TE
TechEcho
Home24h TopNewestBestAskShowJobs
GitHubTwitter
Home

TechEcho

A tech news platform built with Next.js, providing global tech news and discussions.

GitHubTwitter

Home

HomeNewestBestAskShowJobs

Resources

HackerNews APIOriginal HackerNewsNext.js

© 2025 TechEcho. All rights reserved.

Crypto 101 – Introductory course on cryptography

919 pointsby zerognowlover 8 years ago

26 comments

eponeponeponover 8 years ago
This is about to eat my weekend, I think! :)<p>Quite seriously, this is exactly what the tech world needs - personally, I know that in terms of understanding of crypto I&#x27;m streets ahead of the average Joe, but orders of magnitude behind people who <i>actually</i> know the field. I&#x27;m certain I&#x27;m far from alone in that set, but the way the world&#x27;s going means that we with the generalised technical know-how have a moral impetus to bring the rest of the world up to speed with the whys and wherefores.
评论 #13091891 未加载
评论 #13091930 未加载
评论 #13095944 未加载
评论 #13093789 未加载
评论 #13095945 未加载
PeterisPover 8 years ago
The old Cryptopals challenges (<a href="http:&#x2F;&#x2F;cryptopals.com&#x2F;" rel="nofollow">http:&#x2F;&#x2F;cryptopals.com&#x2F;</a>) seem to cover the same material in a pedagogically very different way - they don&#x27;t feed you the information as this book does, but give you a practical task which can be easily done with e.g. reading the specification of an algorithm from wikipedia, but figuring out the implementation of the attack yourself gives a much better understanding than simply reading about it.<p>Although this book claims a &quot;Learn by doing&quot; approach, I didn&#x27;t find any specific assignments or data samples to facilitate that.
评论 #13093756 未加载
stcredzeroover 8 years ago
When I was taking Aikido, there was a day when the sensei was going through all of our techniques and showed how the <i>uke</i> (initiator of the attack, receiver of the technique) could turn things around on the <i>tori</i>. (receiver of the attack, initiator of the technique) It seemed like there were a half dozen ways each that a technique could go seriously wrong, and that many of them didn&#x27;t require much skill, only determination and the opportunity provided by a mistake. That day made me question the validity of the entire notion of self defense.<p>I wonder if there shouldn&#x27;t be a software engineering class where people try to set up a secure web app, with their own homegrown algorithms and protocols, which is then attacked by a tiger team which includes a conspirator on the inside? Perhaps there are such classes now.
评论 #13092963 未加载
评论 #13090525 未加载
评论 #13091200 未加载
评论 #13090727 未加载
评论 #13092256 未加载
评论 #13090741 未加载
评论 #13091278 未加载
评论 #13090460 未加载
评论 #13090742 未加载
TrinaryWorksTooover 8 years ago
With everything in Crypto I have to wonder: Is the information correct? I really have no way of verifying if I&#x27;m learning the correct DHE, and I know that it&#x27;s easy to get wrong. Perhaps I can do some testing in code, but I may test it incorrectly too, and those small errors can be exploited.
评论 #13091557 未加载
评论 #13090517 未加载
评论 #13090242 未加载
评论 #13090561 未加载
评论 #13091524 未加载
kanzureover 8 years ago
Also here is is a Dan Boneh cryptography playlist <a href="https:&#x2F;&#x2F;www.youtube.com&#x2F;playlist?list=PL9oqNDMzcMClAPkwrn5dm7IndYjjWiSYJ" rel="nofollow">https:&#x2F;&#x2F;www.youtube.com&#x2F;playlist?list=PL9oqNDMzcMClAPkwrn5dm...</a>
评论 #13090254 未加载
steamer25over 8 years ago
Applied Cryptography is also one of the free advanced courses on Udacity:<p><a href="https:&#x2F;&#x2F;www.udacity.com&#x2F;course&#x2F;applied-cryptography--cs387" rel="nofollow">https:&#x2F;&#x2F;www.udacity.com&#x2F;course&#x2F;applied-cryptography--cs387</a>
theschwaover 8 years ago
There seems to be a lot of comments asking about the quality of this piece. I read through this the last time it was posted to HN, and I just have to say that this is the <i>perfect</i> balance of having enough detail to understand how things work, but not so much that it&#x27;s overwhelming. That&#x27;s a really difficult balance when it comes to crypto, so major props to the author. Fantastic work.
lhnzover 8 years ago
Whenever I have taken the small amount of cryptography knowledge I already have and tried to use it in a project, I&#x27;ve often been shutdown with &quot;the system already does that&quot; when it doesn&#x27;t, or &quot;this will be too complicated for the user, instead lets just roll our own [ad-hoc cryptography method]&quot;.<p>For those reading:<p>How do you convince people that it&#x27;s worth using best practices?<p>Is there a good heuristic to measure the value of something, when deciding how much time and money to spend on securing it?<p>What are good library&#x2F;SaaS solutions to help build secure applications with less chance of shooting yourself in the foot, better UX and lower cost? (Keybase, etc.)
评论 #13092077 未加载
sambeover 8 years ago
The video claims that the Python standard library doesn&#x27;t check certificates by default. In fact, it has done for at least a couple of years ([0] quotes the documentation as saying that it changed two years ago - in 2.7.9 and 3.4.3).<p>Although the video is marked 2015, the overlay at the start shows it&#x27;s from PyCon 2013.<p>[0]: <a href="http:&#x2F;&#x2F;stackoverflow.com&#x2F;a&#x2F;28325763&#x2F;2492" rel="nofollow">http:&#x2F;&#x2F;stackoverflow.com&#x2F;a&#x2F;28325763&#x2F;2492</a>
Raed667over 8 years ago
I&#x27;m really disappointed that (9.4) Elliptic curve cryptography is still under TODO.<p>If anyone is interested in ECC, ars has a pretty good introduction [0].<p>[0] : <a href="http:&#x2F;&#x2F;arstechnica.com&#x2F;security&#x2F;2013&#x2F;10&#x2F;a-relatively-easy-to-understand-primer-on-elliptic-curve-cryptography&#x2F;" rel="nofollow">http:&#x2F;&#x2F;arstechnica.com&#x2F;security&#x2F;2013&#x2F;10&#x2F;a-relatively-easy-to...</a>
评论 #13091410 未加载
gespadasover 8 years ago
Suggestion: Add some notification medium for when the book is ready.
评论 #13090162 未加载
LaurensBERover 8 years ago
I checked the PDF and this looks very interesting and comprehensive, any change you could give an eta for the final release and more specific the epub release?<p>Thanks!
评论 #13092540 未加载
CameronBangaover 8 years ago
Quick question, I had apparently Pinboarded this in March 2014. I see the PDF is still pre-release. Has anything changed with this, or is it kinda just coming up again because of recent political climate.<p>I&#x27;m fine either way, just curious if this has changed drastically from what I had looked at previously.
评论 #13091120 未加载
评论 #13091610 未加载
zappo2938over 8 years ago
For idiots like myself, I found this video, Public key cryptography - Diffie-Hellman Key Exchange (full version), to be completely enlightening using mixed colors to explain the most basic features of a cryptography algorithm.[0]<p>[0] <a href="https:&#x2F;&#x2F;www.youtube.com&#x2F;watch?v=YEBfamv-_do" rel="nofollow">https:&#x2F;&#x2F;www.youtube.com&#x2F;watch?v=YEBfamv-_do</a>
bogomipzover 8 years ago
For anyone interested I found this to be a good book on working through some cryto implementations in Go:<p><a href="https:&#x2F;&#x2F;leanpub.com&#x2F;gocrypto" rel="nofollow">https:&#x2F;&#x2F;leanpub.com&#x2F;gocrypto</a><p>Its free to read online but its also very reasonably priced. Its written by an engineer over at Cloudflare.
bogomipzover 8 years ago
This is great! Kudos to the author and thanks Rackspace for sponsoring this as well.<p>It&#x27;s really encouraging to see this increased democratization of crypto not necessarily in the engineering of it per se but rather the awareness and understanding of it.
chetanahujaover 8 years ago
I put this pdf on my phone and read through interesting sections over a vacation involving long flights. It&#x27;s a very nicely written text that you can read over a few days with some basic computer-science&#x2F;mathematical background.
southphillymanover 8 years ago
Thanks for this my guy! Maybe I&#x27;m telling on myself here, but I get the impression that your average developer doesn&#x27;t know much about security outside of the basic (sql injection&#x2F;cross site scripting)
qwertyuiop924over 8 years ago
Can any crypto people here on HN verify that this gets it right?
评论 #13090906 未加载
评论 #13092163 未加载
评论 #13091415 未加载
评论 #13091586 未加载
mrcactu5over 8 years ago
cryptography textbooks get very difficult. I get lost in a sea of hashes and the prime number theorem
cponeillover 8 years ago
I downloaded this about a year ago and loved it. Incredibly informative. Is this an updated version?
评论 #13095385 未加载
truth_sentinellover 8 years ago
Why is the url a hash? Also I&#x27;m getting privacy error on chrome mobile.<p>Thanks for this, seems pretty useful.
评论 #13092289 未加载
paulddraperover 8 years ago
Looks interesting, but I can&#x27;t open it with Adobe Reader on my Android.
Dowwieover 8 years ago
good work, lvh
zimmerfreiover 8 years ago
Maybe I am being too harsh, but it is clear the author does not have a formal education in the subject [0] nor any track in breaking non-toy crypto implementations [1]. This alone makes me a bit wary of any recommendation one may read in the material.<p>There seems to be more attention to listing all the beasts in the cryptographic zoo than to the few fundamental tools required to really understand the mechanics (e.g. birthday paradox, PRFs, some prime number theory).<p>Sure, I can&#x27;t spot anything fundamentally wrong and it all reads pretty smoothly, but calling this a &quot;course&quot; is highly misleading. If the intention is to guide people in selecting good crypto primitives, then maybe &quot;guide&quot; is a more honest word?<p>For those interested, I would strongly recommend to bite the bullet and dedicate time to Boneh&#x27;s course on Coursera.<p>[0] I don&#x27;t have any either [1] Ditto
评论 #13092419 未加载
评论 #13093081 未加载
评论 #13092362 未加载
评论 #13092826 未加载
seycombiover 8 years ago
This is currently on edx. Its more advanced that the courses mentioned here. I do not know what edx will do after the course ends, but if you want it you can get it while it ss still available.<p><a href="https:&#x2F;&#x2F;www.edx.org&#x2F;course&#x2F;quantum-cryptography-caltechx-delftx-qucryptox" rel="nofollow">https:&#x2F;&#x2F;www.edx.org&#x2F;course&#x2F;quantum-cryptography-caltechx-del...</a><p>Quantum Cryptography by Thomas Vidick (Caltech) and Stephanie Wehner (Delft University)
评论 #13091194 未加载
评论 #13090074 未加载