16
E-Security 1. Cryptography Fundamentals. 2. Symmetric Key Encryption. 3. Hashing and MAC. 4. Asymmetric (Public) Key Encryption. 5. Key Exchange. 6. Trust and Digital Certificates. 7. Tunnelling. 8. Cryptocurrencies and Blockchain. 9. Future Cryptography. 10. Host Security. Prof Bill Buchanan OBE https://asecuritysite.com/encryption https://asecuritysite.com/esecurity

E-Security · E-Security 1. Cryptography Fundamentals. 2. Symmetric Key Encryption. 3. Hashing and MAC. 4. Asymmetric (Public) Key Encryption. 5. Key Exchange

  • Upload
    others

  • View
    17

  • Download
    0

Embed Size (px)

Citation preview

Page 1: E-Security · E-Security 1. Cryptography Fundamentals. 2. Symmetric Key Encryption. 3. Hashing and MAC. 4. Asymmetric (Public) Key Encryption. 5. Key Exchange

E-Security1.CryptographyFundamentals. 2.SymmetricKeyEncryption. 3.HashingandMAC.4.Asymmetric(Public)KeyEncryption.5.KeyExchange.6.TrustandDigitalCertificates.7.Tunnelling.8.CryptocurrenciesandBlockchain.9.FutureCryptography.10.HostSecurity. ProfBillBuchananOBE https://asecuritysite.com/encryption https://asecuritysite.com/esecurity

Page 2: E-Security · E-Security 1. Cryptography Fundamentals. 2. Symmetric Key Encryption. 3. Hashing and MAC. 4. Asymmetric (Public) Key Encryption. 5. Key Exchange

Disclaimer

• Encryptionworksgreat,untilitdoesn't.• Encryptionworksgreat,aslongasnoonemakesamistake.

• Encryptionworksgreat,unlesssomethinggoeswrong.

• Encryptionworksgreat,aslongaseverythingworksright.

Page 3: E-Security · E-Security 1. Cryptography Fundamentals. 2. Symmetric Key Encryption. 3. Hashing and MAC. 4. Asymmetric (Public) Key Encryption. 5. Key Exchange

Module Delivery Website

esecurityworkspace.slack.com

@billatnapier

github.com/billbuchanan/esecurity

Overleaf

asecuritysite.com

youtube.com

Page 4: E-Security · E-Security 1. Cryptography Fundamentals. 2. Symmetric Key Encryption. 3. Hashing and MAC. 4. Asymmetric (Public) Key Encryption. 5. Key Exchange

Module Delivery Website

github.com/billbuchanan/esecurity

Overleafyoutube.com

Lectures/LabDemos Courseworksubmission

Labs

Page 5: E-Security · E-Security 1. Cryptography Fundamentals. 2. Symmetric Key Encryption. 3. Hashing and MAC. 4. Asymmetric (Public) Key Encryption. 5. Key Exchange

Draft TimetableWebsite

Page 6: E-Security · E-Security 1. Cryptography Fundamentals. 2. Symmetric Key Encryption. 3. Hashing and MAC. 4. Asymmetric (Public) Key Encryption. 5. Key Exchange

Overview

Page 7: E-Security · E-Security 1. Cryptography Fundamentals. 2. Symmetric Key Encryption. 3. Hashing and MAC. 4. Asymmetric (Public) Key Encryption. 5. Key Exchange

1.FundamentalsTraditionalCiphers. Key-basedEncryption.EncodingMethods. FrequencyAnalysis. GCD. RandomNumbers. PrimeNumbers.BigIntegers. EncryptionOperators(MOD,XORandShift). ProfBillBuchananOBE https://asecuritysite.com/encryption

Page 8: E-Security · E-Security 1. Cryptography Fundamentals. 2. Symmetric Key Encryption. 3. Hashing and MAC. 4. Asymmetric (Public) Key Encryption. 5. Key Exchange

2.SymmetricKeyBasics BlockorStream? SecretKeyMethodsSaltingAES 3DESChaCha20/Poly1305 KeyEntropyProfBillBuchananOBE https://asecuritysite.com/encryption

Page 9: E-Security · E-Security 1. Cryptography Fundamentals. 2. Symmetric Key Encryption. 3. Hashing and MAC. 4. Asymmetric (Public) Key Encryption. 5. Key Exchange

3.HashingandMAC HashingMethods. Cracking. TypicalMethods:MD5,SHA-1,SHA-3,LM,Bcrypt,PBKDF2HashedPasswords. TimedOneTimePasswords. MessageAuthenticationCodes(MACs). ProfBillBuchananOBE https://asecuritysite.com/encryption

Page 10: E-Security · E-Security 1. Cryptography Fundamentals. 2. Symmetric Key Encryption. 3. Hashing and MAC. 4. Asymmetric (Public) Key Encryption. 5. Key Exchange

4.AsymmetricKeyPrinciples.RSA. EllipticCurve. UsingPrivateKeytoAuthenticate. PGP:SignedEmail. ProfBillBuchananOBE https://asecuritysite.com/encryption

Page 11: E-Security · E-Security 1. Cryptography Fundamentals. 2. Symmetric Key Encryption. 3. Hashing and MAC. 4. Asymmetric (Public) Key Encryption. 5. Key Exchange

5.KeyExchangePrinciples.Diffie-Hellman(DH). Passingthesecretkeywithkeyexchange.EllipticCurveDiffie-Hellman(ECDH)ProfBillBuchananOBE https://asecuritysite.com/encryption

Page 12: E-Security · E-Security 1. Cryptography Fundamentals. 2. Symmetric Key Encryption. 3. Hashing and MAC. 4. Asymmetric (Public) Key Encryption. 5. Key Exchange

6.TrustandDigitalCertificates Principles.TrustInfrastructures. PKIInfrastructure. CreatingSignedCertificates.Signatures(ECDSA,Hashed-based). ProfBillBuchananOBE https://asecuritysite.com/encryption

Page 13: E-Security · E-Security 1. Cryptography Fundamentals. 2. Symmetric Key Encryption. 3. Hashing and MAC. 4. Asymmetric (Public) Key Encryption. 5. Key Exchange

7.TunnellingSSL/TLS.Keygeneration/keyexchange.SSH.IPSec.ProfBillBuchananOBE https://asecuritysite.com/encryption

Page 14: E-Security · E-Security 1. Cryptography Fundamentals. 2. Symmetric Key Encryption. 3. Hashing and MAC. 4. Asymmetric (Public) Key Encryption. 5. Key Exchange

8.Blockchain&Cryptocurrencies Principles.Bitcoin.Ethereum. SmartContracts. ProfBillBuchananOBE https://asecuritysite.com/encryption

Page 15: E-Security · E-Security 1. Cryptography Fundamentals. 2. Symmetric Key Encryption. 3. Hashing and MAC. 4. Asymmetric (Public) Key Encryption. 5. Key Exchange

9.FutureCryptoZeroknowledgeproof.Homomorphicencryption.Light-weightcrypto.Quantum-robustcryptography. ProfBillBuchananOBE https://asecuritysite.com/encryption

Page 16: E-Security · E-Security 1. Cryptography Fundamentals. 2. Symmetric Key Encryption. 3. Hashing and MAC. 4. Asymmetric (Public) Key Encryption. 5. Key Exchange

E-Security1.CryptographyFundamentals. 2.SymmetricKeyEncryption. 3.HashingandMAC.4.Asymmetric(Public)KeyEncryption.5.KeyExchange.6.TrustandDigitalCertificates.7.Tunnelling.8.CryptocurrenciesandBlockchain.9.FutureCryptography.10.HostSecurity. ProfBillBuchananOBE https://asecuritysite.com/encryption https://asecuritysite.com/esecurity