/
Cryptography
Cryptography
1
Mathematical Prerequisites
1.1
Modular Arithmetic
1.1.1
The Mod Operation
1.1.2
Modular Operations
1.1.3
Modular Inverse
1.1.4
Coprime Numbers
1.2
Number Theory Essentials
1.2.1
Prime Numbers
1.2.2
Greatest Common Divisor
1.2.3
Euler's Totient Function
1.2.4
Fermat's Little Theorem
1.3
Binary Operations
1.3.1
XOR Operation
1.3.2
Bit Manipulation Basics
2
Symmetric Cryptography
2.1
Fundamentals
2.1.1
Symmetric Encryption
2.1.2
Confusion and Diffusion
2.2
Data Encryption Standard (DES)
2.2.1
History and Development
2.2.2
64-bit Block, 56-bit Key
2.2.3
Feistel Network
2.2.4
16 Rounds and Key Schedule
2.2.5
Triple DES
2.3
Advanced Encryption Standard (AES)
2.3.1
The NIST Competition
2.3.2
Blocks, Keys, and Rounds
2.3.3
Round Structure
2.3.4
SubBytes
2.3.5
ShiftRows
2.3.6
MixColumns
2.3.7
AddRoundKey
2.3.8
Key Expansion
2.4
Block Cipher Modes
2.4.1
Electronic Codebook (ECB)
2.4.2
Cipher Block Chaining (CBC)
2.4.3
Counter Mode (CTR)
2.4.4
Output Feedback (OFB)
2.4.5
Galois/Counter Mode (GCM)
3
Asymmetric Cryptography
3.1
Asymmetric Encryption
3.2
RSA
3.2.1
RSA Key Generation
3.2.2
RSA Digital Signatures
3.3
Diffie-Hellman
3.3.1
Key Exchange
3.3.2
The Math
3.3.3
Man-in-the-Middle Attack
3.4
Elliptic Curve Cryptography
3.4.1
Why Elliptic Curves?
3.4.2
The Elliptic Curve
3.4.3
Point Addition
3.4.4
Scalar Multiplication
3.4.5
Finite Fields
3.4.6
Keys and Security
3.4.7
ECDH Key Exchange
3.4.8
ECDSA Signatures
4
Hash Functions
4.1
Cryptographic Hash Functions
4.2
Hash Algorithms
4.3
The Birthday Attack
4.4
Hash Security
4.5
Merkle Trees
4.6
Message Authentication Codes
5
Cryptographic Protocols
5.1
Three-Pass Protocol
5.2
Authenticated Key Exchange
5.3
Key Distribution Centers
5.4
Kerberos
5.5
PKI and Certificates
5.6
Commitment Schemes
5.7
Blind Signatures
5.8
Zero-Knowledge Proofs
6
Steganography and Secret Sharing
6.1
Steganography
6.2
Shamir's Secret Sharing
6.2.1
Secret Sharing
6.2.2
The Cheating Dealer
7
PGP
7.1
Pretty Good Privacy
7.2
Web of Trust
8
SSL/TLS
8.1
The TLS Handshake
8.2
Apache SSL Configuration
9
IoT Security
9.1
What is IoT?
9.2
Vulnerabilities and Threats
9.3
Attacks and Defenses
10
Quantum Cryptography
10.1
Polarization
10.2
Quantum Key Exchange
10.3
Heisenberg's Uncertainty Principle
10.4
No-Cloning Theorem
10.5
Post-Quantum Cryptography
11
Blockchain
11.1
Blockchain Basics
11.2
Bitcoin Architecture
11.3
Cryptographic Techniques
11.4
Public vs Private Blockchains
11.5
MultiChain
←
Mathematics
Wireless Communications
→