From 949db52c7321007b8345b269a2d27bcc7538b024 Mon Sep 17 00:00:00 2001 From: billbuchanan Date: Wed, 3 Feb 2021 07:10:46 +0000 Subject: [PATCH] Update --- .../lecture/~$chapter02_secret.pptx | Bin 165 -> 0 bytes z_assessments/test02/README.md | 126 ------------------ 2 files changed, 126 deletions(-) delete mode 100644 unit02_symmetric/lecture/~$chapter02_secret.pptx delete mode 100644 z_assessments/test02/README.md diff --git a/unit02_symmetric/lecture/~$chapter02_secret.pptx b/unit02_symmetric/lecture/~$chapter02_secret.pptx deleted file mode 100644 index b71c76f93b9c33be93191e10e68e27623122d97b..0000000000000000000000000000000000000000 GIT binary patch literal 0 HcmV?d00001 literal 165 zcmd;cDoxHv%uCGEQE - C \> openssl ec -in priv.pem -text -noout - read EC key - Private-Key (256 bit) - priv - 46 b9 e8 61 b6 3d 35 09 c8 8b 78 17 27 5a 30 - d2 2d 62 c8 cd 8f a6 48 6d de e3 5e f0 d8 e0 - 49 5f - pub - 04 25 00 e7 f3 fb dd f2 84 29 03 f5 44 dd c8 - 74 94 ce 95 02 9a ce 4e 25 7d 54 ba 77 f2 bc - 1f 3a 88 37 a9 46 1c 4f 1c 57 fe cc 49 97 53 - 38 1e 77 2a 12 8a 58 20 a9 24 a2 fa 05 16 2e - b6 62 98 7a 9f - ASN1 OID secp256k1 - - -## 9. Future Cryptography - -[9. Future Cryptography. Future cryptography, Zero-knowledge Proofs, Pedersen Commitments.] - -Learning Outlines: - -* Define the key attributes used to assess the quality of a light-weight encryption method. -* Idenity the operation of a simple Zero-knowledge Proof method. -* Understand how the Pedersen Commitment could be used in hidding the values of a transaction. - -Sample questions: - -* How do light-weight cryptography methods differ from traditional cryptography methods? -* What are key evaluators that are used to assess light-weight cryptography methods? -* Why would be stream encryption method be preferred to a block encryption method in light-weight cryptography? -* How is the Python yield keyword used in RC4 key stream generation [link]? -* Explain how the Fiat-Shamir method protects passwords. -* How does the Pedersen Commitment preserve privacy, and how are they used in cryptocurrency applications? -* How are Range Proofs used to preserve privacy, and how are they used in cryptocurrency applications? -* Bob the Chip Designer wants to use AES for the design of a new RFID tag, but Alice says he should use ChaCha20. Who is right? - -## 10. Tokenization, Authorization and Docker - -[10. Tokenization, Authorization and Docker] - -Learning Outlines: - -* Understand the strengths and weaknesses of using a range of tokens, including with OAuth 2.0, JWT and Fernet token. -* Understand how Docker could be used to setup a secure service (such as for SSH). - -Sample questions: - -* Define the basic security controls using within JWT. -* Bob the Developer says that JWT is the right way to create a Single Sign On (SSO) for the corportate infrastructure. Is this a good approach? Discuss possible strengths and weaknesses. -* Bob says that OAuth 2.0 is an excellent way to provide authentication into a corporate infrastructure. Is he correct? Justify your answer. -* Bob says that Docker is not a good approach for setting up an SSH server. In terms of configurability, what advantages would setting up an SSH server have with a Docker approach? -* What are the strengths of using Fernet tokens as apposed to JWT? [link] - -Remember to look at the labs for the units defined above, as there may be a related question