AES –the current encryption standard– uses 1,000s of years old fundamentals.
Our learning modules show you how these fundamentals combine to create secure eMail, SSL/TLS...
Need quick read? Please know the topic appended with '¤'.
 …PreComputer Encryption Methods
               …PreComputer Encryption Methods
         
|  |  |  Puzzles and links | |
|---|---|---|---|
| ¤ A simple ancient method and key | Encryption Basics | Chapter | |
| (Method should have many possible keys) | I | 1, 2 ¤ | Shift | 
| ¤ How statistics is used to break encryption | II | 3 ¤ | Shuffle | 
| (Cryptanalysts are brilliant pattern finders) | |||
| Example of a provenly secure cipher | III | 2 | Cryptanalysis links | 
| (Easy pen/paper method used thru WW II) | |||
 …DES & AES
               …DES & AES
         
 … 
               KeyStore (keyChain, keyRing)
 
               … 
               KeyStore (keyChain, keyRing)
         
| ¤ Learn More in Program  | |
|---|---|
| How to  | |
| ¤ 1. securely export keys for sharing & backup (cloud storage) | |
| ¤ 2. Backup & Reinstall our KeyStore | |
| 3. look inside our (Java's) KeyStore | |
| Key sharing suggestions | |
| ¤ KeyStore's threats & suggestions | |
 … 
               Cryptographic Fingerprint (Hash, Message Digest)
   
               … 
               Cryptographic Fingerprint (Hash, Message Digest)
         
| ¤ Learn More in Program  | |
|---|---|
| How to  | |
| ¤ 1. ensure you get authenticated file (or program) | |
| ¤ 2. test a message for correct fingerprint | |
| Review fingerprint (1-wayness & avalanche effect) assurances | |
| KeyStore's threats & suggestions | |
 …Logon Password Manager
               …Logon Password Manager
         
| Learn More in Program  | |
|---|---|
| How to  | |
| 1. get your passwords from Chrome browser | |
| 2. securely save to the cloud | |
| 3. optionally, make your own Password Manager with file encryption | |
 …Public Private Key Pair
 
               …Public Private Key Pair
         
…Other book chapters
| Diffuse & confuse –some secret key theory | 3,4 | 
| Brief historical overview | 6 | 
| Some public/private key theory (easy problems for you –but hard for attackers) | 9 | 
| How RSA public/private keys are made | 10, 11 | 
| Comparing Secret & Public/Private keys | 15 | 
| Two Digital Certificate Infrastructures | |
| 1. X.509 – Centralized | 17 | 
| 2. PGP – Distributed | 18 | 
| IPsec Overview | 21 | 
| Cryptographic GotChas | 22 | 
In addition, the printed Book has 2 appendices entitled Public Key Math & A Few IPsec Details.
Both are still current maybe of interesting to those wanting more insight.
