Skip to content

Week 10 Quiz

Test your understanding of the weekly concepts.

Format: 10 multiple-choice questions. Passing score: 70%. Time: Untimed.

Take Quiz
CSY101 Week 10 Beginner

Practice real cryptography concepts before moving to reading resources.

Cybersecurity Essentials

Track your progress through this week's content

Week Introduction

๐Ÿ’ก Mental Model

Cryptography is the mathematical foundation that makes trust possible in adversarial networks. It enables confidentiality (secrets stay secret), integrity (tampering is detected), and authentication (prove identity) even when communicating over untrusted channels.

This week explores how cryptographic primitives (encryption, hashing, signatures) work, when to use each, and why implementation details matter more than you'd think. You'll learn why "just encrypt it" isn't enough โ€” key management, algorithm selection, and proper usage determine whether crypto protects or creates false security.

Learning Outcomes (Week 10 Focus)

By the end of this week, you should be able to:

  • LO2 - Technical Foundations: Explain how symmetric vs asymmetric encryption work and when to use each
  • LO6 - Software Security: Identify common cryptographic mistakes (weak algorithms, ECB mode, hardcoded keys)
  • LO8 - Integration: Map cryptographic controls to security properties (encryption โ†’ confidentiality, hashing โ†’ integrity, signatures โ†’ authentication)

Lesson 10.1 ยท What Is Cryptography? (Mathematical Foundation for Security)

Definition: Cryptography uses mathematical algorithms to transform data in ways that provide security properties (confidentiality, integrity, authentication) even when attackers can observe, intercept, or manipulate communications.

Four core security properties enabled by cryptography:

  • Confidentiality: Only authorized parties can read data
    Mechanism: Encryption (plaintext โ†’ ciphertext)
    Example: HTTPS encrypts web traffic so ISPs can't read passwords
  • Integrity: Unauthorized changes are detectable
    Mechanism: Cryptographic hashing, MACs (Message Authentication Codes)
    Example: Download checksums (SHA-256 hash) verify file wasn't tampered with
  • Authentication: Parties can verify each other's identity
    Mechanism: Digital signatures, certificates
    Example: TLS certificates prove you're really talking to github.com, not an attacker
  • Non-repudiation: Actions cannot be denied after the fact
    Mechanism: Digital signatures (only private key holder could have signed)
    Example: DocuSign โ€” signer can't later claim "I didn't sign that"

Why cryptography is essential in untrusted networks:

The internet is fundamentally insecure โ€” traffic passes through routers/ISPs you don't control, attackers can intercept/modify packets. Cryptography enables secure communication despite adversarial infrastructure.

Lesson 10.2 ยท Encryption: Symmetric vs Asymmetric

Core concept: Encryption transforms plaintext (readable) into ciphertext (unreadable without the key). The two major approaches differ in how keys are used and distributed.

Symmetric Encryption (Same key encrypts and decrypts):

Asymmetric Encryption (Public key encrypts, private key decrypts):

Hybrid approach (Best of both worlds):

Real systems combine symmetric and asymmetric:

  1. Use asymmetric (RSA/ECC) to securely exchange a symmetric key (AES)
  2. Use symmetric (AES) to encrypt bulk data (fast)
  3. Example: TLS/HTTPS handshake โ€” RSA exchanges AES session key, then AES encrypts website traffic

Why not just use asymmetric for everything? Too slow for large data. Encrypting a 1GB file with RSA would take hours; with AES takes milliseconds.

Lesson 10.3 ยท Hashing and Integrity (One-Way Functions)

Definition: A cryptographic hash function transforms arbitrary-length input into fixed-length output (digest/hash). Hash functions are one-way โ€” easy to compute, impossible to reverse.

Three critical properties of cryptographic hashes:

Common hash algorithms:

Practical use cases for hashing:

Lesson 10.4 ยท Key Management: The Hardest Part of Cryptography

Core reality: "Cryptography is easy to get wrong, and when you get it wrong, you get it very wrong." Most cryptographic failures aren't algorithm breaks โ€” they're key management failures.

Key lifecycle management (cradle to grave):

Common key management failures (real-world disasters):

Best practices for key management:

Lesson 10.5 ยท Malware Persistence (Defensive Overview)

Persistence means "staying after reboot." You don't need to learn how to build malware โ€” you need to understand what defenders look for: unexpected startup entries, scheduled tasks, new services, unusual child processes.

Scope boundary: This platform teaches defensive understanding. We focus on recognizing persistence concepts and hardening choices โ€” not step-by-step offensive instructions.

Lab 10 ยท Cryptographic Controls Design

Time estimate: 40-50 minutes

Objective: Design cryptographic controls for a system that handles sensitive data. You will select appropriate cryptographic primitives (encryption, hashing, signatures), justify algorithm choices, and address the key management lifecycle.

Task Overview

Choose one scenario:

For your chosen scenario, design:

  1. Where encryption is needed (data at rest, data in transit, specific fields)
  2. Which algorithms to use (AES-256, RSA-2048, SHA-256, etc.) and why
  3. Key management strategy (generation, storage, rotation, destruction)
  4. Threat model โ€” what attacks does crypto defend against? What doesn't it prevent?
  5. Failure scenarios โ€” what happens if keys are lost or compromised?

Success criteria:

๐ŸŽฏ Hands-On Labs (Free & Essential)

Practice real cryptography concepts before moving to reading resources.

๐ŸŽฎ TryHackMe: Cryptography 101

What you'll do: Learn core crypto concepts like symmetric/asymmetric encryption, hashing, and key usage.
Why it matters: Crypto mistakes are catastrophic. This lab builds intuition for correct usage.
Time estimate: 1.5-2 hours

Start TryHackMe Cryptography โ†’

๐ŸŽฏ OverTheWire: Krypton (Levels 0-5)

What you'll do: Solve classic cryptography challenges involving substitution ciphers, frequency analysis, and encoding.
Why it matters: Krypton builds intuition for why modern crypto uses strong algorithms and correct key management.
Time estimate: 2-3 hours

Start OverTheWire Krypton โ†’

๐Ÿ PicoCTF Practice: Cryptography (Beginner)

What you'll do: Solve beginner crypto challenges involving hashing, basic ciphers, and key concepts.
Why it matters: Reinforces the difference between encoding, hashing, and encryption.
Time estimate: 1-2 hours

Start PicoCTF Cryptography โ†’

๐Ÿ’ก Lab Tip: Always ask which security property you need first (confidentiality, integrity, authentication). Crypto choice follows that.

Resources (Free + Authoritative)

Work through these in order. Focus on understanding when to use each cryptographic primitive.

๐ŸŽฅ Computerphile - Public Key Cryptography Explained (Video)

What to watch: Visual explanation of RSA and asymmetric encryption.
Why it matters: Best intuitive explanation of how public/private key pairs work.
Time estimate: 12 minutes

Open Resource

๐ŸŽฅ Computerphile - Hashing Algorithms Explained (Video)

What to watch: How cryptographic hashes work and why they're one-way.
Why it matters: Understand the difference between encryption (reversible) and hashing (one-way).
Time estimate: 10 minutes

Open Resource

๐Ÿ“˜ NIST Cryptographic Standards - Overview

What to read: Browse FIPS 140-2 (cryptographic module standards) and recommended algorithms.
Why it matters: Government/industry standards for approved cryptographic algorithms.
Time estimate: 20 minutes

Open Resource

๐Ÿ“˜ Cryptographic Best Practices Cheat Sheet (OWASP)

What to read: Algorithm selection, key management, common implementation mistakes.
Why it matters: Practical guide to avoiding cryptographic pitfalls in real applications.
Time estimate: 25 minutes

Open Resource

Tip: Completion and XP persist via localStorage. If progress doesn't update immediately, refresh once.

Weekly Reflection Prompt

Aligned to LO2 (Technical Foundations) and LO6 (Software Security)

Write 200-300 words answering this prompt:

Explain how cryptography enables security in untrusted networks. Use your Lab 10 cryptographic design as an example.

In your answer, include:

What good looks like: You demonstrate understanding that cryptography is a tool, not a silver bullet. You explain when to use encryption (confidentiality), hashing (integrity), and signatures (authentication). You acknowledge that implementation matters โ€” strong algorithms with weak key management fail. You connect cryptographic primitives to real-world use cases (HTTPS, password storage, digital signatures).