A Raconteur’s Guide to 21st Century Encryption Security
informative & meaningful picture rich
5 One-Hour Talks Don't do this anymore —for posterity
1. It’s all about your keys
...Encryption discoveries often took hundreds of years –until the 1970s
Understanding types of encryption keys
secret, public/private, fingerprints (aka digests or hashes)
how they’re used, protection they give and importance of good random
Key protection assurances explained
Authentication - the identity of person (or thing) you’re taking with
Confidentiality - only owners of encryption key can read data
Data Integrity - retrieved data was not altered
Non-repudiation - certifies authorship
Storing & sharing secret keys to local drive, flash, cloud
3 unsecured ways
Securing keys (key encrypting keys)
Problems sharing secured keys
Public / Private key pairs
It took more than 3,000 years to discover secure secret sharing (1977)
How public key distribution (digital certificates) totally transforms Internet
SSL/TLS, Virtual Private Networks (VPN, IPsec)
2. Historical Overview of Encryption ...
...From PreComputer (Caesar) to Current (AES, RSA, ...)
Evolution illustrates & explains encryption keys you need
Hiding data with J. Caesar’s keys (& his risky nephew –Augustus)
Shuffled (much bigger) keys don’t stop a dedicated cryptanalyst
2000 years after Caesar crypto better and shorter keys
Provably more secure than AES the– one-time pad
WWII motivates modern cryptography, Alan Turing and computers
IBM, NSA, MIT change encryption –forever– in 1977
How computers combine preComputer methods to hide data
Compare secret keys and public/private keys
Compare different public/private keys
3. Crypto FingerPrints (aka message digests or crypto hashes)
How to protect clear and encrypted data from malicious mutation
Encryption –by itself– is not enough; it can be corrupted
Extremely easy, really easy to understand and use
Identifying fraud (your downloaded software)
BlockChain (e.g. bitcoin) are traceable fingerprints
Fingerprint gotchas, corrupting fingerprints
Fingerprints using secret keys or private keys increase security
Different fingerPrinters (SHA, SHA-1, HMAC, ...)
4. Sharing keys (assumes knowledge secret and public/private keys)
Key Distribution Centers
Secret key sharing problem
Sharing keys with digital certificates
Two types of trust systems: Certificate Authority[mostly used] or PGP
Digital certificates already in your Internet browser (chrome, IE, firefox, …)
What to (not) trust in your Internet Browser (e.g. Chrome, IE, Firefox,...)
Crypto gotchas (like man-in-the-middle attack)
5. Real World Implementations (assumes knowledge of digital certificates)
SSL / TLS (ie. https)
Virtual Private Network (vpn)
A Day
Above +
hands-on (e.g.: corrupting encryption, building crypto keys, block-chains...), +
encryption details (e.g. cipher modes, confusion, diffusion...)
Java Developing
1. Encryption and GUI
2. SSL/TLS
email: hx at hxmel.com