+ I guess that I have the private key on my end device and the public key on my end point. Or whatever.
Maybe see:
https://cryptobook.nakov.com/cryptography-overview
-- Welcome - Practical Cryptography for developers
-- Cryptography -- Overview - " "
-- Secure random generators
-- Scrpyt
-- Bcrypt
-- MAC and Key Derivation
-- Digital Signatures
https://www.alibris.com/Introduction-to-Cryptography-with-Coding-Theory-Lawrence-C-Washington/book/3310484?matches=14
https://www.lynda.com/Vault-tutorials/Vault-cryptography/724796/789439-4.html
https://en.wikipedia.org/wiki/Public-key_cryptography
https://searchsecurity.techtarget.com/definition/asymmetric-cryptography
1Efficient and Secure Elliptic Curve Cryptography Implementation of Curve P-256
https://csrc.nist.gov/csrc/media/events/workshop-on-elliptic-curve-cryptography-standards/documents/papers/session6-adalier-mehmet.pdf
https://speakerdeck.com/mrinalwadhwa/just-enough-math-to-understand-elliptic-curve-cryptography
https://www.meetup.com/Cryptography-Meetup/
https://twitter.com/CryptographySF
https://www.w3.org/2012/webcrypto/
https://www.cryptologie.net/article/340/tls-pre-master-secrets-and-master-secrets/
( I have Master Secrets in my configuration. This sheds light on what they are.)
I found a book that puts a lot of what I was thinking together:
https://livebook.manning.com/book/real-world-cryptography
Thursday, June 18, 2020
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment