SlideShare a Scribd company logo
Шифрування даних
як спілкуватися з друзями так, щоб вашу
переписку було важко прочитати
@vixentael
@vixentael
займаюся
криптографією та
захистом даних
Безпека в реальному світі
Пташки Додо
Аліса Боб
Вони разом спілкуються
привіт
Аліса Боб
Приходить Єва
в неї великі вуха, вона гарно чує
Єва підслуховує
небезпека
привіт
ввімкнути радари!
але пташки ховаються —
Єва перестає їх чути
безпечне місце
нічого не чує 😭
(Не)безпека в реальному світі
проблема: Єва може почути секрети

рішення: сховайтесь/змініть місце
складніше,тому що часто ми
не можемо сховатись
Кібер-безпека
Спілкування в інтернеті
Месенжер Аліси Месенжер Боба
мій пароль: 123
Месенжер Аліси
Спілкування в інтернеті
Месенжер Боба
Єва —кібер-злочинець
Приходить Єва
мій пароль: 123
Єва перехоплює спілкування
{“пароль”:“123”}
мій пароль: 123
—це перетворення даних в інший
вигляд щоб зберегти їх в секреті
Шифрування
Дані
Тексти
Картинки
Відео / аудіо
28dhW108dh
шифрування розшифрування
мій пароль: 123 мій пароль: 123
Шифрування
Шифрування
28dhW108dhмій пароль: 123
ключ 🔑
Розшифрування
28dhW108dhмій пароль: 123
ключ 🔑
Де використовується шифрування?
Імейли (PGP)
Сайти (TLS)
Месенджери
всюди в інтернеті :)
Прості шифри
Прості (старі) шифри
Цезаря
Виженера
Лінійка Сен-Сира
Підстановка
Підстановка
Підстановка
Підстановка + зсув
зсув = 5
Підстановка + зсув
зсув = 5
Випадкова підстановка
Випадкова підстановка
Більш складні шифри
Сучасні шифри та криптосистеми
AES-256
ChaCha20
RSA / DSA
Месенджери
Які месенжери використовувати?
Signal
Telegram
Whatsapp
Wire
Вправи
Шифрування підстановкою
Шифрування випадковою підстановкою
Онлайн матеріали
https://3dnews.ru/916293
https://cryptii.com/
http://algolist.manual.ru/defence/intro.php
https://medium.com/@vixentael/how-to-start-
learning-cryptography-49e7d91b54a8
@vixentael
займаюся
криптографією та
захистом даних
бережіться!

More Related Content

More from NoNameCon

Bert Heitink - 10 major steps for Cybersecurity
Bert Heitink - 10 major steps for CybersecurityBert Heitink - 10 major steps for Cybersecurity
Bert Heitink - 10 major steps for Cybersecurity
NoNameCon
 
Ievgen Kulyk - Advanced reverse engineering techniques in unpacking
Ievgen Kulyk - Advanced reverse engineering techniques in unpackingIevgen Kulyk - Advanced reverse engineering techniques in unpacking
Ievgen Kulyk - Advanced reverse engineering techniques in unpacking
NoNameCon
 
Stanislav Kolenkin & Igor Khoroshchenko - Knock Knock: Security threats with ...
Stanislav Kolenkin & Igor Khoroshchenko - Knock Knock: Security threats with ...Stanislav Kolenkin & Igor Khoroshchenko - Knock Knock: Security threats with ...
Stanislav Kolenkin & Igor Khoroshchenko - Knock Knock: Security threats with ...
NoNameCon
 
Pavlo Zhavoronkov - What is autumn like in prison camps?
Pavlo Zhavoronkov - What is autumn like in prison camps?Pavlo Zhavoronkov - What is autumn like in prison camps?
Pavlo Zhavoronkov - What is autumn like in prison camps?
NoNameCon
 
Alexander Olenyev & Andrey Voloshin - Car Hacking: Yes, You can do that!
Alexander Olenyev & Andrey Voloshin - Car Hacking: Yes, You can do that!Alexander Olenyev & Andrey Voloshin - Car Hacking: Yes, You can do that!
Alexander Olenyev & Andrey Voloshin - Car Hacking: Yes, You can do that!
NoNameCon
 
Kostiantyn Korsun - State Cybersecurity vs. Cybersecurity of the State. #FRD ...
Kostiantyn Korsun - State Cybersecurity vs. Cybersecurity of the State. #FRD ...Kostiantyn Korsun - State Cybersecurity vs. Cybersecurity of the State. #FRD ...
Kostiantyn Korsun - State Cybersecurity vs. Cybersecurity of the State. #FRD ...
NoNameCon
 
Eugene Pilyankevich - Getting Secure Against Challenges Or Getting Security C...
Eugene Pilyankevich - Getting Secure Against Challenges Or Getting Security C...Eugene Pilyankevich - Getting Secure Against Challenges Or Getting Security C...
Eugene Pilyankevich - Getting Secure Against Challenges Or Getting Security C...
NoNameCon
 
Alexander Olenyev & Andrey Voloshin - Car Hacking 101 by NoNameCon
Alexander Olenyev & Andrey Voloshin - Car Hacking 101 by NoNameConAlexander Olenyev & Andrey Voloshin - Car Hacking 101 by NoNameCon
Alexander Olenyev & Andrey Voloshin - Car Hacking 101 by NoNameCon
NoNameCon
 
Stas Kolenkin & Taras Bobalo - CloudFlare Recon Workshop
Stas Kolenkin & Taras Bobalo - CloudFlare Recon WorkshopStas Kolenkin & Taras Bobalo - CloudFlare Recon Workshop
Stas Kolenkin & Taras Bobalo - CloudFlare Recon Workshop
NoNameCon
 
Serhii Korolenko - Passing Security By
Serhii Korolenko - Passing Security BySerhii Korolenko - Passing Security By
Serhii Korolenko - Passing Security By
NoNameCon
 
Serhii Aleynikov - Remote Forensics of a Linux Server Without Physical Access
Serhii Aleynikov - Remote Forensics of a Linux Server Without Physical AccessSerhii Aleynikov - Remote Forensics of a Linux Server Without Physical Access
Serhii Aleynikov - Remote Forensics of a Linux Server Without Physical Access
NoNameCon
 
Oleg Bondarenko - Threat Intelligence particularities world-wide. Real life u...
Oleg Bondarenko - Threat Intelligence particularities world-wide. Real life u...Oleg Bondarenko - Threat Intelligence particularities world-wide. Real life u...
Oleg Bondarenko - Threat Intelligence particularities world-wide. Real life u...
NoNameCon
 
Nazar Tymoshyk et al - Night in Defense Workshop: Hunting for a needle in a h...
Nazar Tymoshyk et al - Night in Defense Workshop: Hunting for a needle in a h...Nazar Tymoshyk et al - Night in Defense Workshop: Hunting for a needle in a h...
Nazar Tymoshyk et al - Night in Defense Workshop: Hunting for a needle in a h...
NoNameCon
 
Lukas Apa - Hacking Robots Before SkyNet
Lukas Apa - Hacking Robots Before SkyNet Lukas Apa - Hacking Robots Before SkyNet
Lukas Apa - Hacking Robots Before SkyNet
NoNameCon
 
Eugene Kulik & Pavel Kryvko - Executable Code Protection in ARM Systems
Eugene Kulik & Pavel Kryvko - Executable Code Protection in ARM SystemsEugene Kulik & Pavel Kryvko - Executable Code Protection in ARM Systems
Eugene Kulik & Pavel Kryvko - Executable Code Protection in ARM Systems
NoNameCon
 
Jeremiah O'Connor & David Maynor - Chasing the Crypto Workshop: Tracking Fina...
Jeremiah O'Connor & David Maynor - Chasing the Crypto Workshop: Tracking Fina...Jeremiah O'Connor & David Maynor - Chasing the Crypto Workshop: Tracking Fina...
Jeremiah O'Connor & David Maynor - Chasing the Crypto Workshop: Tracking Fina...
NoNameCon
 
Igor Andriushchenko - Tips and tricks for the efficient white-box security au...
Igor	Andriushchenko - Tips and tricks for the efficient white-box security au...Igor	Andriushchenko - Tips and tricks for the efficient white-box security au...
Igor Andriushchenko - Tips and tricks for the efficient white-box security au...
NoNameCon
 
Bert Heitink - Technical Insights for the SOC as Technical Centre for IT Secu...
Bert Heitink - Technical Insights for the SOC as Technical Centre for IT Secu...Bert Heitink - Technical Insights for the SOC as Technical Centre for IT Secu...
Bert Heitink - Technical Insights for the SOC as Technical Centre for IT Secu...
NoNameCon
 

More from NoNameCon (18)

Bert Heitink - 10 major steps for Cybersecurity
Bert Heitink - 10 major steps for CybersecurityBert Heitink - 10 major steps for Cybersecurity
Bert Heitink - 10 major steps for Cybersecurity
 
Ievgen Kulyk - Advanced reverse engineering techniques in unpacking
Ievgen Kulyk - Advanced reverse engineering techniques in unpackingIevgen Kulyk - Advanced reverse engineering techniques in unpacking
Ievgen Kulyk - Advanced reverse engineering techniques in unpacking
 
Stanislav Kolenkin & Igor Khoroshchenko - Knock Knock: Security threats with ...
Stanislav Kolenkin & Igor Khoroshchenko - Knock Knock: Security threats with ...Stanislav Kolenkin & Igor Khoroshchenko - Knock Knock: Security threats with ...
Stanislav Kolenkin & Igor Khoroshchenko - Knock Knock: Security threats with ...
 
Pavlo Zhavoronkov - What is autumn like in prison camps?
Pavlo Zhavoronkov - What is autumn like in prison camps?Pavlo Zhavoronkov - What is autumn like in prison camps?
Pavlo Zhavoronkov - What is autumn like in prison camps?
 
Alexander Olenyev & Andrey Voloshin - Car Hacking: Yes, You can do that!
Alexander Olenyev & Andrey Voloshin - Car Hacking: Yes, You can do that!Alexander Olenyev & Andrey Voloshin - Car Hacking: Yes, You can do that!
Alexander Olenyev & Andrey Voloshin - Car Hacking: Yes, You can do that!
 
Kostiantyn Korsun - State Cybersecurity vs. Cybersecurity of the State. #FRD ...
Kostiantyn Korsun - State Cybersecurity vs. Cybersecurity of the State. #FRD ...Kostiantyn Korsun - State Cybersecurity vs. Cybersecurity of the State. #FRD ...
Kostiantyn Korsun - State Cybersecurity vs. Cybersecurity of the State. #FRD ...
 
Eugene Pilyankevich - Getting Secure Against Challenges Or Getting Security C...
Eugene Pilyankevich - Getting Secure Against Challenges Or Getting Security C...Eugene Pilyankevich - Getting Secure Against Challenges Or Getting Security C...
Eugene Pilyankevich - Getting Secure Against Challenges Or Getting Security C...
 
Alexander Olenyev & Andrey Voloshin - Car Hacking 101 by NoNameCon
Alexander Olenyev & Andrey Voloshin - Car Hacking 101 by NoNameConAlexander Olenyev & Andrey Voloshin - Car Hacking 101 by NoNameCon
Alexander Olenyev & Andrey Voloshin - Car Hacking 101 by NoNameCon
 
Stas Kolenkin & Taras Bobalo - CloudFlare Recon Workshop
Stas Kolenkin & Taras Bobalo - CloudFlare Recon WorkshopStas Kolenkin & Taras Bobalo - CloudFlare Recon Workshop
Stas Kolenkin & Taras Bobalo - CloudFlare Recon Workshop
 
Serhii Korolenko - Passing Security By
Serhii Korolenko - Passing Security BySerhii Korolenko - Passing Security By
Serhii Korolenko - Passing Security By
 
Serhii Aleynikov - Remote Forensics of a Linux Server Without Physical Access
Serhii Aleynikov - Remote Forensics of a Linux Server Without Physical AccessSerhii Aleynikov - Remote Forensics of a Linux Server Without Physical Access
Serhii Aleynikov - Remote Forensics of a Linux Server Without Physical Access
 
Oleg Bondarenko - Threat Intelligence particularities world-wide. Real life u...
Oleg Bondarenko - Threat Intelligence particularities world-wide. Real life u...Oleg Bondarenko - Threat Intelligence particularities world-wide. Real life u...
Oleg Bondarenko - Threat Intelligence particularities world-wide. Real life u...
 
Nazar Tymoshyk et al - Night in Defense Workshop: Hunting for a needle in a h...
Nazar Tymoshyk et al - Night in Defense Workshop: Hunting for a needle in a h...Nazar Tymoshyk et al - Night in Defense Workshop: Hunting for a needle in a h...
Nazar Tymoshyk et al - Night in Defense Workshop: Hunting for a needle in a h...
 
Lukas Apa - Hacking Robots Before SkyNet
Lukas Apa - Hacking Robots Before SkyNet Lukas Apa - Hacking Robots Before SkyNet
Lukas Apa - Hacking Robots Before SkyNet
 
Eugene Kulik & Pavel Kryvko - Executable Code Protection in ARM Systems
Eugene Kulik & Pavel Kryvko - Executable Code Protection in ARM SystemsEugene Kulik & Pavel Kryvko - Executable Code Protection in ARM Systems
Eugene Kulik & Pavel Kryvko - Executable Code Protection in ARM Systems
 
Jeremiah O'Connor & David Maynor - Chasing the Crypto Workshop: Tracking Fina...
Jeremiah O'Connor & David Maynor - Chasing the Crypto Workshop: Tracking Fina...Jeremiah O'Connor & David Maynor - Chasing the Crypto Workshop: Tracking Fina...
Jeremiah O'Connor & David Maynor - Chasing the Crypto Workshop: Tracking Fina...
 
Igor Andriushchenko - Tips and tricks for the efficient white-box security au...
Igor	Andriushchenko - Tips and tricks for the efficient white-box security au...Igor	Andriushchenko - Tips and tricks for the efficient white-box security au...
Igor Andriushchenko - Tips and tricks for the efficient white-box security au...
 
Bert Heitink - Technical Insights for the SOC as Technical Centre for IT Secu...
Bert Heitink - Technical Insights for the SOC as Technical Centre for IT Secu...Bert Heitink - Technical Insights for the SOC as Technical Centre for IT Secu...
Bert Heitink - Technical Insights for the SOC as Technical Centre for IT Secu...
 

Anastasiia Vixentael – Encryption basics [NoName CyberKids]