Skip to content

Commit 1b44e27

Browse files
committed
cryptography
1 parent a90d40f commit 1b44e27

File tree

3 files changed

+26
-7
lines changed

3 files changed

+26
-7
lines changed

brain.bigb

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -60,7 +60,7 @@ Likely implies <AGI>.
6060
{parent=Personal knowledge base software}
6161

6262
Lists:
63-
* https://www.bibsonomy.org/user/bshanks/education fantastic list, presumably by this guy:
63+
* https://www.bibsonomy.org/user/bshanks/education fantastic list, presumably by this guy:
6464
* https://www.reddit.com/r/Zettelkasten/comments/168cmca/which_note_taking_app_for_a_luhmann_zettlekasten/
6565

6666
<Personal knowledge base> recommendation threads:

cryptography.bigb

Lines changed: 21 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -24,21 +24,31 @@
2424
= Symmetric and public-key cryptography
2525
{parent=Cryptography}
2626

27-
= Symmetric-key algorithm
27+
= Symmetric encryption
2828
{parent=Symmetric and public-key cryptography}
29-
{wiki}
3029

31-
= Symmetric encryption
32-
{synonym}
30+
Symmetric encryption is a type of <encryption> where you use a password (also known as a "key") to encrypt your data, and then the same password to decrypt the data.
31+
32+
For example, this is the type of encryption that is used for encrypting the data in our <smartphones> and <laptops> with <disk encryption>.
33+
34+
This way, if your laptop gets stolen, the thief is not able to see your private photos without knowing your password, even though they are able to read every byte of your disk.
35+
36+
The downside is that that you have to type your password every time you want to login. This leads people to want to use shorter passwords, which in turn are more prone to <password cracking>.
37+
38+
The other main type of encryption is <public-key cryptography>.
39+
40+
The advantage of <public-key cryptography> is that it allows you to send secret messages to other people even if the attacker is able to capture the encrypted messages. This is for example what you want to do when sending a personal message to a special friend.
41+
42+
This is not possible with <symmetric encryption> because for your friend to decrypt the message in that system, you'd need to send them the password, which the attacker would also be able to eavesdrop and then decrypt the message.
3343

3444
= Provably secure symmetric-key algorithm
35-
{parent=Symmetric-key algorithm}
45+
{parent=Symmetric encryption}
3646
{wiki}
3747

3848
There aren't any 2020, except in the trivial <one-time pad> case where the key is as large as the message: https://crypto.stackexchange.com/questions/10815/how-do-we-prove-that-aes-des-etc-are-secure
3949

4050
= One-time pad
41-
{parent=Symmetric-key algorithm}
51+
{parent=Symmetric encryption}
4252
{wiki}
4353

4454
The only perfect cryptosystem!
@@ -47,6 +57,11 @@ The problem is that you need a shared <key (cryptography)> as large as the messa
4757

4858
Systems like <advanced Encryption Standard> allow us to encrypt things larger than the key, but the tradeoff is that they could be possibly broken, as don't have any <provably secure symmetric-key algorithms> as of 2020.
4959

60+
= Symmetric-key algorithm
61+
{parent=Symmetric encryption}
62+
63+
Symmetric-key algorithm is al algorithm implementing <symmetric encryption>.
64+
5065
= Advanced Encryption Standard
5166
{parent=Symmetric-key algorithm}
5267
{title2=AES}

software.bigb

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -529,6 +529,10 @@ So you are just better off with password logins and a decent <password manager>.
529529
{parent=Computer security}
530530
{wiki}
531531

532+
= Password cracking
533+
{parent=Password}
534+
{wiki}
535+
532536
= Password manager
533537
{parent=Password}
534538
{wiki}

0 commit comments

Comments
 (0)