- Randomness, because unpredictability is hard to break,
- Universal Unique Identifiers (UUIDs) and Nonces, for identifying unique things, and for providing unique tokens,
- Cryptographic hashes, to check that documents have not been altered, or to keep passwords from prying eyes,
- Symmetric keys, to pass data between two people, keeping prying eyes from understanding it,
- Asymmetric keys, to share symmetric keys in a safe-ish way, and to confirm other people's identities,
- Steganography, because it's sometimes fun to hide data under people's noses! And, er, because it can sometimes be useful to "watermark" pictures!
As I cover these patterns, I won't be doing it in any particular order (beyond my personal whimsy); indeed, as these are sufficiently complex, there might not be an "order" to them that makes sense!
No comments:
Post a Comment