summaryrefslogtreecommitdiff
path: root/day2/second-crypto.txt
diff options
context:
space:
mode:
Diffstat (limited to 'day2/second-crypto.txt')
-rw-r--r--day2/second-crypto.txt51
1 files changed, 51 insertions, 0 deletions
diff --git a/day2/second-crypto.txt b/day2/second-crypto.txt
new file mode 100644
index 0000000..18d5324
--- /dev/null
+++ b/day2/second-crypto.txt
@@ -0,0 +1,51 @@
+# Crypto
+
+## Overview:
+Why do we need crypto?
+
+- Confidentiality
+- Key Ex
+- Identity
+- Authentication
+
+## Asymetric Cryto
+- Symmetric crypto faster, asymmetric slower and computational expensive
+- RSA
+ - slightly old
+ - Needs 2048+ size keys
+
+## eliptic curve crypto
+- Dot function
+- Key exchange with shared key created from a -> aG -> aGb <- bG <- b
+- Week to man in the middle
+
+## Web of trust
+- How can we safely pass the key over an unsecured channel
+- Just blindly trust on first use (like ssh)
+
+## The trusted third party
+- Get a 3rd actor to meet Alice and Bob to add trust
+
+## hash functions
+- md5 weak
+- sha good
+
+# Merkel tree
+- Hash chunks
+- Combine chunks and hash
+- Can work out which parts are wrong
+- good for static data
+- hash tree
+
+## BLock chain
+- Use block chain to share trusted messages
+
+@giveupalready
+https://github.com/carnage
+
+
+
+
+
+--------
+Web of trust, trust once, trust forever