SIGPwny
  • About
  • Meetings
  • Publications
  • Events
  • Sponsors
Pwny CTF
  • Users
  • Scoreboard
  • Challenges
    • Example Topic
    • Week 14: Intro to Networking
    • Week 11: Intro to OpSec
    • Week 10: Format String Vulnerabilities
    • Week 09: Intro to Forensics
    • Week 08: Intro to Cryptography
    • Week 07: Intro to Web
    • Week 06: Intro to Reverse Engineering
    • Week 04: Intro to PWN
    • Week 03: Intro to Unix and CLI
    • Week 01: Introduction
    • Week 11: Modern Binary Exploitation
    • Week 10: TF2 LAN Party
    • Week 06: Intro to Reverse Engineering (Part 2)
    • Week 05: Lockpicking
    • Week 04: Intro to Reverse Engineering (Part 1)
    • Week 03: CSAW CTF Qualifications 2017 Recap
    • Week 02: Intro to CTF
    • Week 01: Introduction
    • Week 08: Reverse Engineering (Part 2)
    • Week 07: Reverse Engineering (Part 1)
    • Week 05: Intro to OpSec
    • Week 04: Intro to Crypto
    • Week 03: Number Bases (Binary, Hexadecimal, Base64)
    • Week 03: Intro to CTF (Part 2)
    • Week 02: Intro to CTF (Part 1)
    • Week 01: Introduction
    • Week 20: Leave This Meeting for Testing Purposes!! This is an Extremely Long Title That Will Get Cut Off Eventually, At Least I Think

Intro to Cryptography

FA2018 Week 08

crypto
intro
Trevor Moyer,
Ian Klatzco
Thursday, October 25th, 2018
6 – 7 PM

Download slides

Meeting Summary

  • 3 key facets of crypto:
    • authenticity
    • integrity
    • availability
  • 2 sectors of crypto:
    • theoretical
    • practical
  • Asymmetric (public/private keys), symmetric (AES/DES)
  • Basic network protocols and why they are important
  • Basic math behind some of the main cryptographic schemes, such as RSA

Sitemap

About

Meetings

Publications

Events

Sponsors

Connect

Discord

GitHub

Instagram

Twitter

YouTube

© 2024 SIGPwny. ACM@UIUC is a 501(c)(3) non-profit organization. Site source on GitHub.