Useful Links
Computer Science
Cybersecurity
Cryptography
1. Foundations of Cryptography
2. Mathematical Foundations
3. Symmetric Key Cryptography
4. Asymmetric Key Cryptography
5. Cryptographic Hash Functions
6. Message Authentication and Integrity
7. Key Management and Distribution
8. Cryptanalysis and Security Analysis
9. Applied Cryptography and Security Protocols
10. Advanced Cryptographic Concepts
11. Cryptographic Standards and Compliance
Asymmetric Key Cryptography
Public Key Cryptography Principles
Key Pair Concept
Public Key Properties
Private Key Properties
Key Relationship
One-Way Functions
Computational Assumptions
Trapdoor Functions
Trapdoor Information
Easy vs. Hard Directions
Computational Hardness Assumptions
Integer Factorization Problem
Discrete Logarithm Problem
Elliptic Curve Discrete Logarithm Problem
Public Key Advantages
Key Distribution Solution
Digital Signatures
Non-repudiation
Public Key Disadvantages
Computational Overhead
Key Size Requirements
Implementation Complexity
Hybrid Cryptosystems
Key Encapsulation Mechanism
Data Encapsulation Mechanism
Performance Benefits
Key Agreement Protocols
Diffie-Hellman Key Exchange
Protocol Description
Mathematical Foundation
Security Analysis
Man-in-the-Middle Vulnerability
Discrete Logarithm Assumption
Ephemeral Diffie-Hellman
Forward Secrecy
Session Key Generation
Implementation Considerations
Elliptic Curve Diffie-Hellman
Elliptic Curve Operations
Key Size Advantages
Curve Selection Criteria
Station-to-Station Protocol
Authentication Integration
Digital Signature Usage
MQV Protocol
Implicit Authentication
Security Properties
Public Key Encryption
RSA Algorithm
Mathematical Foundation
Modular Exponentiation
Euler's Theorem Application
Key Generation Process
Prime Selection
Modulus Computation
Exponent Selection
Private Key Computation
Encryption Process
Decryption Process
Security Analysis
Factoring Problem
Chosen Ciphertext Attacks
Padding Schemes
PKCS#1 v1.5
OAEP Padding
PSS Padding
Implementation Attacks
Timing Attacks
Power Analysis
Key Size Recommendations
ElGamal Encryption
Mathematical Foundation
Key Generation
Encryption Process
Decryption Process
Security Properties
Ciphertext Expansion
Rabin Cryptosystem
Quadratic Residues
Decryption Ambiguity
Security Equivalence to Factoring
Paillier Cryptosystem
Homomorphic Properties
Elliptic Curve Cryptography
Elliptic Curve Mathematics
Curve Equations
Point Addition Rules
Point Doubling
Scalar Multiplication
Group Law
Elliptic Curve Parameters
Curve Coefficients
Base Point Selection
Order Computation
Cofactor
Standard Curves
NIST Curves
Brainpool Curves
Curve25519
Ed25519
ECC Advantages
Smaller Key Sizes
Computational Efficiency
Bandwidth Savings
ECC Implementation Considerations
Point Representation
Coordinate Systems
Side-Channel Resistance
Elliptic Curve Discrete Logarithm Problem
Problem Definition
Known Attacks
Security Parameters
Digital Signature Schemes
Digital Signature Principles
Authentication Property
Integrity Property
Non-repudiation Property
Signature Generation and Verification
Key Generation
Signing Algorithm
Verification Algorithm
RSA Signatures
Basic RSA Signature
Hash-and-Sign Paradigm
Padding Schemes
PKCS#1 v1.5
PSS Padding
Security Considerations
Digital Signature Algorithm
Mathematical Foundation
Parameter Generation
Key Generation
Signature Generation
Signature Verification
Security Analysis
Elliptic Curve Digital Signature Algorithm
ECDSA Parameters
Signature Generation
Signature Verification
Deterministic ECDSA
EdDSA Variants
Schnorr Signatures
Protocol Description
Security Properties
Batch Verification
Blind Signatures
Blinding Process
Unblinding Process
Ring Signatures
Anonymity Properties
Construction Methods
Threshold Signatures
Secret Sharing Integration
Distributed Signing
Previous
3. Symmetric Key Cryptography
Go to top
Next
5. Cryptographic Hash Functions