Fundamentals of Cryptography

Credits Jon Camfield Last Updated 2024-07

This section contains advanced training modules for trainings of trainers and technical users.

The tools and practices of digital safety stands on top of a relatively small amount of core cryptographic concepts. Often in training on tools and practices, we treat the cryptography as magic that we just trust inherently, or use a metaphor and move on. For those who shoulder the responsibility of training others on digital safety, however, it is critical we make an effort to more deeply understand these concepts, and understand where our knowledge thins out and stops, so that we can be honest with ourselves and those we support when we get complex questions.

Resources

Using Asymmetric Encryption

This module explores asymmetric encryption, which is the cryptographic tool behind PGP, SSL/TLS, and much more.

Continue to Full Resource >>

Entropy and Password Security

Entropy is the measure of randomness, and it is exactly the randomness of passwords that gives them strength. Importantly, though, that does not have to come from impossible to remember jumbles of complex characters (though it certainly can!). This topic should help expose the nuance around password complexity conversations, as well as explain some of the weirder rough edges of security tools (like having to move your mouse around randomly to set up veracrypt drives).

Continue to Full Resource >>

Hashes in Everyday Life

Hashes help provide proof of integrity and knowledge across everything from credit card numbers to safe downloads to threat hunting to email signatures to community solidarity. This module walks through common uses and easy-to-use tools.

Continue to Full Resource >>