PodParley PodParley
EP47 - AskDeveloper Podcast - Cryptography - Part 2 - Encryption

EPISODE · Oct 16, 2016 · 1H 9M

EP47 - AskDeveloper Podcast - Cryptography - Part 2 - Encryption

from AskDeveloper Podcast · host Mohamed Elsherif

الحلقة السابقة https://soundcloud.com/askdeveloper/ep46-askdeveloper-podcast-cryptography-part-1-introduction-and-hashing ○ Encryption (Two Ways) § Symmetric Encryption □ Same key both encrypts and decrypts the data. □ Very fast, yet exchanging key is tricky □ Very Algorithmic □ Examples ® DES Data Encryption Standard (BROKEN) ◊ Uses key of 56 bit length ® Triple DES (3DES) ◊ Uses three keys (or two unique keys) of 56 bit each ® AES Advanced Encryption Standard ◊ Uses keys of 128, 192 or 256 bits long □ Attacks ® Brute force ◊ Usually mitigated via increasing key length, as difficulty increases exponentially as key size increases, for example time to crack given a modern super computer. Key Size Time To Crack 56 bits 399 seconds 128 bits 1.02 * 1018 years 192 bits 1.87 * 1037 years 256 bits 3.31 * 1056 years ◊ Side-Channel Attacks § Asymmetric Encryption □ Key pairs have mathematical relationship □ Each one can decrypt messages encrypted by the other. □ Slow, but exchanging key is trivial □ Very Mathematical □ Anyone can know the Public Key ® The Public key can only be used to encrypt data □ The Private key is kept secret, and never leaves the recipient's side. ® The Private key can only be used to decrypt data □ Examples ® RSA (Rivest, Shamir and Adelman) ® The de-facto standard in the industry ® Public and Private keys are based on large Prime Numbers § Hybrid Encryption □ Uses both Symmetric and Asymmetric encryption at the same time. □ Goals: ® Use the performance of Symmetric Crypto ® Convenience of sharing keys using Asymmetric Crypto ® HMAC for authentication. □ Steps: (Order is very important) ® Party 1 (Alice) 1. Generates a random AES Session Key (32 bytes / 256 bits) 2. Generates a random Initialization Vector (IV) (16 bytes / 128 bits) 3. Encrypt the message to be sent using the AES Session Key & IV 4. Calculate an HMAC of the encrypted message using the AES Session key 5. Encrypt the AES Session Key using the Public Key of Party 2 (Bob) The recipient. 6. Sends a packet of (Encrypted Message, Encrypted Session Key, Initialization Vector, and HMAC) to Bob ® Party 2 (Bob) 1. Decrypts Session key using his Private Key 2. Recalculates the HMAC of the encrypted message (Validates message integrity) } If HMAC check pass – Decrypts the message using the decrypted AES Session Key and Initialization Vector } Otherwise, rejects the message because of integrity check failure. Our facebook Page http://facebook.com/askdeveloper On Sound Cloud http://soundcloud.com/askdeveloper Please Like & Subscribe

NOW PLAYING

EP47 - AskDeveloper Podcast - Cryptography - Part 2 - Encryption

0:00 1:09:10
Play in mini player Transcript not yet generated

No transcript for this episode yet

We transcribe on demand. Request one and we'll notify you when it's ready — usually under 10 minutes.

Locked On Spartans - Daily Podcast On Michigan State Spartans Football & Basketball Locked On Podcast Network, Matt Sheehan Locked On Spartans podcast is the daily podcast that keeps you ahead of the games and the first to know the latest news, analysis, and insider info for the Michigan State Spartans. Hosted by Matt Sheehan, the Locked On Spartans podcast provides your daily Michigan State Spartans fix with expert opinions, film reviews, interviews with athletes and coaches, recaps, local analysis, and coverage of all things Sparty. From the legendary gridiron battles at Spartan Stadium to the dazzling skills on display at the iconic Breslin Center, and everywhere in between, the Locked On Spartans podcast takes you beyond the headlines for the inside scoops from the biggest stories inside the Spartans’ locker room and the Big 10. The Locked On Spartans podcast is part of the Locked On Podcast Network. Your Team. Every Day. Water Margin Podcast: Outlaws of the Marsh John Zhu A Chinese classic, retold in English: This podcast is an English retelling of the classic Chinese novel Water Margin (水浒传, aka Outlaws of the Marsh). It aims to tell the story in a way that is more accessible to audiences who are not already familiar with the novel or Chinese culture and literature in general. Reasonably Happy with Paul Ollinger Paul Ollinger Reasonably Happy is a podcast hosted by comedian and former tech executive Paul Ollinger who explores the intersection of money, meaning, and happiness through candid conversations with authors, thinkers, and creatives. With wit and depth, each episode offers insights into how we can lead more fulfilling lives—without chasing perfection. words.paulollinger.com Argentina Project podcast Wilson Center The Argentina Project Podcast is led by host Benjamin Gedan, the Latin American Program’s Deputy Director and former South America Director on the National Security Council at the White House. Each episode features dialogue and exchange with leading experts on Argentine affairs, posing pivotal questions while analyzing the country’s present and future.
URL copied to clipboard!