Cryptography

  1. Symmetric Key Cryptography
    1. Principles and Concepts
      1. Shared Secret Key Model
        1. Key Distribution Problem
          1. Perfect Secrecy
            1. One-Time Pad
              1. Shannon's Theorem
                1. Practical Limitations
                2. Computational Security
                  1. Security Definitions
                    1. Advantage and Negligible Functions
                    2. Symmetric Encryption Advantages
                      1. Speed and Efficiency
                        1. Simplicity
                        2. Symmetric Encryption Disadvantages
                          1. Key Distribution
                            1. Key Management Complexity
                              1. Scalability Issues
                            2. Stream Ciphers
                              1. Stream Cipher Principles
                                1. Keystream Generation
                                  1. XOR Operation
                                    1. Synchronization
                                    2. Synchronous Stream Ciphers
                                      1. Error Propagation
                                      2. Asynchronous Stream Ciphers
                                        1. Self-Synchronizing Property
                                          1. Error Recovery
                                          2. Linear Feedback Shift Registers
                                            1. LFSR Structure
                                              1. Characteristic Polynomial
                                                1. Period and Sequences
                                                  1. Berlekamp-Massey Algorithm
                                                  2. Nonlinear Combinations
                                                    1. Nonlinear Feedback Shift Registers
                                                      1. Combination Generators
                                                        1. Filter Generators
                                                        2. Stream Cipher Algorithms
                                                          1. RC4
                                                            1. Key Scheduling Algorithm
                                                              1. Pseudo-Random Generation Algorithm
                                                                1. Weaknesses and Attacks
                                                                  1. WEP Vulnerabilities
                                                                  2. ChaCha20
                                                                    1. Quarter Round Function
                                                                      1. Block Function
                                                                        1. Security Properties
                                                                          1. Performance Characteristics
                                                                          2. Salsa20
                                                                            1. Design Principles
                                                                              1. Relationship to ChaCha20
                                                                              2. A5/1 and A5/2
                                                                                1. GSM Encryption
                                                                                  1. Security Analysis
                                                                                2. Stream Cipher Attacks
                                                                                  1. Known Plaintext Attacks
                                                                                    1. Correlation Attacks
                                                                                      1. Algebraic Attacks
                                                                                    2. Block Ciphers
                                                                                      1. Block Cipher Fundamentals
                                                                                        1. Fixed Block Size
                                                                                          1. Key-Dependent Permutation
                                                                                            1. Invertibility Requirement
                                                                                            2. Block Cipher Design Principles
                                                                                              1. Confusion
                                                                                                1. Substitution Operations
                                                                                                  1. S-box Design
                                                                                                  2. Diffusion
                                                                                                    1. Permutation Operations
                                                                                                      1. Linear Transformations
                                                                                                      2. Key Schedule
                                                                                                        1. Round Key Generation
                                                                                                          1. Key Expansion
                                                                                                        2. Block Cipher Structures
                                                                                                          1. Substitution-Permutation Networks
                                                                                                            1. Round Structure
                                                                                                              1. S-box Layer
                                                                                                                1. Permutation Layer
                                                                                                                  1. Key Addition
                                                                                                                  2. Feistel Networks
                                                                                                                    1. Feistel Function
                                                                                                                      1. Round Structure
                                                                                                                        1. Decryption Process
                                                                                                                          1. Advantages and Properties
                                                                                                                        2. Padding Schemes
                                                                                                                          1. PKCS#7 Padding
                                                                                                                            1. ISO/IEC 7816-4 Padding
                                                                                                                              1. Zero Padding
                                                                                                                                1. Random Padding
                                                                                                                                  1. Padding Oracle Attacks
                                                                                                                                  2. Block Cipher Modes of Operation
                                                                                                                                    1. Electronic Codebook Mode
                                                                                                                                      1. Encryption and Decryption
                                                                                                                                        1. Security Weaknesses
                                                                                                                                          1. Pattern Leakage
                                                                                                                                          2. Cipher Block Chaining Mode
                                                                                                                                            1. Initialization Vector
                                                                                                                                              1. Encryption Process
                                                                                                                                                1. Decryption Process
                                                                                                                                                  1. Error Propagation
                                                                                                                                                    1. Padding Oracle Attacks
                                                                                                                                                    2. Cipher Feedback Mode
                                                                                                                                                      1. Self-Synchronizing Property
                                                                                                                                                        1. Segment Size Considerations
                                                                                                                                                        2. Output Feedback Mode
                                                                                                                                                          1. Stream Cipher Behavior
                                                                                                                                                            1. Synchronization Requirements
                                                                                                                                                            2. Counter Mode
                                                                                                                                                              1. Parallelizable Encryption
                                                                                                                                                                1. Random Access Property
                                                                                                                                                                  1. Nonce Requirements
                                                                                                                                                                  2. Galois/Counter Mode
                                                                                                                                                                    1. Authenticated Encryption
                                                                                                                                                                      1. GHASH Function
                                                                                                                                                                        1. Performance Benefits
                                                                                                                                                                        2. XEX-based Tweaked-Codebook Mode
                                                                                                                                                                          1. Disk Encryption Applications
                                                                                                                                                                            1. Tweak Values
                                                                                                                                                                          2. Block Cipher Algorithms
                                                                                                                                                                            1. Data Encryption Standard
                                                                                                                                                                              1. Feistel Structure
                                                                                                                                                                                1. 16 Rounds
                                                                                                                                                                                  1. Key Schedule
                                                                                                                                                                                    1. S-box Design
                                                                                                                                                                                      1. Security Analysis
                                                                                                                                                                                        1. Key Size Limitations
                                                                                                                                                                                        2. Triple DES
                                                                                                                                                                                          1. EDE Configuration
                                                                                                                                                                                            1. EEE Configuration
                                                                                                                                                                                              1. Key Options
                                                                                                                                                                                                1. Security Improvements
                                                                                                                                                                                                  1. Performance Considerations
                                                                                                                                                                                                  2. Advanced Encryption Standard
                                                                                                                                                                                                    1. Rijndael Algorithm Selection
                                                                                                                                                                                                      1. State Array Representation
                                                                                                                                                                                                        1. SubBytes Transformation
                                                                                                                                                                                                          1. ShiftRows Transformation
                                                                                                                                                                                                            1. MixColumns Transformation
                                                                                                                                                                                                              1. AddRoundKey Transformation
                                                                                                                                                                                                                1. Key Expansion
                                                                                                                                                                                                                  1. Number of Rounds
                                                                                                                                                                                                                    1. Security Analysis
                                                                                                                                                                                                                      1. Implementation Considerations
                                                                                                                                                                                                                      2. Blowfish
                                                                                                                                                                                                                        1. Feistel Structure
                                                                                                                                                                                                                          1. Variable Key Length
                                                                                                                                                                                                                            1. S-box Initialization
                                                                                                                                                                                                                              1. Performance Characteristics
                                                                                                                                                                                                                              2. Twofish
                                                                                                                                                                                                                                1. AES Candidate
                                                                                                                                                                                                                                  1. Key-Dependent S-boxes
                                                                                                                                                                                                                                    1. Maximum Distance Separable Matrix
                                                                                                                                                                                                                                    2. Serpent
                                                                                                                                                                                                                                      1. AES Candidate
                                                                                                                                                                                                                                        1. 32 Rounds
                                                                                                                                                                                                                                          1. Security Margin
                                                                                                                                                                                                                                          2. IDEA
                                                                                                                                                                                                                                            1. Mixed Operations
                                                                                                                                                                                                                                              1. Key Schedule
                                                                                                                                                                                                                                                1. Patent Issues
                                                                                                                                                                                                                                              2. Block Cipher Analysis
                                                                                                                                                                                                                                                1. Linear Cryptanalysis
                                                                                                                                                                                                                                                  1. Linear Approximations
                                                                                                                                                                                                                                                    1. Bias and Data Requirements
                                                                                                                                                                                                                                                    2. Differential Cryptanalysis
                                                                                                                                                                                                                                                      1. Characteristic Differentials
                                                                                                                                                                                                                                                        1. Probability Analysis
                                                                                                                                                                                                                                                        2. Integral Cryptanalysis
                                                                                                                                                                                                                                                          1. Square Attack
                                                                                                                                                                                                                                                            1. Multiset Properties
                                                                                                                                                                                                                                                            2. Algebraic Cryptanalysis
                                                                                                                                                                                                                                                              1. System of Equations
                                                                                                                                                                                                                                                                1. Gröbner Bases