DoCrypt Videos links on YouTube
               DES & AES keys
               
Brief history · DES (56) was & AES (128)  is · how
               weak passwords are attacked.
            
               How cryptographic fingerPrints
                  authenticate data 
assure receiver that senders data unchanged during transit
               (integrity).
            
               SSL/TLS crypto's design was/is Fine... 
                  HeartBleed 
 was because a programmer made an implementation mistake –happens
                  a lot.
            
               Modern encryption built on ancient tools  
            
            
            
               Encryption Basics
                  I 
 Explains difference between encryption method and key using Caesar's Cipher.
            
               Encryption Basics
                  II 
 Explains how more than enough keys isn't enough to stop a dedicated attacker.
            
                Encryption Basics III 
 A provable secure encryption method that can't be
               cracked.
            
PreComputer Puzzles
Get .pdf (with answers) here includes Caesar's Cipher, Shuffle & other links
In-program hands-on demonstrate how · · ·
· encryption can be corrupted.
· cryptographic fingerprints (aka hash, message digest) detect corruption.
· 1 fingerprint can detect any change in a group of files.
· key store make much better keys than human created.
· use Java's KeyTool to look inside, modify a key storage database.
· using 1 particular (ECB) encryption mode could be risky.
· new→ how BitCoin & BlockChain implement crypto security.
· random numbers are used to frustrate cryptanalysts.
In-program links
                has help and learn more links to
               wiki, experts, other interesting ...
 has help and learn more links to
               wiki, experts, other interesting ...
            
