AES –the current encryption standard– uses 1,000s of years old fundamentals.
Our learning modules show you how these fundamentals combine to create secure eMail, SSL/TLS...
Need quick read? Please know the topic appended with '¤'.
…PreComputer Encryption Methods
and links |
|||
|---|---|---|---|
| ¤ A simple ancient method and key |
Encryption Basics | Chapter | |
| (Method should have many possible keys) | I | 1, 2 ¤ | Shift |
| ¤ How statistics is used to break encryption | II | 3 ¤ | Shuffle |
| (Cryptanalysts are brilliant pattern finders) | |||
| Example of a provenly secure cipher | III | 2 | Cryptanalysis links |
| (Easy pen/paper method used thru WW II) | |||
…DES & AES
…
KeyStore (keyChain, keyRing)
| ¤ Learn More in Program
|
|
|---|---|
| How to |
|
| ¤ 1. securely export keys for sharing & backup (cloud storage) | |
| ¤ 2. Backup & Reinstall our KeyStore | |
| 3. look inside our (Java's) KeyStore | |
| Key sharing suggestions | |
| ¤ KeyStore's threats & suggestions | |
…
Cryptographic Fingerprint (Hash, Message Digest)
| ¤ Learn More in Program
|
|
|---|---|
| How to |
|
| ¤ 1. ensure you get authenticated file (or program) | |
| ¤ 2. test a message for correct fingerprint | |
| Review fingerprint (1-wayness & avalanche effect) assurances | |
| KeyStore's threats & suggestions | |
…Logon Password Manager
| Learn More in Program
|
|
|---|---|
| How to |
|
| 1. get your passwords from Chrome browser | |
| 2. securely save to the cloud | |
| 3. optionally, make your own Password Manager with file encryption | |
…Public Private Key Pair
…Other book chapters
| Diffuse & confuse –some secret key theory | 3,4 |
| Brief historical overview | 6 |
| Some public/private key theory (easy problems for you –but hard for attackers) | 9 |
| How RSA public/private keys are made | 10, 11 |
| Comparing Secret & Public/Private keys | 15 |
| Two Digital Certificate Infrastructures | |
| 1. X.509 – Centralized | 17 |
| 2. PGP – Distributed | 18 |
| IPsec Overview | 21 |
| Cryptographic GotChas | 22 |
In addition, the printed Book has 2 appendices entitled Public Key Math & A Few IPsec Details.
Both are still current maybe of interesting to those wanting more insight.