Unit 3: Cryptography 3.2 Additional Resources Additional Resources

mac2022-06-30  22

Additional Resources

Kerckhoff's Principle

Kerckhoffs's principle, Wikipedia

Encryption

This video explains how the RSA public key and private key are created to be fully dependent on each other. The first part of the video explains the concepts with paint and colors. The second part contains heavy duty math, which may not be as easily understood:

Public Key Cryptography: RSA Encryption Algorithm (video), Art of the Problem (16:30)

Watching this video may help you understand the XOR Activity in Section 3.3.

Heartbleed

These links detail the Heartbleed bug from 2014. This vulnerability shows that even though data is protected both in transit and at rest with encryption, data that is being processed is not protected. The encrypted data needs to be decrypted before it’s processed, and therefore is vulnerable at this stage.

Heartbleed, Wikipedia

Heartbleed Explanation, xkcd

Heartbleed, xkcd

What should you do about “HeartBleed?,” LegacyTalk

About the browser's trusted root certificate store

Who your browser trusts, and how to control it., CertSimple

转载于:https://www.cnblogs.com/sec875/articles/10321346.html

相关资源:JAVA上百实例源码以及开源项目
最新回复(0)