Cryptography

  1. Message Authentication and Integrity
    1. Message Authentication Codes
      1. MAC Properties
        1. Authentication Assurance
          1. Integrity Protection
            1. Key Dependency
            2. MAC Security Requirements
              1. Existential Unforgeability
                1. Chosen Message Attacks
                  1. Key Recovery Resistance
                  2. MAC Construction Methods
                    1. Hash-based MACs
                      1. HMAC Algorithm
                        1. Security Analysis
                          1. Key Length Requirements
                            1. Nested MAC Construction
                            2. Block Cipher-based MACs
                              1. CBC-MAC
                                1. Basic Construction
                                  1. Security Limitations
                                    1. Message Length Requirements
                                    2. CMAC
                                      1. Subkey Generation
                                        1. Padding Rules
                                          1. Security Properties
                                          2. GMAC
                                            1. Galois Field Multiplication
                                              1. Authentication Tag Generation
                                            2. Universal Hash Function MACs
                                              1. Wegman-Carter Construction
                                                1. Polynomial Evaluation
                                              2. MAC Applications
                                                1. Network Protocol Security
                                                  1. File Integrity Protection
                                                    1. API Authentication
                                                    2. MAC Limitations
                                                      1. Key Distribution Requirements
                                                        1. Non-repudiation Absence
                                                      2. Authenticated Encryption
                                                        1. Authenticated Encryption Concepts
                                                          1. Confidentiality and Authenticity
                                                            1. Associated Data Protection
                                                            2. Generic Composition Methods
                                                              1. Encrypt-then-MAC
                                                                1. MAC-then-Encrypt
                                                                  1. Encrypt-and-MAC
                                                                    1. Security Analysis
                                                                    2. Dedicated Authenticated Encryption Modes
                                                                      1. GCM Mode
                                                                        1. Counter Mode Encryption
                                                                          1. GHASH Authentication
                                                                            1. Performance Characteristics
                                                                            2. CCM Mode
                                                                              1. CBC-MAC Authentication
                                                                                1. Counter Mode Encryption
                                                                                  1. Nonce Requirements
                                                                                  2. EAX Mode
                                                                                    1. OMAC Authentication
                                                                                      1. Counter Mode Encryption
                                                                                      2. OCB Mode
                                                                                        1. Offset Codebook
                                                                                          1. Parallelizable Operations
                                                                                            1. Patent Considerations
                                                                                          2. AEAD Algorithms
                                                                                            1. ChaCha20-Poly1305
                                                                                              1. Stream Cipher Integration
                                                                                                1. Polynomial MAC
                                                                                                2. AES-GCM
                                                                                                  1. Hardware Acceleration
                                                                                                    1. Implementation Considerations
                                                                                                3. Digital Signatures
                                                                                                  1. Signature Scheme Components
                                                                                                    1. Key Generation Algorithm
                                                                                                      1. Signing Algorithm
                                                                                                        1. Verification Algorithm
                                                                                                        2. Security Properties
                                                                                                          1. Existential Unforgeability
                                                                                                            1. Chosen Message Attacks
                                                                                                              1. Strong Unforgeability
                                                                                                              2. Hash-and-Sign Paradigm
                                                                                                                1. Message Hashing
                                                                                                                  1. Signature Generation
                                                                                                                    1. Verification Process
                                                                                                                    2. Signature Algorithms
                                                                                                                      1. RSA-PSS
                                                                                                                        1. Probabilistic Signature Scheme
                                                                                                                          1. Salt Generation
                                                                                                                            1. Mask Generation Function
                                                                                                                            2. DSA Variants
                                                                                                                              1. Parameter Generation
                                                                                                                                1. Signature Generation
                                                                                                                                  1. Verification Process
                                                                                                                                  2. ECDSA Implementation
                                                                                                                                    1. Curve Parameters
                                                                                                                                      1. Nonce Generation
                                                                                                                                        1. Signature Encoding
                                                                                                                                      2. Advanced Signature Schemes
                                                                                                                                        1. Multi-signature Schemes
                                                                                                                                          1. Key Aggregation
                                                                                                                                            1. Signature Aggregation
                                                                                                                                            2. Threshold Signatures
                                                                                                                                              1. Secret Sharing
                                                                                                                                                1. Distributed Signing
                                                                                                                                                2. Blind Signatures
                                                                                                                                                  1. Blinding Factor
                                                                                                                                                    1. Unblinding Process
                                                                                                                                                    2. Ring Signatures
                                                                                                                                                      1. Signer Anonymity
                                                                                                                                                        1. Linkability Properties
                                                                                                                                                      2. Signature Applications
                                                                                                                                                        1. Software Distribution
                                                                                                                                                          1. Document Signing
                                                                                                                                                            1. Blockchain Transactions
                                                                                                                                                              1. Code Signing