SlideShare a Scribd company logo
1 of 11
Download to read offline
E N C R Y P T I O N B A S I C S
E V E R Y O N E S H O U L D K N O W
F I R S T R U L E O F
C R Y P T O :
D O N ' T R O L L Y O U R
O W N C R Y P T O
2@NOTTRUPPI | @PAYDROPINC
B A D E X A M P L E S
• AT&T’s Clipper Chip
• BassOmatic
• Telegram’s MTProto
• Crown Sterling
@NOTTRUPPI | @PAYDROPINC 3
A D D I T I O N A L R U L E S
• Encryption is not the answer to security
• Cryptography is not easy
• Cryptography is not cheap
@NOTTRUPPI | @PAYDROPINC 4
T H E R E A L I T Y
• Algorithms will be broken
• The time from acceptance to deprecation is shrinking
• Be thoughtful how the cryptography is applied to your system
@NOTTRUPPI | @PAYDROPINC 5
E X T I N C T I O N
• RC2/RC4
• (X)DES
• SHA-1
• MD2/MD4/MD5
• RSA < 1024bits
• ECDSA - 160bits
• SSL
@NOTTRUPPI | @PAYDROPINC 6
A P P L I E D C R Y P T O G R A P H Y
• Encryption in transit (SSL, TLS)
• Encryption at rest
• Digital certificates
• Digital wallets
• Hashes (MD5, SHA)
• Seeds
• Sharding (Shamir’s Secret Sharing)
• Symmetric encryption (AES)
• Asymmetric encryption (ElGamal)
• Hybrid (symmetric & asymmetric)
• Public-key cryptography (Wallets, ECC)
• Algorithms
• Random number generation
• Multi-signature
• Multi-party computation
@NOTTRUPPI | @PAYDROPINC 7
T H E C R Y P T O O F C R Y P T O
• Random number generators
• Key ceremonies
• Hashing (BTC SHA-256)
• Digital signatures
• Multi-signature
• Multi-party computation
• Mix networks
@NOTTRUPPI | @PAYDROPINC 8
H O W T O R E D U C E R I S K
• All device encryption
• VPNs all the time
• Encrypted applications (messaging, voice)
• Multi-signature wallets
• Use applications compatible with TPM
• Physical hardware keys
@NOTTRUPPI | @PAYDROPINC 9
R E S O U R C E S
• Cryptocurrency Security Standard (CCSS)
• Digital Asset Custody Standard (DACS)
• NIST 800-175B
• NIST FIPS 140-2
• NIST 800-90A
@NOTTRUPPI | @PAYDROPINC 10
T H A N K YO U
JASON TRUPPI
@NotTruppi | @Paydropinc

More Related Content

Similar to Encryption Basics Everyone Should Know

detailed presentation on cryptography analysis
detailed presentation on cryptography analysisdetailed presentation on cryptography analysis
detailed presentation on cryptography analysis
BARATH800940
 
7-cryptography.pptfffffffffffffffffffffffffffffffffff
7-cryptography.pptfffffffffffffffffffffffffffffffffff7-cryptography.pptfffffffffffffffffffffffffffffffffff
7-cryptography.pptfffffffffffffffffffffffffffffffffff
maninthemirrorrror
 
HIS 2015: Tom Chothia - Formal Security of Critical Infrastructure
HIS 2015: Tom Chothia - Formal Security of Critical InfrastructureHIS 2015: Tom Chothia - Formal Security of Critical Infrastructure
HIS 2015: Tom Chothia - Formal Security of Critical Infrastructure
AdaCore
 

Similar to Encryption Basics Everyone Should Know (20)

Cryptography for Everyone
Cryptography for EveryoneCryptography for Everyone
Cryptography for Everyone
 
UNIT 4 CRYPTOGRAPHIC SYSTEMS.pptx
UNIT 4  CRYPTOGRAPHIC SYSTEMS.pptxUNIT 4  CRYPTOGRAPHIC SYSTEMS.pptx
UNIT 4 CRYPTOGRAPHIC SYSTEMS.pptx
 
Cryptography - An Overview
Cryptography - An OverviewCryptography - An Overview
Cryptography - An Overview
 
7-cryptography.ppt
7-cryptography.ppt7-cryptography.ppt
7-cryptography.ppt
 
7-cryptography.ppt
7-cryptography.ppt7-cryptography.ppt
7-cryptography.ppt
 
7-cryptography.ppt
7-cryptography.ppt7-cryptography.ppt
7-cryptography.ppt
 
RSA.ppt
RSA.pptRSA.ppt
RSA.ppt
 
the art of the fking dum crypto_basic.ppt
the art of the fking dum crypto_basic.pptthe art of the fking dum crypto_basic.ppt
the art of the fking dum crypto_basic.ppt
 
This is the presentation ofcryptography.ppt
This is the presentation ofcryptography.pptThis is the presentation ofcryptography.ppt
This is the presentation ofcryptography.ppt
 
7 cryptography
7 cryptography7 cryptography
7 cryptography
 
Crytography CertCourse Module 1 & 2.ppt
Crytography CertCourse Module 1 & 2.pptCrytography CertCourse Module 1 & 2.ppt
Crytography CertCourse Module 1 & 2.ppt
 
Best book for the cryptography doctor.ppt
Best book for the cryptography doctor.pptBest book for the cryptography doctor.ppt
Best book for the cryptography doctor.ppt
 
detailed presentation on cryptography analysis
detailed presentation on cryptography analysisdetailed presentation on cryptography analysis
detailed presentation on cryptography analysis
 
7-cryptography.pptfffffffffffffffffffffffffffffffffff
7-cryptography.pptfffffffffffffffffffffffffffffffffff7-cryptography.pptfffffffffffffffffffffffffffffffffff
7-cryptography.pptfffffffffffffffffffffffffffffffffff
 
HIS 2015: Tom Chothia - Formal Security of Critical Infrastructure
HIS 2015: Tom Chothia - Formal Security of Critical InfrastructureHIS 2015: Tom Chothia - Formal Security of Critical Infrastructure
HIS 2015: Tom Chothia - Formal Security of Critical Infrastructure
 
nabdullin_brcrdu_dark
nabdullin_brcrdu_darknabdullin_brcrdu_dark
nabdullin_brcrdu_dark
 
Cryptography, a science of secure writing
Cryptography, a science of secure writingCryptography, a science of secure writing
Cryptography, a science of secure writing
 
cryptography.ppt
cryptography.pptcryptography.ppt
cryptography.ppt
 
Santander Presentation - Global Digital Innovation
Santander Presentation - Global Digital InnovationSantander Presentation - Global Digital Innovation
Santander Presentation - Global Digital Innovation
 
Overview Of Cryptography
Overview Of CryptographyOverview Of Cryptography
Overview Of Cryptography
 

More from Jason Truppi

More from Jason Truppi (7)

Supporting The Future of the Decentralized Workforce
Supporting The Future of the Decentralized WorkforceSupporting The Future of the Decentralized Workforce
Supporting The Future of the Decentralized Workforce
 
State of Security - 2017
State of Security - 2017State of Security - 2017
State of Security - 2017
 
The Great Cryptographic Divide - Enigma 2018
The Great Cryptographic Divide - Enigma 2018The Great Cryptographic Divide - Enigma 2018
The Great Cryptographic Divide - Enigma 2018
 
FBI Crypto Investigations
FBI Crypto InvestigationsFBI Crypto Investigations
FBI Crypto Investigations
 
Timeline of crypto hacks and government actions
Timeline of crypto hacks and government actionsTimeline of crypto hacks and government actions
Timeline of crypto hacks and government actions
 
Modern Cryptographic Dissidence - B Sides PDX
Modern Cryptographic Dissidence - B Sides PDXModern Cryptographic Dissidence - B Sides PDX
Modern Cryptographic Dissidence - B Sides PDX
 
Illusions vs Reality - BSIDES SF
Illusions vs Reality - BSIDES SFIllusions vs Reality - BSIDES SF
Illusions vs Reality - BSIDES SF
 

Recently uploaded

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 

Recently uploaded (20)

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 

Encryption Basics Everyone Should Know

  • 1. E N C R Y P T I O N B A S I C S E V E R Y O N E S H O U L D K N O W
  • 2. F I R S T R U L E O F C R Y P T O : D O N ' T R O L L Y O U R O W N C R Y P T O 2@NOTTRUPPI | @PAYDROPINC
  • 3. B A D E X A M P L E S • AT&T’s Clipper Chip • BassOmatic • Telegram’s MTProto • Crown Sterling @NOTTRUPPI | @PAYDROPINC 3
  • 4. A D D I T I O N A L R U L E S • Encryption is not the answer to security • Cryptography is not easy • Cryptography is not cheap @NOTTRUPPI | @PAYDROPINC 4
  • 5. T H E R E A L I T Y • Algorithms will be broken • The time from acceptance to deprecation is shrinking • Be thoughtful how the cryptography is applied to your system @NOTTRUPPI | @PAYDROPINC 5
  • 6. E X T I N C T I O N • RC2/RC4 • (X)DES • SHA-1 • MD2/MD4/MD5 • RSA < 1024bits • ECDSA - 160bits • SSL @NOTTRUPPI | @PAYDROPINC 6
  • 7. A P P L I E D C R Y P T O G R A P H Y • Encryption in transit (SSL, TLS) • Encryption at rest • Digital certificates • Digital wallets • Hashes (MD5, SHA) • Seeds • Sharding (Shamir’s Secret Sharing) • Symmetric encryption (AES) • Asymmetric encryption (ElGamal) • Hybrid (symmetric & asymmetric) • Public-key cryptography (Wallets, ECC) • Algorithms • Random number generation • Multi-signature • Multi-party computation @NOTTRUPPI | @PAYDROPINC 7
  • 8. T H E C R Y P T O O F C R Y P T O • Random number generators • Key ceremonies • Hashing (BTC SHA-256) • Digital signatures • Multi-signature • Multi-party computation • Mix networks @NOTTRUPPI | @PAYDROPINC 8
  • 9. H O W T O R E D U C E R I S K • All device encryption • VPNs all the time • Encrypted applications (messaging, voice) • Multi-signature wallets • Use applications compatible with TPM • Physical hardware keys @NOTTRUPPI | @PAYDROPINC 9
  • 10. R E S O U R C E S • Cryptocurrency Security Standard (CCSS) • Digital Asset Custody Standard (DACS) • NIST 800-175B • NIST FIPS 140-2 • NIST 800-90A @NOTTRUPPI | @PAYDROPINC 10
  • 11. T H A N K YO U JASON TRUPPI @NotTruppi | @Paydropinc