Cryptography
Mid-Section Review
Day 1
Binary, Bits, and Bytes
Bitwise Operators
Decimal to Binary
Rules:
---------------------------------------------------------------------------------�n ÷ 2 quotient remainder num�---------------------------------------------------------------------------------
97 ÷ 2 48 1 1
48 ÷ 2 24 0 01
24 ÷ 2 12 0 001
12 ÷ 2 6 0 0001
6 ÷ 2 3 0 00001
3 ÷ 2 1 1 100001
1 ÷ 2 0 (Stop) 1 1100001
Binary to Decimal
� �1 0 1 1
1 * 23 + 0 * 22 + 1 * 21 + 1 * 20
1 * 8 + 0 * 4 + 1 * 2 + 1 * 1
8 + 0 + 2 + 1
11
ASCII
Why does crypto matter?
Principles
Confidentiality, Integrity, Availability
When you’re protecting your data ask yourself if you have the following:
Kirckhoff’s Principles (SImplified)
Cryptography Uncreative Names
Encryption
Vocab
Attacking Ciphertexts
One Time Pad (OTP)
Day 2
Randomness
Two Time Pad
Symmetric Key Crypto
Meet at 7
Meet at 7
ax42xcv3i
Enc
Dec
plaintext
ciphertext
plaintext
AES - Advanced Encryption Standard
Block Cipher Mode of Operation
Message Authentication Codes (MACs)
Hash Functions