AES –the current encryption standard– uses 1,000s of years old fundamentals.

Our learning modules show you how these fundamentals combine to create secure eMail, SSL/TLS...

 Need quick read? Please know the topic appended with '¤'.



PreComputer Encryption Methods


  Puzzles
and links
 
¤ A simple ancient method and key
Encryption Basics Chapter  
(Method should have many possible keys) I 1, 2 ¤ Shift
 
¤ How statistics is used to break encryption II 3 ¤ Shuffle
(Cryptanalysts are brilliant pattern finders)
 
Example of a provenly secure cipher III 2 Cryptanalysis links
(Easy pen/paper method used thru WW II)



DES & AES


  In Program
Puzzles
 
¤ Compare DES, AES-128 & AES-256 ¤ DES & AES Keys 5, 6 ¤  
(& brief history. Your threat landscape)      
 
¤ Secret key protections:
 confidentiality, authentication & integrity
File authentication (integrity) using secret key
¤ Cryptographic
FingerPrints
7, 8 ¤ Message & File
Ciphers
 
¤ How encryption can be corrupted ¤ Message Cipher
 
¤ How Cipher Modes add security ¤ Message Cipher
 
Make your own LogonPassword Manager File Cipher



KeyStore (keyChain, keyRing)


¤ Learn More in Program
 How to
 ¤ 1. securely export keys for sharing & backup (cloud storage)
¤ 2. Backup & Reinstall our KeyStore
3. look inside our (Java's) KeyStore
 Key sharing suggestions
 ¤ KeyStore's threats & suggestions



Cryptographic Fingerprint (Hash, Message Digest)


¤ Learn More in Program
 How to
 ¤ 1. ensure you get authenticated file (or program)
 ¤ 2. test a message for correct fingerprint
 Review fingerprint (1-wayness & avalanche effect) assurances
 KeyStore's threats & suggestions



Logon Password Manager


Learn More in Program
 How to
 1. get your passwords from Chrome browser
 2. securely save to the cloud
 3. optionally, make your own Password Manager with file encryption



Public Private Key Pair


How public keys solve delivery problems & implement confidentiality 10
How private keys are used to authenticate & implement non-reputation 12
How non-keyed fingerPrints add security 13, 14
How Digital Certificates are used to share public keys 16
Encrypted & authenticated email 19
SSL / TLS 20


Other book chapters


Diffuse & confuse –some secret key theory 3,4
Brief historical overview 6
Some public/private key theory (easy problems for you –but hard for attackers) 9
How RSA public/private keys are made 10, 11
Comparing Secret & Public/Private keys 15
Two Digital Certificate Infrastructures  
1. X.509 – Centralized 17
2. PGP – Distributed 18
IPsec Overview 21
Cryptographic GotChas 22


In addition, the printed Book has 2 appendices entitled Public Key Math & A Few IPsec Details.

Both are still current maybe of interesting to those wanting more insight.