Useful Links
Computer Science
Cybersecurity
Cryptography
1. Foundations of Cryptography
2. Mathematical Foundations
3. Symmetric Key Cryptography
4. Asymmetric Key Cryptography
5. Cryptographic Hash Functions
6. Message Authentication and Integrity
7. Key Management and Distribution
8. Cryptanalysis and Security Analysis
9. Applied Cryptography and Security Protocols
10. Advanced Cryptographic Concepts
11. Cryptographic Standards and Compliance
Applied Cryptography and Security Protocols
Network Security Protocols
Transport Layer Security
TLS Protocol Architecture
Record Protocol
Handshake Protocol
Alert Protocol
Application Data Protocol
TLS Handshake Process
ClientHello Message
ServerHello Message
Certificate Exchange
Key Exchange
Finished Messages
TLS Record Protocol
Fragmentation
Compression
MAC Computation
Encryption
Cipher Suites
Key Exchange Algorithms
Authentication Algorithms
Bulk Encryption Algorithms
MAC Algorithms
Cipher Suite Selection
TLS Extensions
Server Name Indication
Application Layer Protocol Negotiation
Extended Master Secret
TLS Versions
SSL 2.0 and 3.0
TLS 1.0
TLS 1.1
TLS 1.2
TLS 1.3
Version Negotiation
Perfect Forward Secrecy
Ephemeral Key Exchange
DHE and ECDHE
Security Benefits
TLS Security Considerations
Certificate Validation
Cipher Suite Security
Implementation Vulnerabilities
Internet Protocol Security
IPsec Architecture
Security Associations
Security Policy Database
Security Association Database
IPsec Protocols
Authentication Header
Integrity Protection
Authentication
Anti-replay Protection
Encapsulating Security Payload
Confidentiality
Integrity
Authentication
IPsec Modes
Transport Mode
Tunnel Mode
Mode Selection Criteria
Internet Key Exchange
IKEv1 Protocol
IKEv2 Protocol
Key Derivation
Perfect Forward Secrecy
IPsec Applications
VPN Implementation
Site-to-Site Connectivity
Remote Access
Secure Shell Protocol
SSH Protocol Architecture
Transport Layer Protocol
User Authentication Protocol
Connection Protocol
SSH Key Exchange
Diffie-Hellman Key Exchange
Host Key Verification
Session Key Derivation
SSH Authentication Methods
Password Authentication
Public Key Authentication
Host-based Authentication
Keyboard-Interactive Authentication
SSH Applications
Remote Shell Access
File Transfer
Port Forwarding
Tunneling
Email Security
Pretty Good Privacy
PGP Architecture
Web of Trust
Key Management
Message Processing
PGP Operations
Digital Signatures
Encryption
Compression
Radix-64 Encoding
OpenPGP Standard
Message Format
Key Format
Interoperability
S/MIME
S/MIME Architecture
Certificate-based Trust
Message Security Services
Integration with Email Clients
Email Security Considerations
Key Distribution
Certificate Management
Usability Challenges
Wireless Security
Wi-Fi Security Protocols
Wired Equivalent Privacy
RC4 Stream Cipher
CRC-32 Integrity Check
Security Vulnerabilities
Attack Methods
Wi-Fi Protected Access
WPA Improvements
TKIP Protocol
Message Integrity Check
WPA2
AES-CCMP
Robust Security Network
Pre-shared Key Mode
Enterprise Mode
WPA3
Simultaneous Authentication of Equals
Enhanced Open
Easy Connect
Enterprise Security Enhancements
Cellular Security
GSM Security
A5/1 and A5/2 Algorithms
Authentication and Key Agreement
Security Limitations
3G Security
KASUMI Algorithm
Mutual Authentication
Integrity Protection
4G LTE Security
AES-based Algorithms
Enhanced Key Hierarchy
Backhaul Protection
5G Security
Enhanced Authentication
Network Slicing Security
Edge Computing Security
Bluetooth Security
Bluetooth Security Architecture
Pairing Mechanisms
Encryption and Authentication
Security Vulnerabilities
Web Security
HTTPS Implementation
Certificate Management
Mixed Content Issues
HTTP Strict Transport Security
Web Application Security
Cross-Site Scripting Prevention
SQL Injection Prevention
Cross-Site Request Forgery Protection
Browser Security
Same-Origin Policy
Content Security Policy
Certificate Pinning
Messaging Security
Instant Messaging Security
Off-the-Record Messaging
Signal Protocol
End-to-End Encryption
Group Messaging Security
Key Distribution Challenges
Forward Secrecy in Groups
Post-Compromise Security
Previous
8. Cryptanalysis and Security Analysis
Go to top
Next
10. Advanced Cryptographic Concepts