AES –the current encryption standard– uses 1,000s of years old fundamentals.

Our learning modules show you how these fundamentals combine to create secure eMail, SSL/TLS...

 Need quick read? Please know the topic appended with '¤'.

PreComputer Encryption Methods

Link to
.pdf puzzles
¤ A simple ancient method and key
Encryption Basics Chapter 1 Shift
(Method should have many possible keys) I 1, 2 ¤  
¤ How statistics is used to break encryption II 3 ¤ 3 Shuffle
(Cryptanalysts are brilliant pattern finders)
Example of a provenly secure cipher III 2 Cryptanalysis links
(Easy pen/paper method used thru WW II)


In Program
¤ Compare DES, AES-128 & AES-256 ¤ DES & AES Keys 5, 6 ¤  
(& brief history. Your threat landscape)      
¤ Secret key protections:
 confidentiality, authentication & integrity
File authentication (integrity) using secret key
¤ Cryptographic
7, 8 ¤ Message & File
¤ How encryption can be corrupted ¤ Message Cipher
¤ How Cipher Modes add security ¤ Message Cipher
Make your own LogonPassword Manager File Cipher

KeyStore (keyChain, keyRing)

¤ Learn More in Program
 How to
 ¤ 1. securely export keys for sharing & backup (cloud storage)
¤ 2. Backup & Reinstall our KeyStore
3. look inside our (Java's) KeyStore
 Key sharing suggestions
 ¤ KeyStore's threats & suggestions

Cryptographic Fingerprint (Hash, Message Digest)

¤ Learn More in Program
 How to
 ¤ 1. ensure you get authenticated file (or program)
 ¤ 2. test a message for correct fingerprint
 Review fingerprint (1-wayness & avalanche effect) assurances
 KeyStore's threats & suggestions

Logon Password Manager

Learn More in Program
 How to
 1. get your passwords from Chrome browser
 2. securely save to the cloud
 3. optionally, make your own Password Manager with file encryption

Public Private Key Pair

How public keys solve delivery problems & implement confidentiality 10
How private keys are used to authenticate & implement non-reputation 12
How non-keyed fingerPrints add security 13, 14
How Digital Certificates are used to share public keys 16
Encrypted & authenticated email 19
SSL / TLS 20

Other book chapters

Diffuse & confuse –some secret key theory 3,4
Brief historical overview 6
Some public/private key theory (easy problems for you –but hard for attackers) 9
How RSA public/private keys are made 10, 11
Comparing Secret & Public/Private keys 15
Two Digital Certificate Infrastructures  
1. X.509 – Centralized 17
2. PGP – Distributed 18
IPsec Overview 21
Cryptographic GotChas 22

In addition, the printed Book has 2 appendices entitled Public Key Math & A Few IPsec Details.

Both are still current maybe of interesting to those wanting more insight.