summaryrefslogtreecommitdiff
path: root/day2/second-crypto.txt
blob: 18d5324bc583e71ee70721c54a41f6ea0f958dc3 (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
# Crypto

## Overview:
Why do we need crypto?

- Confidentiality
- Key Ex
- Identity
- Authentication

## Asymetric Cryto
- Symmetric crypto faster, asymmetric slower and computational expensive
- RSA
    - slightly old
    - Needs 2048+ size keys

## eliptic curve crypto
- Dot function
- Key exchange with shared key created from a -> aG -> aGb <- bG <- b
- Week to man in the middle

## Web of trust
- How can we safely pass the key over an unsecured channel
- Just blindly trust on first use (like ssh)

## The trusted third party
- Get a 3rd actor to meet Alice and Bob to add trust

## hash functions
- md5 weak
- sha good

# Merkel tree
- Hash chunks
- Combine chunks and hash
- Can work out which parts are wrong
- good for static data
- hash tree

## BLock chain
- Use block chain to share trusted messages

@giveupalready
https://github.com/carnage





--------
Web of trust, trust once, trust forever