exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

crypto-tutorial.txt

crypto-tutorial.txt
Posted Dec 21, 1999

crypto-tutorial.txt - Crypto tutorial in text format.

tags | encryption, cryptography
SHA-256 | a4c9e2f6984035225fd808e6294ca740ad8897494d6ffdbd7d0131d7c41be802

crypto-tutorial.txt

Change Mirror Download
Overview
This page contains my godzilla crypto tutorial, totalling 509 slides in 8 parts,
of which the first 7 are the tutorial itself and the 8th is extra material which
covers crypto politics. Part 8 isn't officially part of the technical tutorial
itself.
The tutorial is done at a reasonably high level, there are about two dozen books
which cover things like DES encryption done at the bit-flipping level so I
haven't bothered going down to this level. Instead I cover encryption protocols,
weaknesses, applications, and other crypto security-related information. Since
the slides are accompanying material for a proper tutorial, there's a lot of
extra context which isn't available just by reading the slides. Bear in mind
that some of the claims and comments on the slides need to be taken in the
context of the full tutorial.
Accompanying the slides are about 150 images, unfortunately I can't make these
available for copyright reasons.
The Tutorial
The tutorial is formatted so that two slides fit one page, which means you'll
burn out about 260 pages of paper printing them all out (half that if you print
double-sided). To view the tutorial you'll need a copy of the free Adobe Acrobat
reader software. Note that most of the diagrams (and there are quite a few of
them) will look a lot better on paper than on screen. The gv viewer (a
replacement for ghostview) displays the slides better than the Acrobat viewer,
especially with antialiasing enabled.
The output was generated from Powerpoint slides, unfortunately Powerpoint
converts the text colours of embedded tables into a very hard-to-read light
grey, ignoring the actual text colouring set for the table. There doesn't appear
to be any way to fix this problem.
The technical material consists of 7 parts:
Part1, 66 slides: Security threats and requirements, services and mechanisms,
historical ciphers, cipher machines, stream ciphers, RC4, block ciphers, DES,
breaking DES, brute-force attacks, other block ciphers (triple DES, RC2, IDEA,
Blowfish, CAST-128, Skipjack, GOST, AES), block cipher encryption modes,
public-key encryption (RSA, DH, Elgamal, DSA), elliptic curve algorithms, hash
and MAC algorithms (MD2, MD4, MD5, SHA-1, RIPEMD-160, the HMAC's).
Part2, 104 slides: Key management, key distribution, the certification process,
X.500 and X.500 naming, certification heirarchies, X.500 directories and LDAP,
the PGP web of trust, certificate revocation, X.509 certificate structure and
extensions, certificate profiles, setting up and running a CA, CA policies,
RA's, timestamping, PGP certificates, SPKI, digital signature legislation.
Part3, 96 slides: IPSEC, ISAKMP, Oakley, Photuris, SKIP, ISAKMP/Oakley, SSL,
non-US strong SSL, SGC, TLS, S-HTTP, SSH, SNMP security, email security
mechanisms, PEM, the PEM CA model, PGP, PGP keys and the PGP trust model, MOSS,
PGP/MIME, S/MIME and CMS, MSP.
Part4, 55 slides: User authentiction, Unix password encryption, LANMAN and NT
domain authentication and how to break it, Netware 3.x and 4.x authentication,
Kerberos 4 and 5, Kerberos-like systems (KryptoKnight, SESAME, DCE),
authentication tokens, SecurID, S/Key, OPIE, PPP PAP/CHAP, PAP variants (SPAP,
ARAP, MSCHAP), RADIUS, TACACS/XTACACS/TACACS+, ANSI X9.26, FIPS 196, biometrics,
PAM.
Part 5, 27 slides: Electronic payment mechanisms, Internet transactions, payment
systems (Netcash, Cybercash, book entry systems in general), Digicash, SET, the
SET CA model.
Part 6, 44 slides: Why security is hard to get right, buffer overflows,
protecting data in memory, storage sanitisation, data recovery techniques,
random number generation, TEMPEST, snake oil crypto, selling security.
Part 7, 54 slides: Smart cards, smart card file structures, card commands,
electronic purse standards, attacks on smart cards, voice encryption, GSM
security and how to break it, traffic analysis, anonymity, mixes, onion routing,
mixmaster, crowds, steganography, watermarking, misc. crypto applications
(hashcash, PGP Moose).
Here endeth the technical material. The final part goes into crypto politics.
Part 8, 63 slides: History of crypto politics, digital telephony, Clipper,
Fortezza and Skipjack, post-Clipper crypto politics, US export controls, effects
of export controls, legal challenges, French and Russian controls, non-US
controls (Wassenaar), Menwith Hill, Echelon, blind signal demodulation, Echelon
and export controls, Cloud Cover, UK DTI proposals, various GAK issues.
Login or Register to add favorites

File Archive:

September 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    261 Files
  • 2
    Sep 2nd
    17 Files
  • 3
    Sep 3rd
    38 Files
  • 4
    Sep 4th
    52 Files
  • 5
    Sep 5th
    23 Files
  • 6
    Sep 6th
    27 Files
  • 7
    Sep 7th
    0 Files
  • 8
    Sep 8th
    1 Files
  • 9
    Sep 9th
    16 Files
  • 10
    Sep 10th
    38 Files
  • 11
    Sep 11th
    21 Files
  • 12
    Sep 12th
    40 Files
  • 13
    Sep 13th
    18 Files
  • 14
    Sep 14th
    0 Files
  • 15
    Sep 15th
    0 Files
  • 16
    Sep 16th
    21 Files
  • 17
    Sep 17th
    51 Files
  • 18
    Sep 18th
    23 Files
  • 19
    Sep 19th
    48 Files
  • 20
    Sep 20th
    36 Files
  • 21
    Sep 21st
    0 Files
  • 22
    Sep 22nd
    0 Files
  • 23
    Sep 23rd
    0 Files
  • 24
    Sep 24th
    0 Files
  • 25
    Sep 25th
    0 Files
  • 26
    Sep 26th
    0 Files
  • 27
    Sep 27th
    0 Files
  • 28
    Sep 28th
    0 Files
  • 29
    Sep 29th
    0 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close