IoT Security Blog

Articles and Posts on IoT Security, Embedded Systems, and the Internet of Things

What is Cryptography?

Contributed by Joanne C. Kelleher

When I was interviewing for my job at SecureRF, one of the questions I was asked was How do you learn about new technical subjects? I thought it was a strange question at the time and talked about reading, classes, online research, etc. Once I learned more about all of the technical areas and industries that SecureRF’s technology incorporates or touches upon I understood why the question was asked.

Cryptography is one of those areas that I had to learn about and I wish this resource was available when I first started at SecureRF. Within Khan Academy’s Applied Mathematics section are several lessons on cryptography. Khan Academy is a not-for-profit organization that provides education via free videos. Their library of videos covers K-12 math, science topics such as biology, chemistry, and physics, and even reaches into the humanities with playlists on finance and history. The videos are about 10 minutes each making them easily digestible.

The cryptography training includes:

Ancient Cryptography

  1. What is Cryptography?
  2. Probability Space
  3. The Caesar Cipher
  4. Polyalphabetic Cipher
  5. The One-Time Pad
  6. Frequency Stability
  7. The Enigma Encryption Machine (case study)
  8. Perfect Secrecy
  9. Pseudorandom Number Generators

Modern Cryptography

  1. The Fundamental Theorem of Arithmetic
  2. Public Key Cryptography: what is it?
  3. The Discrete Logarithm Problem
  4. Diffie-Hellman Key Exchange
  5. RSA Encryption: step 1
  6. RSA Encryption: step 2
  7. RSA Encryption: step 3
  8. Euler’s Totient Function
  9. RSA Encryption: step 4
  10. What should we learn next?

New videos are constantly being added in all topic areas, so check out Khan Academy.

Want to learn more about cryptography? SecureRF offers this paper:

An Introduction to Cryptographic Security Methods and Their Role in Securing Low Resource Computing Devices An Overview of Public-key Cryptosystems based on RSA, Diffie-Hellman and the Next Generation of Public-key Cryptographic Security for Low-Resource Computing Devices – the Algebraic Eraser