CryptoParty Chennai


#1

###Cryptoparty - Chennai 2015
####Targeted Audience:
End users (NOT sys-admins)
####Requirements:
A thumb drive + laptop + (optionally) mobile phone

CRYPTOGRAPHY and general SECURITY with a lot of emphases on protecting private communications using encryption.
Priority is given to encryption and tools over general system security

####Introduction

  • What is Cryptoparty
  • Why cryptoparty
  • Privacy / Surveillance (
    defending against ) / Censorship ( working around )

####Simple Cryptography concepts

  • Encryption & decryption
  • Trapdoor functions
  • Simple RSA encryption / decryption
  • Symmetric & Public key crypto

####Safe Browsing

  • TLS / SSL
  • Passwords and passphrases
  • One time passwords
  • Blocking unwanted javascript

####Confidentiality

  • Encryption & Decryption
  • GNU Privacy Guard (PGP) public key encryption
  • Cryptographic signatures
  • Full disk encryption (using cryptsetup to encrypt a thumb drive / hard disk partition)

####Anonymity

  • Tor Browser
  • Warnings and Cautions

####Integrity

  • Cryptographic hashes
  • Using MD5 / SHA to verify integrity
  • Intrusion detection systems (time permitting)
  • Rootkit detection (time permitting)

####Notes on Social Networking

  • Risks / Benefit balance
  • What to share and what not to share
  • Breaking out of Facebook, etc.

####Tools for confidentiality

  • Cryptocat
  • TextSecure
  • OTP using Pidgin or Adium

Key Signing Party

####ADVANCED

  • Key exchange protocols
  • Elliptic Curves
  • Ciphers
  • Dead drop for journalists

####Breaking the bubble

  • DDG / Startpage / ixquick

#2

https://www.cryptoparty.in/chennai


#3

First follow up post of Cryptoparty is up: Electronic Mail Encryption