Cryptography

  1. Applied Cryptography and Security Protocols
    1. Network Security Protocols
      1. Transport Layer Security
        1. TLS Protocol Architecture
          1. Record Protocol
            1. Handshake Protocol
              1. Alert Protocol
                1. Application Data Protocol
                2. TLS Handshake Process
                  1. ClientHello Message
                    1. ServerHello Message
                      1. Certificate Exchange
                        1. Key Exchange
                          1. Finished Messages
                          2. TLS Record Protocol
                            1. Fragmentation
                              1. Compression
                                1. MAC Computation
                                  1. Encryption
                                  2. Cipher Suites
                                    1. Key Exchange Algorithms
                                      1. Authentication Algorithms
                                        1. Bulk Encryption Algorithms
                                          1. MAC Algorithms
                                            1. Cipher Suite Selection
                                            2. TLS Extensions
                                              1. Server Name Indication
                                                1. Application Layer Protocol Negotiation
                                                  1. Extended Master Secret
                                                  2. TLS Versions
                                                    1. SSL 2.0 and 3.0
                                                      1. TLS 1.0
                                                        1. TLS 1.1
                                                          1. TLS 1.2
                                                            1. TLS 1.3
                                                              1. Version Negotiation
                                                              2. Perfect Forward Secrecy
                                                                1. Ephemeral Key Exchange
                                                                  1. DHE and ECDHE
                                                                    1. Security Benefits
                                                                    2. TLS Security Considerations
                                                                      1. Certificate Validation
                                                                        1. Cipher Suite Security
                                                                          1. Implementation Vulnerabilities
                                                                        2. Internet Protocol Security
                                                                          1. IPsec Architecture
                                                                            1. Security Associations
                                                                              1. Security Policy Database
                                                                                1. Security Association Database
                                                                                2. IPsec Protocols
                                                                                  1. Authentication Header
                                                                                    1. Integrity Protection
                                                                                      1. Authentication
                                                                                        1. Anti-replay Protection
                                                                                        2. Encapsulating Security Payload
                                                                                          1. Confidentiality
                                                                                            1. Integrity
                                                                                              1. Authentication
                                                                                            2. IPsec Modes
                                                                                              1. Transport Mode
                                                                                                1. Tunnel Mode
                                                                                                  1. Mode Selection Criteria
                                                                                                  2. Internet Key Exchange
                                                                                                    1. IKEv1 Protocol
                                                                                                      1. IKEv2 Protocol
                                                                                                        1. Key Derivation
                                                                                                          1. Perfect Forward Secrecy
                                                                                                          2. IPsec Applications
                                                                                                            1. VPN Implementation
                                                                                                              1. Site-to-Site Connectivity
                                                                                                                1. Remote Access
                                                                                                              2. Secure Shell Protocol
                                                                                                                1. SSH Protocol Architecture
                                                                                                                  1. Transport Layer Protocol
                                                                                                                    1. User Authentication Protocol
                                                                                                                      1. Connection Protocol
                                                                                                                      2. SSH Key Exchange
                                                                                                                        1. Diffie-Hellman Key Exchange
                                                                                                                          1. Host Key Verification
                                                                                                                            1. Session Key Derivation
                                                                                                                            2. SSH Authentication Methods
                                                                                                                              1. Password Authentication
                                                                                                                                1. Public Key Authentication
                                                                                                                                  1. Host-based Authentication
                                                                                                                                    1. Keyboard-Interactive Authentication
                                                                                                                                    2. SSH Applications
                                                                                                                                      1. Remote Shell Access
                                                                                                                                        1. File Transfer
                                                                                                                                          1. Port Forwarding
                                                                                                                                            1. Tunneling
                                                                                                                                        2. Email Security
                                                                                                                                          1. Pretty Good Privacy
                                                                                                                                            1. PGP Architecture
                                                                                                                                              1. Web of Trust
                                                                                                                                                1. Key Management
                                                                                                                                                  1. Message Processing
                                                                                                                                                  2. PGP Operations
                                                                                                                                                    1. Digital Signatures
                                                                                                                                                      1. Encryption
                                                                                                                                                        1. Compression
                                                                                                                                                          1. Radix-64 Encoding
                                                                                                                                                          2. OpenPGP Standard
                                                                                                                                                            1. Message Format
                                                                                                                                                              1. Key Format
                                                                                                                                                                1. Interoperability
                                                                                                                                                              2. S/MIME
                                                                                                                                                                1. S/MIME Architecture
                                                                                                                                                                  1. Certificate-based Trust
                                                                                                                                                                    1. Message Security Services
                                                                                                                                                                      1. Integration with Email Clients
                                                                                                                                                                      2. Email Security Considerations
                                                                                                                                                                        1. Key Distribution
                                                                                                                                                                          1. Certificate Management
                                                                                                                                                                            1. Usability Challenges
                                                                                                                                                                          2. Wireless Security
                                                                                                                                                                            1. Wi-Fi Security Protocols
                                                                                                                                                                              1. Wired Equivalent Privacy
                                                                                                                                                                                1. RC4 Stream Cipher
                                                                                                                                                                                  1. CRC-32 Integrity Check
                                                                                                                                                                                    1. Security Vulnerabilities
                                                                                                                                                                                      1. Attack Methods
                                                                                                                                                                                      2. Wi-Fi Protected Access
                                                                                                                                                                                        1. WPA Improvements
                                                                                                                                                                                          1. TKIP Protocol
                                                                                                                                                                                            1. Message Integrity Check
                                                                                                                                                                                            2. WPA2
                                                                                                                                                                                              1. AES-CCMP
                                                                                                                                                                                                1. Robust Security Network
                                                                                                                                                                                                  1. Pre-shared Key Mode
                                                                                                                                                                                                    1. Enterprise Mode
                                                                                                                                                                                                    2. WPA3
                                                                                                                                                                                                      1. Simultaneous Authentication of Equals
                                                                                                                                                                                                        1. Enhanced Open
                                                                                                                                                                                                          1. Easy Connect
                                                                                                                                                                                                            1. Enterprise Security Enhancements
                                                                                                                                                                                                          2. Cellular Security
                                                                                                                                                                                                            1. GSM Security
                                                                                                                                                                                                              1. A5/1 and A5/2 Algorithms
                                                                                                                                                                                                                1. Authentication and Key Agreement
                                                                                                                                                                                                                  1. Security Limitations
                                                                                                                                                                                                                  2. 3G Security
                                                                                                                                                                                                                    1. KASUMI Algorithm
                                                                                                                                                                                                                      1. Mutual Authentication
                                                                                                                                                                                                                        1. Integrity Protection
                                                                                                                                                                                                                        2. 4G LTE Security
                                                                                                                                                                                                                          1. AES-based Algorithms
                                                                                                                                                                                                                            1. Enhanced Key Hierarchy
                                                                                                                                                                                                                              1. Backhaul Protection
                                                                                                                                                                                                                              2. 5G Security
                                                                                                                                                                                                                                1. Enhanced Authentication
                                                                                                                                                                                                                                  1. Network Slicing Security
                                                                                                                                                                                                                                    1. Edge Computing Security
                                                                                                                                                                                                                                  2. Bluetooth Security
                                                                                                                                                                                                                                    1. Bluetooth Security Architecture
                                                                                                                                                                                                                                      1. Pairing Mechanisms
                                                                                                                                                                                                                                        1. Encryption and Authentication
                                                                                                                                                                                                                                          1. Security Vulnerabilities
                                                                                                                                                                                                                                        2. Web Security
                                                                                                                                                                                                                                          1. HTTPS Implementation
                                                                                                                                                                                                                                            1. Certificate Management
                                                                                                                                                                                                                                              1. Mixed Content Issues
                                                                                                                                                                                                                                                1. HTTP Strict Transport Security
                                                                                                                                                                                                                                                2. Web Application Security
                                                                                                                                                                                                                                                  1. Cross-Site Scripting Prevention
                                                                                                                                                                                                                                                    1. SQL Injection Prevention
                                                                                                                                                                                                                                                      1. Cross-Site Request Forgery Protection
                                                                                                                                                                                                                                                      2. Browser Security
                                                                                                                                                                                                                                                        1. Same-Origin Policy
                                                                                                                                                                                                                                                          1. Content Security Policy
                                                                                                                                                                                                                                                            1. Certificate Pinning
                                                                                                                                                                                                                                                          2. Messaging Security
                                                                                                                                                                                                                                                            1. Instant Messaging Security
                                                                                                                                                                                                                                                              1. Off-the-Record Messaging
                                                                                                                                                                                                                                                                1. Signal Protocol
                                                                                                                                                                                                                                                                  1. End-to-End Encryption
                                                                                                                                                                                                                                                                  2. Group Messaging Security
                                                                                                                                                                                                                                                                    1. Key Distribution Challenges
                                                                                                                                                                                                                                                                      1. Forward Secrecy in Groups
                                                                                                                                                                                                                                                                        1. Post-Compromise Security