Crypto 101 ( The basics of security )

jayssj11 (~hackertron)


33

Votes

Description:

This talk will literally cover the basics of cryptography . I will touch following topics ( in each topic i will explain what it is ? , what are it's implementation ? and how secure/unsecure it is )

XOR

One TIme Pad

Ciphers : block ciphers , stream ciphers

TLS

Diffiew-Hellman Key exchange

Authenticity

Cryptographic Hash Functions

Password Storage ( brute force , dictionary attacks , salts , bcrypt , scrypt )

Public Key Cryptography

Key Generation

Signing ( RSA , chains of signatures , GPG Key Signing )

Asymmetric encryption algorithms

Putting it all together: a high-level walk-through of TLS

Prerequisites:

No Prerequisites as i will start from very basics !! Most of the talk will be high-level talk with some background working of some topics .

This talk is aimed at programmers of any skill level that lack crypto knowledge.

Content URLs:

https://docs.google.com/presentation/d/12bjdGSbbyorzyubVaT3pq-lG9Hb3HeK9GVdl0z2kiH8/edit?usp=sharing

Speaker Info:

Dealing mostly with online security and web development. Networking is my second name. Fluent in PHP and Javascript; decent in C++ and Python . Interested in the art of cryptography and sub-related aspects (kleptography, cryptovirology).

Speaker Links:

WikiToLearn desktop client ( GSOC project for KDE ) : https://github.com/hackertron/W2L/

^^^ still in development ^^^^

https://www.wechall.net/profile/jayssj11

github.com/hackertron

https://www.hackthis.co.uk/articles/basics-of-intrusion-detection-systems

https://www.hackthis.co.uk/articles/hiding-files-with-s-tools

https://www.hackthis.co.uk/articles/how-to-create-your-own-tor-url

Section: Security
Type: Talks
Target Audience: Beginner
Last Updated:

Hi, Can you provide few code samples that you will be sharing, the description is too less to understand how the talk will be structured.

konark modi (~konark)

Hey , thanks for taking interest in my proposal .

About code samples : My talk targets beginners who might know how to code or might not . Considering this case i have tried to keep the code as minimal as possible but have focused a lot on LIVE DEMO's and EXAMPLES .

here is an example of how i will explain topics : (

this is just an example , i have not given full details here . In real talk it would be more graphical and interactive

)

XOR

  1. description

  2. a few properties of XOR

                       0 ⊕ 0=0        1 ⊕ 0=1
                       0 ⊕ 1=1        1 ⊕ 1=0
    
  3. Bitwise XOR : python provide ^ operator to perform bitwise XOR on integers. It does this by first expressing those two integers in binary , and then performing XOR on their respective bits. Hence the name, bitwise XOR.

                                73 ⊕ 87 = 0b1001001 ⊕ 0b1010111
    
                            1 0 0 1 0 0 1  (left)
                           = ⊕ ⊕ ⊕ ⊕ ⊕ ⊕ ⊕
                              1 0 1 0 1 1 1 (right)
                           = 0 0 1 1 1 1 0
                           = 0b0011110
                           = 30
    
  4. One-time pads : explanation of one time pads .

  5. Attacks on One time pads : reuse of same key , crib drabbing .

  6. Live example :

Plain text

cipher text

Reused key and XOR of ciphertext

How the talk will be structured : the talk will proceed in same way as i have provided in description

i will start with XOR ( explain what it is ? , implementation ? , attacks on it ) and will follow the below sequence

  1. XOR

  2. One TIme Pad

  3. Ciphers : block ciphers , stream ciphers

  4. TLS

  5. Diffiew-Hellman Key exchange

  6. Authenticity

  7. Cryptographic Hash Functions

  8. Password Storage ( brute force , dictionary attacks , salts , bcrypt , scrypt )

  9. Public Key Cryptography

  10. Key Generation

  11. Signing ( RSA , chains of signatures , GPG Key Signing )

jayssj11 (~hackertron)

Looking forward to this one

pypy

Your comment was informative . I am excited for your talk

clodubechu@thraml.com

Thank you so much for the comments and details, the content looks good. I would give the following suggestions: 1. Need to structure it better for a 40 minute slot. 2. Need to ensure the examples are showcased using Python libs.

konark modi (~konark)

Thank you so much for the comments and details, the content looks good. I would give the following suggestions: 1. Need to structure it better for a 40 minute slot. 2. Need to ensure the examples are showcased using Python libs.

  1. about structuring the talk for 40 Minutes . I have been doing practice/ rehearsels with my slides and most of the time the talk comes to an end in 35 min .

  2. about ensuring that examples are showcased using python libs : as I said in my abstract " This talk is aimed at programmers of any skill level that lack crypto knowledge. " I will surely show examples / live demo with python libs but some examples are best explained if they are simple .

P.S. i know the slides looks like those are too much , but trust me don't go on number of slides , they will be turned to next slides quickly .

P.S. I will add some examples with python libs in my slides :)

jayssj11 (~hackertron)

Login to add a new comment.