Are you an IT professional, software engineer, a manager or just a beginner in crypto? Looking to use cryptography but nor sure how?

Cryptodoneright serves as a knowlege base that guides you through the various protocols, algorithms and utilities that come under the umbrella of cryptography. The misson of this knowledge base is to help improve the overall understanding of how cryptography is deployed, implemented, maintained, and configured in the most secure fashion. Cryptography can be a burden of information if consumed without any guidance and understanding of basics. All of the subject's complications do not have to be understood by a developer, an IT Engineer or a Manager to use it efficiently. Cryptodoneright aims to solve this problem by keeping the information brief and to the point while providing options to learn further about a topic. This presents a totally amenable learning process where you could either cover a topic in brief or in detail.

Additionally, every page also has a footer section dedicated for "Further Reading" and "Related Articles". These sections contain links to external documentation that dive deeper into the concepts presented on a page.

Fig.1 - There is always more to learn at the footer section!

In order to faciliate ease of navigation, the website is divided into the three broad categories. The top level hierarchy starts here:

  • Cryptographic Protocols: These are well defined protocols (RFCs) to establish a secure channel between two endpoints in a computer network.
  • Hashing Algorithms: These are mathematical algorithms that help in mainitaining the integrity of a piece of data. If a piece of data has been tampered with, hashing allows you to identify it but not remediate it. Hashing Algorithms are also one-way functions, meaning if you hash a piece of data, you cannot reverse the hash to obtain the plain text.
  • Encryption Algorithms: Again, mathematical algorithms that help in maintaing the secrecy of data by keeping it private to everyone except the owner of a decryption key.
  • Utilities: These function in a similar way as cryptographic protocols but are used as utilties to connect to remote machines for control over a secure channel.

  • You'll find these categories on the home bar of the wesbite. These expand to drop down menus. For example, under Encryption:

    Fig.2 - Encryption's Drop Down Menu
  • Introduction:
  • An Introduction page that walks through a basic set of FAQs to help establish the fundamentals of each of the parent categories. If you are new to cryptography, we strongly recommend going through the Introductions at least once.
    Fig.3 - Landing page of Encryption
  • Protocols/Algorithms:
  • All the other options under a category are the different algorithms/protocols under the parent category. So for example, in Encryption, the knowledge base currently covers AES, DES and 3DES. All of these options have their own set of strenghts and weaknesses (and in certain case only strengths or weaknesses). In the case of AES, you'll notice that the menu further expands to a couple of options. These options, for the unfamiliar, serve as "Modes of Operations". Visiting any of these options will lead to the a landing page that looks like this:
    Fig.3 - Landing page of AES CTR

    Help deliver the important messages concerning the protocol/algorithm. These could link to detailed articles explaining the reasoning behind the banners.
    A short description about the topic explaining its position in the world of cryptography, history and its vulnerabilities/attacks.
    QuickStarts are designed to help different professionals learn and deploy different protocols or techniques using a Concept and an Example.

    Let's talk about QuickStarts a little further. All of our Quickstarts are structured around three further categories::

  • Protocol
  • Implementation
  • Configuration.

  • These three sections hold special value in the world of cryptography. All vulnerabilties found in the world of cryptography are either 1. Flaws in the protocol, 2. Implementation 3. Configuration. We cannot recommend it enough that everyone understand the clear differences between these and use the document that we have created.

    Our Quickstarts present concepts surrounding the above sections. This helps in establishing a clear distinction between different vulnerabilties in cryptography which in turn greatly benifits the approach that you could take to solve your requirement(s).

    And for someone looking for quick references, every landing page has a link to a "To go" section which presents all of the must know information about a protocol/algorithm in a clear and concise fashion for you to go.

    And, that's it! Happy learning and please shoot us an email if you have any questions or feedback.