In this plan, let's assume that you already have some computer science skills (linux basics, common windows or mac os use, search on the internet, edit a file...).
But first, what is cryptography ? cryptography is the practice and study of techniques for secure communication in the presence of adversarial behavior.
This plan has several objectives, in short :
- learn about cryptography theoric concepts
- become familiar with useful cryptography tools
- how to apply all this acknoledgment in the context of cybersecurity
- Theoretical Concepts - 2 weeks
- Applied Cryptography - 2 weeks
- Cryptography Tools - 2 weeks
- Cryptanalysis & Challenges - 2 weeks
- Resources
Duration: 2 weeks
In this first part you will focus on learning the basics concepts of cryptography (algorithms, keys, PKI, hashing).
- Symmetric vs Asymmetric Encryption: DES, AES, RSA, ECC.
- Hashing Algorithms: MD5, SHA-1, SHA-256, SHA-3.
- Public Key Infrastructure (PKI): Certificates, CAs, Chain of Trust.
- Digital Signatures: How they work and why they are important.
Resources:
Duration: 2 weeks
How to apply this knowledge in the context of cybersecurity and secure communications.
- SSL/TLS: Handshake process, versions, and security.
- SSH: Secure remote access, key management.
- Email Security: PGP, GPG, S/MIME.
- Data at Rest vs Data in Transit.
Resources:
Duration: 2 weeks
Become familiar with useful cryptography tools for analysis and implementation.
- OpenSSL: Generating keys, CSRs, and testing connections.
- GPG: Encrypting and signing files.
- John the Ripper / Hashcat: Password cracking basics (understanding strength).
- CyberChef: The "Swiss Army Knife" for encryption/decoding.
Resources:
Duration: 2 weeks
Time to challenge yourself with CTFs and cryptanalysis puzzles.
- Classical Ciphers: Caesar, Vigenère (for historical context).
- Modern Attacks: Padding Oracle, POODLE, Heartbleed (understanding the flaws).
- CTF Challenges: Solve crypto challenges on platforms.
Resources:
- Serious Cryptography by Jean-Philippe Aumasson
- Real-World Cryptography by David Wong