Skip to content

Instantly share code, notes, and snippets.

@zmanian
Last active February 26, 2017 00:16
Show Gist options
  • Star 1 You must be signed in to star a gist
  • Fork 0 You must be signed in to fork a gist
  • Save zmanian/1bf1ff0f765db05e6052 to your computer and use it in GitHub Desktop.
Save zmanian/1bf1ff0f765db05e6052 to your computer and use it in GitHub Desktop.
Crypto learning guide(DRAFT)

Encryption things to learn.

  1. Most encryption courses start with a simple XOR cipher like Dan Boneh's Coursea course and crypto pals.

  2. Learn about RSA

  • Learn why naked RSA will cause your family to be murdered in their sleep
    • Learn About signature forgery
    • Observe how RSA is crazy slow.
    • Learn about the solutions to this and see why RSA is practically impossible to use correctly
    • Learn about GPG
    • Learn about David Chaum's blind signatures
  1. Learn about Diffie Hellman shared secret agreement. It is like a cheat code for the universe

    • Learn about OTR messaging and openssh
  2. Learn about hash functions. Interesting hash functions: Sha2 & BLAKE2 & NORX

    • Learn the broken ones about md5 and sha1
    • Learn about Message Authentication Codes
    • Authenticated Data structure like Merkle Trees examples Bittorrent and Git
    • Learn about Bitcoin's Proof of Work
  3. Learn about block ciphers i.e AES

  4. Learn about streaming ciphers

    • The Broken one: RC4
    • Using a block cipher as streaming cypher and all the ways you can get your family murdered in their sleep.
    • The good one : chacha20
  5. Learn about Elliptic Curve Encryption or how to do Public keys without killing people.

  • Learn about Weierstrass curves
  • Learn about Dan Bernstein's curves. Curve 25519 and ed25519 and NaCL
  • Learn about curve arithmetic
  • Learn about EC Digital signatures and EC Diffie Heillman
  • Learn about the Axolotl protocol
  • Learn about Bitcoin
  1. Advanced Topics
  • Moderncrypto.org
  • Tor
  • Pond
  • Threshold Signatures
  • Curve parameter selections
  • Post Quantum Signature Schemes and impact of Quantum Computers on symmetric encryptions. Learn how Shore's algorithm is disastrous for asymmetric encryption. Lattice Crypto isn't very interesting yet.
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment