Useful Links
Computer Science
Cybersecurity
Cryptography and Network Security
1. Introduction to Security
2. Classical Encryption Techniques
3. Modern Symmetric Ciphers
4. Public-Key Cryptography and RSA
5. Cryptographic Hash Functions and Message Authentication
6. Digital Signatures and Authentication Protocols
7. Network Security Applications
8. Wireless Network Security
9. System and Infrastructure Security
10. Advanced and Emerging Topics
Modern Symmetric Ciphers
Block Ciphers and Stream Ciphers
Block Cipher Principles
Block Size
Common Block Sizes
Security Implications
Key Size
Key Length Requirements
Brute Force Resistance
Rounds
Round Functions
Security vs. Performance
Stream Cipher Principles
Key Stream Generation
Pseudorandom Generators
Seed Values
Synchronous Stream Ciphers
Self-synchronizing Properties
Error Propagation
Asynchronous Stream Ciphers
Feedback Mechanisms
Synchronization Requirements
Feistel Cipher Structure
Feistel Network Design
Left and Right Halves
Round Function Properties
Round Functions
Substitution Operations
Permutation Operations
Key Scheduling
Subkey Generation
Key Expansion
Data Encryption Standard (DES)
DES Algorithm Structure
Initial Permutation
Final Permutation
Feistel Rounds
16 Rounds
Round Function Details
S-boxes
Substitution Tables
Nonlinear Transformations
Design Criteria
DES Key Generation
Key Schedule Algorithm
Permuted Choice 1
Permuted Choice 2
Subkey Generation
Left Circular Shifts
48-bit Subkeys
Weaknesses and Triple DES (3DES)
DES Weaknesses
Short Key Length
Weak Keys
Semi-weak Keys
Brute Force Attacks
Computational Feasibility
Hardware Implementations
Meet-in-the-Middle Attack
Attack Methodology
Time-Memory Tradeoffs
Triple DES Structure
EDE Configuration
Key Options
Security Analysis
Advanced Encryption Standard (AES)
AES Structure and Design
Block Size
128-bit Blocks
Key Sizes
128-bit Keys
192-bit Keys
256-bit Keys
Number of Rounds
Round Variations by Key Size
AES Transformation Functions
SubBytes
S-box Substitution
Nonlinear Transformation
ShiftRows
Cyclic Shifts
Diffusion Properties
MixColumns
Matrix Multiplication
Galois Field Operations
AddRoundKey
XOR Operation
Subkey Addition
AES Key Expansion
Key Schedule Algorithm
Word-based Expansion
Recursive Generation
Round Key Generation
SubWord Function
RotWord Function
Round Constants
Security of AES
Known Attacks
Differential Cryptanalysis
Linear Cryptanalysis
Side-channel Attacks
Implementation Considerations
Constant-time Implementation
Cache-timing Attacks
Block Cipher Modes of Operation
Electronic Codebook (ECB)
Operation Mechanism
Use Cases
Limited Applications
Security Weaknesses
Pattern Preservation
Identical Block Problem
Cipher Block Chaining (CBC)
Initialization Vector (IV)
IV Requirements
IV Generation
Chaining Mechanism
Error Propagation
Single-bit Errors
Block Errors
Cipher Feedback (CFB)
Segment Size
Bit-level Feedback
Byte-level Feedback
Feedback Mechanism
Shift Register Operation
Error Propagation Properties
Output Feedback (OFB)
Stream Generation
Keystream Production
Synchronization Requirements
Error Propagation
No Error Propagation
Counter (CTR)
Counter Generation
Counter Values
Nonce Usage
Parallelization
Independent Block Processing
Random Access Properties
Stream Ciphers
RC4 Algorithm
Key Scheduling Algorithm (KSA)
State Array Initialization
Key Mixing
Pseudo-Random Generation Algorithm (PRGA)
State Array Updates
Output Generation
Security Issues with RC4
Biased Output
Related Key Attacks
WEP Vulnerabilities
Other Stream Ciphers
Salsa20
Quarter-round Function
Matrix Operations
Security Properties
ChaCha
ChaCha20 Variant
Improved Diffusion
Performance Characteristics
Previous
2. Classical Encryption Techniques
Go to top
Next
4. Public-Key Cryptography and RSA