Cryptography and Network Security

  1. Cryptographic Hash Functions and Message Authentication
    1. Hash Functions
      1. Definition and Properties
        1. Fixed Output Length
          1. Deterministic Computation
            1. Avalanche Effect
            2. Applications of Cryptographic Hash Functions
              1. Data Integrity Verification
                1. Password Storage and Verification
                  1. Digital Signature Generation
                    1. Message Authentication Codes
                      1. Proof of Work Systems
                      2. Security Requirements
                        1. Preimage Resistance
                          1. One-way Property
                            1. First Preimage Attack
                            2. Second Preimage Resistance
                              1. Weak Collision Resistance
                                1. Target Collision Attack
                                2. Collision Resistance
                                  1. Strong Collision Resistance
                                    1. Birthday Attack
                                    2. Avalanche Effect
                                      1. Bit Independence
                                        1. Uniform Distribution
                                      2. Hash Function Construction
                                        1. Merkle-Damgård Construction
                                          1. Compression Function
                                            1. Padding Schemes
                                            2. Sponge Construction
                                              1. Absorption Phase
                                                1. Squeezing Phase
                                              2. Secure Hash Algorithm (SHA)
                                                1. SHA-1
                                                  1. Structure and Operation
                                                    1. Message Scheduling
                                                      1. Compression Function
                                                        1. Round Operations
                                                        2. Security Issues
                                                          1. Collision Attacks
                                                            1. Deprecation Status
                                                          2. SHA-2 Family
                                                            1. SHA-224
                                                              1. SHA-256
                                                                1. Algorithm Structure
                                                                  1. Message Expansion
                                                                    1. Compression Function
                                                                    2. SHA-384
                                                                      1. SHA-512
                                                                        1. 64-bit Word Operations
                                                                          1. Extended Message Schedule
                                                                          2. Security Analysis
                                                                            1. Current Security Status
                                                                              1. Known Attacks
                                                                            2. SHA-3
                                                                              1. Keccak Algorithm
                                                                                1. Sponge Construction
                                                                                  1. Permutation Function
                                                                                  2. Differences from SHA-2
                                                                                    1. Construction Method
                                                                                      1. Security Margins
                                                                                      2. Variants
                                                                                        1. SHA3-224
                                                                                          1. SHA3-256
                                                                                            1. SHA3-384
                                                                                              1. SHA3-512
                                                                                        2. Message Authentication Codes (MACs)
                                                                                          1. MAC Requirements
                                                                                            1. Authentication Property
                                                                                              1. Integrity Verification
                                                                                                1. Keyed Hash Functions
                                                                                                  1. Secret Key Requirement
                                                                                                  2. Unforgeability
                                                                                                    1. Existential Unforgeability
                                                                                                      1. Strong Unforgeability
                                                                                                    2. Security Properties
                                                                                                      1. Computation Resistance
                                                                                                        1. Forgery Resistance
                                                                                                          1. Key Recovery Resistance
                                                                                                          2. MACs based on Hash Functions (HMAC)
                                                                                                            1. HMAC Construction
                                                                                                              1. Inner and Outer Padding
                                                                                                                1. Key Processing
                                                                                                                2. HMAC Algorithm
                                                                                                                  1. Key Preparation
                                                                                                                    1. Hash Computation
                                                                                                                    2. Security Analysis
                                                                                                                      1. Provable Security
                                                                                                                        1. Resistance to Extension Attacks
                                                                                                                      2. MACs based on Block Ciphers
                                                                                                                        1. CBC-MAC
                                                                                                                          1. Cipher Block Chaining
                                                                                                                            1. Final Block Processing
                                                                                                                            2. CMAC
                                                                                                                              1. CMAC Construction
                                                                                                                                1. Subkey Generation
                                                                                                                                  1. Security Analysis
                                                                                                                                  2. GMAC
                                                                                                                                    1. Galois Field Operations
                                                                                                                                      1. Authentication Tag Generation