Ease Me Into Cryptography Part 4: TLS – Applied Cryptographic Foundations
You made it to part 4! Here’s a quick overview of what we have broken down so far. We started with some basic vocabulary for cryptographic building blocks and talked about hash functions in Part 1, were introduced to symmetric ciphers, keys, and leakage in Part 2, and dove into ... Read More
Ease Me Into Cryptography Part 3: Asymmetric Ciphers
Welcome to Part 3! A quick recap of where we’ve been. In Part 1: Buzzwords and Hash Function we talked about some foundational cryptography vocab and were introduced to hash functions, how they’re used, and some drawbacks. In Part 2: Symmetric Ciphers we upped the complexity a bit and discussed ... Read More
Ease Me Into Cryptography Part 2: Symmetric Ciphers
In the first article in this series on the basics of crypto, "Ease Me Into Cryptography Part 1: Buzzwords and Hash Function", we learned some lingo and talked about the different aspects of hash functions. Remember that hash functions are one-way — we cannot reverse them algorithmically. We talked about ... Read More
Ease Me Into Cryptography Part 1: Buzzwords and Hash Function
You know what it’s like being in security, and someone asks you what you do. Now imagine the responses when I tell people I do cryptography. And it’s not just outsiders. Even within a techie crowd, common responses range from “Ooof, that sounds complicated” to “I wouldn’t touch that with ... Read More

