Cryptography - useful links
-
Show Host: Mike Rodrick
Show Instructor: Sean Philip Oriyano
- Author/Consultant/Instructor
oriyano.com
Books
Episode 1 - Cryptography Overview
• IntroductionEpisode 2 - History Of Cryptography
• Links Mentioned- Cryptography: Wiki
Confederate Cipher Disc
Egyptian Hieroglyphic Writing
Ancient Scripts: Sumerian
Ancient Scripts: Eqyytian
Teaching With Documents:The Zimmermann Telegram
Enigma Cipher Machine
Hagelin M-209: Tacticle mechanical cipher machine
• My Links
- Enigma Simulator
Paper Enigma Machine
Enigma Machine Applet
Extremely good Graphical Enigma Machine: Shows exact workings
Enigma Machine Interactive Demo
• Other Links
- Security Now 409
Japanese Purple Cipher
Allied Code Breaking
Hitler's Japanese Confidant: General Oshima Hiroshi and MAGIC Intelligence, 1941-1945
The Code Book: wiki
Episode 3 - The Language of Cryptography
• Links Mentioned• My Links
• Topics
-
Algorithm Explained: A finite set of steps to resolve a particular problem.
plaintext: Readable message before Encryption
ciphertext: Scramble unreadable message after Encryption
key: The means by which you encoded the message -
- Example of Caesar Cipher:
BEN [plaintext] = EHQ: [ciphertext] KEY equals [shift by 3]
B becomes: shift1 = C, shift2 = D, shift3 = E, so B becomes E
- Example of Caesar Cipher:
-
Encryption explained
Decryption explained
Symmetric explained
Asymmetric explained
Out of band: (ie sending the key and data seperate ways: email date, ring person with key to decode)
Secure Channel
one way function (hashing. message digest)
Trapdoor function
types of ciphers: -
- stream cipher
Block cipher
- stream cipher
-
Substitution Cipher
Scytale (pronounced: sit - al - ee)
Criptogram (typically a puzzle or game)
Episode 4 - Components of Cryptography
• Topics & Links Mentioned- Key Space explained
KerchKHoffs Principle
Vigenere Puzzle to try
Vigenere Cipher Explained
Episode 5 - Algorithms and Ciphers
• Topics & Links Mentioned- Difference Between Algorithms & Ciphers
- Symetric ciphers: stream cipher. block cipher
- Asymmetric ciphers: Public Key Cryptography:
- Types of Ciphers
• Example of symmetric & asymmetric by Ben from Wikipedia (1)
-
symmetric:
Alice first puts the secret message in a box, and locks the box using a padlock to which she has a key. She then sends the box to Bob through regular mail. When Bob receives the box, he uses an identical copy of Alice's key (which he has somehow obtained previously, maybe by a face-to-face meeting) to open the box, and reads the message. Bob can then use the same padlock to send his secret reply. -
Asymmetric:
In an asymmetric key system, Bob and Alice have separate padlocks. First, Alice asks Bob to send his open padlock to her through regular mail, keeping his key to himself. When Alice receives it she uses it to lock a box containing her message, and sends the locked box to Bob. Bob can then unlock the box with his key and read the message from Alice. To reply, Bob must similarly get Alice's open padlock to lock the box before sending it back to her.
• Other Links
Episode ? - The Future of Cryptography
• Links Mentioned- Quantum Mechanics: Wiki
Quantum Mechanics: Introdution
Shor's Algorithm: Wiki
Schrödinger's cat
P versus NP problem
Everything you need to know about Quantum Cryptography...
Quantum Cryptography: infosec
References
- Author/Consultant/Instructor
-
That's very helpful @Ben-Coyle , many thanks :+1: +1: