Skip to content

Commit

Permalink
import blog and about
Browse files Browse the repository at this point in the history
  • Loading branch information
Reed Nelson committed Aug 6, 2023
1 parent 8f3c925 commit 585e7f0
Show file tree
Hide file tree
Showing 24 changed files with 886 additions and 95 deletions.
Binary file added public/assets/about/reed.jpg
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Binary file added public/assets/blog/debruijn/b23_adjmatrix.png
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Binary file added public/assets/blog/debruijn/b23_graph.png
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Binary file added public/assets/blog/debruijn/b24_graph.png
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Binary file added public/assets/blog/debruijn/b_outshuffles.png
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Binary file added public/assets/blog/huffman/huffman.png
Loading
Sorry, something went wrong. Reload?
Sorry, we cannot display this file.
Sorry, this file is invalid so it cannot be displayed.
Binary file removed public/images/avatar.png
Binary file not shown.
Binary file removed public/images/banner.png
Binary file not shown.
10 changes: 7 additions & 3 deletions src/content/about/-index.md
Original file line number Diff line number Diff line change
@@ -1,9 +1,13 @@
---
title: "Hey, I am John Doe!"
title: "Reed Nelson"
meta_title: "About"
description: "this is meta description"
image: "/images/avatar.png"
image: "/assets/about/reed.jpg"
draft: false
---

Lorem ipsum dolor sit amet consectetur adipisicing elit. Corporis illum nesciunt commodi vel nisi ut alias excepturi ipsum, totam, labore tempora, odit ex iste tempore sed. Fugit voluptatibus perspiciatis assumenda nulla ad nihil, omnis vel, doloremque sit quam autem optio maiores, illum eius facilis et quo consectetur provident dolor similique! Enim voluptatem dicta expedita veritatis repellat dolorum impedit, provident quasi at.
Reed is a software engineer at Infinite Campus, and a graduate of UW-Madison with a BS in Computer Science, Mathematics, and Philosophy. Previously, he worked in the [Solís-Lemus Lab](https://solislemuslab.github.io/) at the Wisconsin Institute for Discovery, developing MiNAA: Microbial Network Alignment Algorithm.

Reed's interests include almost anything related to discrete math, but especially graph theory and cryptography. Outside of academia, he enjoys camping, tea, and mathematical/logic riddles.

His modest blog was inspired by Rishi Banerjee's [Rising Entropy](https://risingentropy.com/).
58 changes: 58 additions & 0 deletions src/content/blog/crypto.md
Original file line number Diff line number Diff line change
@@ -0,0 +1,58 @@
---
title: "Cryptography"
meta_title: ""
description: "none"
date: 2022-08-30T05:00:00Z
image: ""
categories: ["Cryptography"]
author: "Reed Nelson"
tags: ["crypto"]
draft: true
---

Cryptography is used everywhere in ciberspace, by everybody, all the time.

Think about how much of your information is personal, confidential. That is, information where it matters that it didn't come from just anybody, or you wouldn't want just anyone knowing it. These aren't just your passwords and credit card numbers: how would you feel if a stranger came up to you off the street and asked for your children's names, what your most recent purchases were?

In real life we can intuit about vulnerabilites, and so can everyone else (there's a sort of herd protection in this). Further, malicious parties are constrained by the singularity of their physical presence, and limitations of movement. In the physical world we can whisper our secrets and look around to see in anyone's in earshot. None of these things are true in ciberspace.

Encryption is necessary not only when you log in, but almost any time you're transmitting data, because it almost always matters that the data came from you. And it matters that not just anyone can access it or modify it before it arrives at its destination.

Whenever you download software, you need to check its integrity. The same is true when you send data to or from the cloud, or from your phone to your airpods, or when you call, text, etc. In communication of every kind, it's important to make sure the data that was sent is the data that was recieved, and a surprising amount of the time, it isn't.

Understanding computer systems is hard, and understanding math is even harder. So most of the time, all of these processes are abstracted away, or otherwise hidden from the end user. It is very easy to be ignorant of just how essential Cryptography is. But in reality, without all of these features provided by Cryptograohy, the internet could fall apart, along with many other digital systems (key fobs, credit cards...). None of these functions are safe without cryptography.

## Encryption

Symmetric encryption is much older, more conventional, and better known type of encryption.

Perhaps the most dominant symmetric encryption scheme is AES, ...

Asymetric, or public-key encryption was only discovered in the 1970's. In asymmetric systems, ...

Asymmetric encryption tends to be slower. Additonally, the security of these these systems is highly confident but uncertain. That is, mathematicians think that no efficient inverse function exists, but nobody has proven it. For these reasons, Asymmetric encryption is mostly only used where necessary, which is still a lot, but usually for small amounts of data.

It shouldn't be understated how awesome asymmetric encryption really is. For a long time it was believed to be impossible...[Quote from DH paper].

Symmetric and asymmetric encryption harmonize beautifully. Where symmetric is fast and provably secure, asymmetric solves the glaring issue of exchanging keys over insecure channels. The digital world would look very different without asymmetric encryption.

RSA/Elliptic curve

### Key Exchange

## Compression

## Data Integrity

Check digits

Hash functions

MAC

Digital Signatures

Use cases:

- mistakes in input, data corruption in transport or storage
- manipiulation of data: changing after certification, falsifying sender...
Loading

0 comments on commit 585e7f0

Please sign in to comment.