Useful Links
Computer Science
Cybersecurity
Cryptography and Network Security
1. Introduction to Security
2. Classical Encryption Techniques
3. Modern Symmetric Ciphers
4. Public-Key Cryptography and RSA
5. Cryptographic Hash Functions and Message Authentication
6. Digital Signatures and Authentication Protocols
7. Network Security Applications
8. Wireless Network Security
9. System and Infrastructure Security
10. Advanced and Emerging Topics
Advanced and Emerging Topics
Quantum Cryptography
Quantum Mechanics Principles
Quantum States
Quantum Superposition
Quantum Entanglement
Quantum Measurement
Quantum Key Distribution (QKD)
QKD Principles
Quantum No-cloning Theorem
Quantum Uncertainty Principle
BB84 Protocol
Photon Polarization
Basis Selection
Key Sifting
Error Detection
Other QKD Protocols
B92 Protocol
E91 Protocol
Security of QKD
Information-theoretic Security
Eavesdropping Detection
Practical Limitations
Quantum Attacks on Classical Cryptography
Shor's Algorithm
Integer Factorization
Discrete Logarithm
Impact on RSA and ECC
Grover's Algorithm
Symmetric Key Search
Hash Function Attacks
Impact on Symmetric Cryptography
Post-Quantum Cryptography
Post-Quantum Cryptography Overview
Quantum-resistant Algorithms
NIST Standardization Process
Lattice-Based Cryptography
Lattice Problems
Shortest Vector Problem
Closest Vector Problem
Learning With Errors (LWE)
NTRU Cryptosystem
Kyber Key Encapsulation
Code-Based Cryptography
Error-correcting Codes
McEliece Cryptosystem
Niederreiter Cryptosystem
Multivariate Cryptography
Multivariate Polynomial Systems
Hidden Field Equations
Rainbow Signature Scheme
Hash-Based Cryptography
Merkle Signature Scheme
XMSS
SPHINCS+
Isogeny-Based Cryptography
Elliptic Curve Isogenies
SIDH Protocol
Blockchain and Cryptocurrency Security
Blockchain Fundamentals
Distributed Ledger Technology
Block Structure
Block Header
Transaction Data
Merkle Trees
Cryptographic Hash Chains
Immutability Properties
Consensus Mechanisms
Proof of Work (PoW)
Mining Process
Difficulty Adjustment
Energy Consumption
Proof of Stake (PoS)
Validator Selection
Slashing Conditions
Other Consensus Mechanisms
Delegated Proof of Stake
Practical Byzantine Fault Tolerance
Cryptocurrency Security
Digital Signatures in Cryptocurrencies
Address Generation
Transaction Verification
Smart Contract Security
Smart Contract Vulnerabilities
Reentrancy Attacks
Integer Overflow
Access Control Issues
Security Best Practices
Formal Verification
Cryptocurrency Wallet Security
Hot Wallets vs. Cold Wallets
Private Key Management
Multi-signature Wallets
Hardware Security Modules
Cloud Security
Cloud Computing Models
Infrastructure as a Service (IaaS)
Platform as a Service (PaaS)
Software as a Service (SaaS)
Cloud Deployment Models
Public Cloud
Shared Infrastructure
Cost Benefits
Security Considerations
Private Cloud
Dedicated Infrastructure
Enhanced Control
Compliance Benefits
Hybrid Cloud
Mixed Deployment
Data Portability
Complexity Challenges
Multi-cloud
Vendor Diversification
Risk Distribution
Cloud Security Challenges
Data Location and Sovereignty
Shared Responsibility Model
Vendor Lock-in
Compliance Requirements
Data Protection in the Cloud
Data Encryption
Encryption at Rest
Encryption in Transit
Key Management
Data Loss Prevention
Data Backup and Recovery
Identity and Access Management in Cloud
Cloud Identity Providers
Single Sign-On (SSO)
Federation
Privileged Access Management
Cloud Security Threats
Data Breaches
Account Hijacking
Insider Threats
Denial of Service Attacks
Internet of Things (IoT) Security
IoT Architecture
Device Layer
Connectivity Layer
Data Processing Layer
Application Layer
IoT Security Challenges
Resource Constraints
Limited Processing Power
Memory Limitations
Battery Life
Scale and Diversity
Heterogeneous Devices
Massive Deployment
Physical Security
Device Tampering
Physical Access
Device Authentication
Device Identity
Certificate-based Authentication
Lightweight Authentication Protocols
Secure Communication Protocols for IoT
Constrained Application Protocol (CoAP)
Message Queuing Telemetry Transport (MQTT)
Datagram Transport Layer Security (DTLS)
Object Security for Constrained RESTful Environments (OSCORE)
IoT Security Best Practices
Secure Boot
Firmware Updates
Network Segmentation
Monitoring and Logging
Previous
9. System and Infrastructure Security
Go to top
Back to Start
1. Introduction to Security