Skip to content

Latest commit

 

History

History
88 lines (66 loc) · 3.49 KB

File metadata and controls

88 lines (66 loc) · 3.49 KB

Cryptography Study Plan

In this plan, let's assume that you already have some computer science skills (linux basics, common windows or mac os use, search on the internet, edit a file...).
But first, what is cryptography ? cryptography is the practice and study of techniques for secure communication in the presence of adversarial behavior.


This plan has several objectives, in short :

  • learn about cryptography theoric concepts
  • become familiar with useful cryptography tools
  • how to apply all this acknoledgment in the context of cybersecurity

ToC

  1. Theoretical Concepts - 2 weeks
  2. Applied Cryptography - 2 weeks
  3. Cryptography Tools - 2 weeks
  4. Cryptanalysis & Challenges - 2 weeks
  5. Resources

Theoretical Concepts

Duration: 2 weeks

In this first part you will focus on learning the basics concepts of cryptography (algorithms, keys, PKI, hashing).

Week 1-2: Core Concepts

  1. Symmetric vs Asymmetric Encryption: DES, AES, RSA, ECC.
  2. Hashing Algorithms: MD5, SHA-1, SHA-256, SHA-3.
  3. Public Key Infrastructure (PKI): Certificates, CAs, Chain of Trust.
  4. Digital Signatures: How they work and why they are important.

Resources:

Applied Cryptography

Duration: 2 weeks

How to apply this knowledge in the context of cybersecurity and secure communications.

Week 3-4: Protocols & Implementation

  1. SSL/TLS: Handshake process, versions, and security.
  2. SSH: Secure remote access, key management.
  3. Email Security: PGP, GPG, S/MIME.
  4. Data at Rest vs Data in Transit.

Resources:

Cryptography Tools

Duration: 2 weeks

Become familiar with useful cryptography tools for analysis and implementation.

Week 5-6: Hands-on Tools

  1. OpenSSL: Generating keys, CSRs, and testing connections.
  2. GPG: Encrypting and signing files.
  3. John the Ripper / Hashcat: Password cracking basics (understanding strength).
  4. CyberChef: The "Swiss Army Knife" for encryption/decoding.

Resources:

Cryptanalysis & Challenges

Duration: 2 weeks

Time to challenge yourself with CTFs and cryptanalysis puzzles.

Week 7-8: Breaking Codes

  1. Classical Ciphers: Caesar, Vigenère (for historical context).
  2. Modern Attacks: Padding Oracle, POODLE, Heartbleed (understanding the flaws).
  3. CTF Challenges: Solve crypto challenges on platforms.

Resources:

Resources

Platforms

Books

  • Serious Cryptography by Jean-Philippe Aumasson
  • Real-World Cryptography by David Wong