1 of 11

CryptoCrashCourse

CHRIS PETERSON

2 of 11

Overview

3 of 11

Pigpen Cipher

4 of 11

Encryption Types

5 of 11

Symmetric Encryption (Private Key)

  • A single key used for both encryption and decryption
  • AES & ChaCha are the most widely used symmetric encryption algorithms
  • Very easy to perform
  • Any downsides?

6 of 11

Types of Symmetric Encryption

Stream Cipher (ChaCHa)

  • Byte by byte encryption
  • Tends to be used for fast transfer data like a YouTube video or a zoom call.

Block Cipher (AES)

  • Encryption of blocks of data
  • Tends to be used for encrypting blocks of text.

7 of 11

Asymmetric Encryption (Public Key)

  • Two keys used during asymmetric encryption
  • RSA (Rivest, Shamir, Adleman) most widely used AES algorithm
  • More keys increases your level of protection but your encryption security doesn’t increase.
  • Any downsides?

8 of 11

Diffie-Hellman Key Exchange

  • Yellow = agreed upon variables (g,p)
  • Secret Colors = generating private keys
  • Public Transport = public key generation & key swap
  • Secret Colors Pt. 2 = combining public keys with private keys

9 of 11

Mode of Operations

10 of 11

Certificates

  • Verified information for the domain you’re trying to reach
  • Allow you to setup a secure connection by grabbing the public key (SSL/TLS)
  • These certificates allow us to use HTTPS vs HTTP when browsing

11 of 11

Keep Learning