Applied Cryptography
Applied Cryptography
| Attribute | Value |
|---|---|
Goal |
Practical cryptography for PKI, secrets management |
Interest Link |
IT > InfoSec > Cryptography |
Status |
In Progress |
Application |
Vault PKI, EAP-TLS, SSH CA, secrets management |
Documentation |
Principia/02_Assets/LRN-CRYPTO-APPLIED/ |
Topics
| Topic | Description | Status |
|---|---|---|
Symmetric |
AES, ChaCha20, key derivation |
[ ] In Progress |
Asymmetric |
RSA, ECDSA, Ed25519 |
[x] Practical use (SSH, TLS) |
Hashing |
SHA-256, SHA-3, HMAC |
[x] Practical use |
PKI |
X.509, certificate chains, CRL/OCSP |
[x] Proficient (Vault PKI) |
TLS |
Handshake, cipher suites, mutual TLS |
[x] Proficient (EAP-TLS) |
Key Management |
HSM concepts, key rotation, Vault |
[ ] In Progress |
Age/GPG |
Encryption at rest, secrets management |
[x] Proficient (dsec) |
Resources
Books:
-
Serious Cryptography - Aumasson
-
Cryptography Engineering - Ferguson, Schneier
Practical experience:
-
Vault PKI deployment
-
EAP-TLS infrastructure
-
SSH CA (Vault)
-
dsec secrets management (age)