Cryptography is a complex and confusing subject. There seems to be more misinformation than actual information. Learn how to properly use cryptography to secure user credentials and sensitive data. We will discuss cryptographic methodologies and algorithms available to PHP. The focus will be on encryption, digital signatures, and hashing. We will discuss methodologies as part of a compare and contrast; based on cryptography strength and randomness.
18. @adam_englander
Stream ciphers use a cipher key
with a cryptographically secure
pseudorandom cipher digit
stream called a keystream to
product the cipher text.
50. @adam_englander
Diffie-Hellman Key
Exchange
The “Common Paint” is a random
number generated on the client and
encrypted with the public key from the
server. It is transmitted to the server and
decrypted using the private key. They
negotiate a shared secret and then
utilize symmetric key encryption with
that secret to communicate further.
86. @adam_englander
If you are writing a library, you
can use phpseclib/phpseclib as
an abstraction layer to
OpenSSL, MCrypt, or no crypto
extensions installed.