mirror of
https://github.com/billbuchanan/appliedcrypto.git
synced 2026-02-21 11:18:02 +00:00
Merge branch 'main' of https://github.com/billbuchanan/appliedcrypto
This commit is contained in:
@@ -1,4 +1,20 @@
|
||||

|
||||

|
||||
|
||||
In this lab, either catch-up on your labs, complete the AWS labs for cryptography or complete the mini-project.
|
||||
|
||||
# Unit 5a: AWS Labs for Cryptography
|
||||
There are a range of labs to complete using your AWS lab environment:
|
||||
|
||||
* Symmetric Key encryption. [Go](https://asecuritysite.com/aws/lab03). An additional lab to outline the usage of symmetric key encryption using KMS.
|
||||
* Public Key encryption (RSA). [Go](https://asecuritysite.com/aws/lab04). An additional lab to outline the usage of public key encryption using RSA, and in storing the key pair in KMS.
|
||||
* Public Key Signing (RSA). [Go](https://asecuritysite.com/aws/lab09). An additional lab to outline the usage of public key encryption using RSA, and in storing the key pair in KMS.
|
||||
* Public Key Signing (RSA) and OpenSSL. [Go](https://asecuritysite.com/aws/lab10). An additional lab to outline the usage of public key signing using RSA, and in storing the key pair in KMS.
|
||||
* Digital Signing with ECDSA. [Go](https://asecuritysite.com/aws/lab05). An additional lab to outline the usage of public key encryption in generating an ECDSA signature, and in storing the key pair in KMS.
|
||||
* HMAC. [Go](https://asecuritysite.com/aws/lab06). An additional lab to outline the usage of an HMAC signature, in KMS.
|
||||
* Secrets Manager. [Go](https://asecuritysite.com/aws/lab07). An additional lab to outline the usage of secrets manager in KMS.
|
||||
* Envelope encryption. [Go](https://asecuritysite.com/aws/lab08). An additional lab to outline the usage of envelope encryption in KMS.
|
||||
|
||||
|
||||
|
||||
# Unit 5a: Mini-project
|
||||
|
||||
|
||||
@@ -87,7 +87,8 @@ Key topics: Diffie-Hellman, Simple DH calculations, ECDH operation, Passing with
|
||||
* With Diffie-Hellman, G is 1579, and N is 7561. Bob selects 13 and Alice selects 14. Prove that the shared key is 868. [Ref: Key Exchange]
|
||||
* Eve says that she sees the values passed within ECDH by Bob and Alice, and that she can crack the key. By explaining the ECDH key exchange method, outline how it would likely to be difficult for Eve to determine the shared key.
|
||||
|
||||
### 5. Digital Ceritifcates
|
||||
### 5. Digital Certificates
|
||||
* For PKI, briefly outline how Alice knows that she is using the correct version of Bob's public key.
|
||||
* Understand the part that Trent plays in validating a certificate.
|
||||
|
||||
|
||||
|
||||
Reference in New Issue
Block a user