summaryrefslogtreecommitdiff
path: root/day2/second-crypto.txt
diff options
context:
space:
mode:
Diffstat (limited to 'day2/second-crypto.txt')
-rw-r--r--day2/second-crypto.txt51
1 files changed, 0 insertions, 51 deletions
diff --git a/day2/second-crypto.txt b/day2/second-crypto.txt
deleted file mode 100644
index 18d5324..0000000
--- a/day2/second-crypto.txt
+++ /dev/null
@@ -1,51 +0,0 @@
-# Crypto
-
-## Overview:
-Why do we need crypto?
-
-- Confidentiality
-- Key Ex
-- Identity
-- Authentication
-
-## Asymetric Cryto
-- Symmetric crypto faster, asymmetric slower and computational expensive
-- RSA
- - slightly old
- - Needs 2048+ size keys
-
-## eliptic curve crypto
-- Dot function
-- Key exchange with shared key created from a -> aG -> aGb <- bG <- b
-- Week to man in the middle
-
-## Web of trust
-- How can we safely pass the key over an unsecured channel
-- Just blindly trust on first use (like ssh)
-
-## The trusted third party
-- Get a 3rd actor to meet Alice and Bob to add trust
-
-## hash functions
-- md5 weak
-- sha good
-
-# Merkel tree
-- Hash chunks
-- Combine chunks and hash
-- Can work out which parts are wrong
-- good for static data
-- hash tree
-
-## BLock chain
-- Use block chain to share trusted messages
-
-@giveupalready
-https://github.com/carnage
-
-
-
-
-
---------
-Web of trust, trust once, trust forever