Applied Cryptography

Applied Cryptography

Attribute Value

Goal

Practical cryptography for PKI, secrets management

Interest Link

IT > InfoSec > Cryptography

Status

In Progress

Application

Vault PKI, EAP-TLS, SSH CA, secrets management

Documentation

Principia/02_Assets/LRN-CRYPTO-APPLIED/

Topics

Topic Description Status

Symmetric

AES, ChaCha20, key derivation

[ ] In Progress

Asymmetric

RSA, ECDSA, Ed25519

[x] Practical use (SSH, TLS)

Hashing

SHA-256, SHA-3, HMAC

[x] Practical use

PKI

X.509, certificate chains, CRL/OCSP

[x] Proficient (Vault PKI)

TLS

Handshake, cipher suites, mutual TLS

[x] Proficient (EAP-TLS)

Key Management

HSM concepts, key rotation, Vault

[ ] In Progress

Age/GPG

Encryption at rest, secrets management

[x] Proficient (dsec)

Resources

Books:

  • Serious Cryptography - Aumasson

  • Cryptography Engineering - Ferguson, Schneier

Practical experience:

  • Vault PKI deployment

  • EAP-TLS infrastructure

  • SSH CA (Vault)

  • dsec secrets management (age)