#34: Cryptography Basics

The first part of a series looking at cryptography and how it’s used. This week Kris is focusing on cryptographic hash algorithms and public key encryption, two technologies that power virtually every aspect of digital security.

 

Show Notes

Is Security by Obscurity a Valid Approach?
Luhn Algorithm
Definitions, Implications, and Separations for Preimage Resistance, Second-Preimage Resistance, and Collision Resistance (pdf)
SHAttered attack on SHA1
The First Collision for Full SHA-1 (pdf)
A Stick Figure Guide to the Advanced Encryption Standard
Diffie and Hellman’s New Directions in Cryptography (1976, pdf)

Leave a Reply

Your email address will not be published. Required fields are marked *