DoCrypt Videos links on YouTube
DES & AES keys
Brief history · DES (56) was & AES (128) is · how
weak passwords are attacked.
How cryptographic fingerPrints
authenticate data
assure receiver that senders data unchanged during transit
(integrity).
SSL/TLS crypto's design was/is Fine...
HeartBleed
was because a programmer made an implementation mistake –happens
a lot.
Modern encryption built on ancient tools
Encryption Basics
I
Explains difference between encryption method and key using Caesar's Cipher.
Encryption Basics
II
Explains how more than enough keys isn't enough to stop a dedicated attacker.
Encryption Basics III
A provable secure encryption method that can't be
cracked.
PreComputer Puzzles
Get .pdf (with answers) here includes Caesar's Cipher, Shuffle & other links
In-program hands-on demonstrate how · · ·
· encryption can be corrupted.
· cryptographic fingerprints (aka hash, message digest) detect corruption.
· 1 fingerprint can detect any change in a group of files.
· key store make much better keys than human created.
· use Java's KeyTool to look inside, modify a key storage database.
· using 1 particular (ECB) encryption mode could be risky.
· new→ how BitCoin & BlockChain implement crypto security.
· random numbers are used to frustrate cryptanalysts.
In-program links
has help and learn more links to wiki, experts, other interesting ...