Cryptography

boru 14th May 2019 at 10:10am
Public Public-TOC Security TableOfContents

Key Exchange

  • Encrypted Key Exchange (EKE)
  • Secure Shell (SSH)
    • The SSH, based on Diffie-Hellman, uses aspects of symmetric and asymmetric cryptography to solve the problem of client-server authentication
  • Transport Layer Security (TLS)

Authentication

tbd (certificate type)

Confidentiality

Ciphers

PRNG

Integrity

Resources

Courses

Challanges

Get Shit Done v2

Some random thoughts.