EH-Net - Daw - Ease Me Into Cryptography Part 4: TLS

Ease Me Into Cryptography Part 4: TLS – Applied Cryptographic Foundations

You made it to part 4! Here’s a quick overview of what we have broken down so far. We started with some basic vocabulary for cryptographic building blocks and talked about hash functions in Part 1, were introduced to symmetric ciphers, keys, and leakage in Part 2, and dove into ... Read More
EH-Net - Daw - Ease Me Into Cryptography Part 3: Asymmetric Ciphers - Asymmetric Cyphers

Ease Me Into Cryptography Part 3: Asymmetric Ciphers

| | /root, cipher, Crypto, daw, highlight, python, Tutorial
Welcome to Part 3! A quick recap of where we’ve been. In Part 1: Buzzwords and Hash Function we talked about some foundational cryptography vocab and were introduced to hash functions, how they’re used, and some drawbacks. In Part 2: Symmetric Ciphers we upped the complexity a bit and discussed ... Read More
EH-Net - Daw - Ease Me Into Cryptography Part 2: Symmetric Ciphers - Symmetric Cyphers

Ease Me Into Cryptography Part 2: Symmetric Ciphers

| | /root, cipher, Crypto, daw, highlight, python, Tutorial
In the first article in this series on the basics of crypto, "Ease Me Into Cryptography Part 1: Buzzwords and Hash Function", we learned some lingo and talked about the different aspects of hash functions. Remember that hash functions are one-way — we cannot reverse them algorithmically. We talked about ... Read More
EH-Net - Daw - Ease Me Into Cryptography Part 1 - 1 Bite at a Time

Ease Me Into Cryptography Part 1: Buzzwords and Hash Function

| | /root, Crypto, hash, highlight, python
You know what it’s like being in security, and someone asks you what you do. Now imagine the responses when I tell people I do cryptography. And it’s not just outsiders. Even within a techie crowd, common responses range from “Ooof, that sounds complicated” to “I wouldn’t touch that with ... Read More