready -https://github.com/carnage - - - - - --------- -Web of trust, trust once, trust forever |