Dive deep into encryption techniques used in TLS. Learn the differences between symmetric and asymmetric encryption, how they are applied in TLS, and when each should be used. Implement practical examples of these encryption methods.
Overview
Syllabus
- Unit 1: Introduction to Encryption
- Implement the Caesar Cipher
- Implement XOR Encryption
- Inspect AES Encryption
- Secure AES Key Derivation
- Verify Encryption and Decryption Methods
- Unit 2: Understanding Symmetric vs Asymmetric Encryption
- Convert Encrypted Data to Base64
- Decrypting Secure Messages using RSA
- Implement RSA Encryption and Decryption
- Generate an RSA Key Pair
- Unit 3: Practical Diffie-Hellman Key Exchange
- Verifying the Shared Secrets
- Compute Shared Secrets Securely
- Implementing Diffie-Hellman Key Exchange
- Implement Diffie-Hellman from Scratch
- Manually Calculating the Shared Secret
- Unit 4: Introduction to Elliptic Curve Cryptography
- Verify Shared ECDH Secret
- Completing ECDH Key Exchange
- Generating ECDH Key Pairs
- Secure ECDH Key Exchange
- ECDH Key Exchange from Scratch