A Raconteur’s Guide to 21st Century Encryption Security


 informative & meaningful picture rich

5 One-Hour Talks    Don't do this anymore —for posterity

1. It’s all about your keys

 ...Encryption discoveries often took hundreds of years –until the 1970s

Understanding types of encryption keys

  secret, public/private, fingerprints (aka digests or hashes)

  how they’re used, protection they give and importance of good random

Key protection assurances explained

  Authentication - the identity of person (or thing) you’re taking with

  Confidentiality - only owners of encryption key can read data

  Data Integrity - retrieved data was not altered

  Non-repudiation - certifies authorship

Storing & sharing secret keys to local drive, flash, cloud

  3 unsecured ways

  Securing keys (key encrypting keys)

  Problems sharing secured keys

Public / Private key pairs

  It took more than 3,000 years to discover secure secret sharing (1977)

  How public key distribution (digital certificates) totally transforms Internet

  SSL/TLS, Virtual Private Networks (VPN, IPsec)

2. Historical Overview of Encryption ...

  ...From PreComputer (Caesar) to Current (AES, RSA, ...)

Evolution illustrates & explains encryption keys you need

Hiding data with J. Caesar’s keys (& his risky nephew –Augustus)

Shuffled (much bigger) keys don’t stop a dedicated cryptanalyst

2000 years after Caesar crypto better and shorter keys

  Provably more secure than AES the– one-time pad

WWII motivates modern cryptography, Alan Turing and computers

IBM, NSA, MIT change encryption –forever– in 1977

  How computers combine preComputer methods to hide data

  Compare secret keys and public/private keys

  Compare different public/private keys

3. Crypto FingerPrints (aka message digests or crypto hashes)

How to protect clear and encrypted data from malicious mutation

  Encryption –by itself– is not enough; it can be corrupted

Extremely easy, really easy to understand and use

  Identifying fraud (your downloaded software)

  BlockChain (e.g. bitcoin) are traceable fingerprints

Fingerprint gotchas, corrupting fingerprints

Fingerprints using secret keys or private keys increase security

Different fingerPrinters (SHA, SHA-1, HMAC, ...)

4. Sharing keys (assumes knowledge secret and public/private keys)

Key Distribution Centers

Secret key sharing problem

Sharing keys with digital certificates

Two types of trust systems: Certificate Authority[mostly used] or PGP

Digital certificates already in your Internet browser (chrome, IE, firefox, …)

What to (not) trust in your Internet Browser (e.g. Chrome, IE, Firefox,...)

Crypto gotchas (like man-in-the-middle attack)

5. Real World Implementations (assumes knowledge of digital certificates)

Email

SSL / TLS (ie. https)

Virtual Private Network (vpn)

A Day

Above +
hands-on (e.g.: corrupting encryption, building crypto keys, block-chains...), +
encryption details (e.g. cipher modes, confusion, diffusion...)

Java Developing

1. Encryption and GUI
2. SSL/TLS

email: hx at hxmel.com