Cryptography

Cryptography is the science and practice of securing communication and information through the use of codes, so that only the intended recipients can read and process it. As a fundamental pillar of both computer science and cybersecurity, it employs mathematical algorithms and keys to perform encryption (converting readable plaintext into unreadable ciphertext) and decryption (reversing the process). Modern cryptography goes beyond mere secrecy to provide essential security services such as data integrity, ensuring information is unaltered; authentication, verifying the identity of users; and non-repudiation, preventing senders from denying they sent a message, thereby protecting everything from private emails to financial transactions.

  1. Foundations of Cryptography
    1. Core Concepts and Terminology
      1. Cryptography
        1. Cryptanalysis
          1. Cryptology
            1. Plaintext
              1. Ciphertext
                1. Keys
                  1. Secret Keys
                    1. Public Keys
                      1. Private Keys
                        1. Key Space
                          1. Key Length
                          2. Encryption
                            1. Decryption
                              1. Ciphers
                                1. Definition of a Cipher
                                  1. Cipher vs. Code Distinction
                                  2. Algorithm vs. Key Distinction
                                    1. Kerckhoffs's Principle
                                      1. Security by Obscurity vs. Open Design
                                        1. Computational Security vs. Information-Theoretic Security
                                        2. Historical Context and Evolution
                                          1. Ancient Cryptography
                                            1. Scytale
                                              1. Atbash Cipher
                                                1. Polybius Square
                                                2. Medieval and Renaissance Cryptography
                                                  1. Alberti Cipher Disk
                                                    1. Trithemius Tabula Recta
                                                    2. Modern Era Developments
                                                      1. Telegraph and Communication Security
                                                        1. World War Cryptography
                                                          1. Computer Age Cryptography
                                                        2. Classical Cryptography
                                                          1. Substitution Ciphers
                                                            1. Monoalphabetic Substitution
                                                              1. Caesar Cipher
                                                                1. Algorithm Description
                                                                  1. Mathematical Representation
                                                                    1. Security Analysis
                                                                      1. Brute Force Vulnerability
                                                                      2. Simple Substitution Cipher
                                                                        1. Keyspace Analysis
                                                                          1. Frequency Analysis Vulnerability
                                                                            1. Pattern Recognition Attacks
                                                                            2. Affine Cipher
                                                                              1. Mathematical Foundation
                                                                                1. Encryption and Decryption
                                                                                  1. Key Requirements
                                                                                2. Polyalphabetic Substitution
                                                                                  1. Vigenère Cipher
                                                                                    1. Encryption Process
                                                                                      1. Decryption Process
                                                                                        1. Key Repetition Problem
                                                                                          1. Kasiski Examination
                                                                                            1. Index of Coincidence Attack
                                                                                            2. Beaufort Cipher
                                                                                              1. Autokey Cipher
                                                                                                1. Running Key Cipher
                                                                                              2. Transposition Ciphers
                                                                                                1. Simple Transposition
                                                                                                  1. Rail Fence Cipher
                                                                                                    1. Encryption Process
                                                                                                      1. Decryption Process
                                                                                                        1. Security Limitations
                                                                                                        2. Route Cipher
                                                                                                        3. Columnar Transposition
                                                                                                          1. Simple Columnar Transposition
                                                                                                            1. Keyed Columnar Transposition
                                                                                                              1. Double Transposition
                                                                                                              2. Block Transposition
                                                                                                              3. Combination Ciphers
                                                                                                                1. Substitution-Transposition Combinations
                                                                                                                  1. Fractionating Ciphers
                                                                                                                    1. Playfair Cipher
                                                                                                                      1. Four-Square Cipher
                                                                                                                        1. Two-Square Cipher
                                                                                                                      2. Mechanical and Electromechanical Systems
                                                                                                                        1. Cipher Wheels and Disks
                                                                                                                          1. Rotor Machines
                                                                                                                            1. Enigma Machine
                                                                                                                              1. Rotor Mechanism
                                                                                                                                1. Plugboard Configuration
                                                                                                                                  1. Daily Key Settings
                                                                                                                                    1. Cryptanalysis Methods
                                                                                                                                      1. Historical Impact
                                                                                                                                      2. Lorenz Cipher Machine
                                                                                                                                        1. Teleprinter Encryption
                                                                                                                                          1. Wheel Patterns
                                                                                                                                            1. Colossus Computer
                                                                                                                                            2. Purple Machine
                                                                                                                                              1. SIGABA
                                                                                                                                          2. Fundamental Security Goals
                                                                                                                                            1. Confidentiality
                                                                                                                                              1. Data Confidentiality
                                                                                                                                                1. Privacy Protection
                                                                                                                                                  1. Information Hiding
                                                                                                                                                  2. Integrity
                                                                                                                                                    1. Data Integrity
                                                                                                                                                      1. Message Integrity
                                                                                                                                                        1. System Integrity
                                                                                                                                                        2. Authentication
                                                                                                                                                          1. Entity Authentication
                                                                                                                                                            1. Data Origin Authentication
                                                                                                                                                              1. Message Authentication
                                                                                                                                                              2. Non-repudiation
                                                                                                                                                                1. Digital Evidence
                                                                                                                                                                  1. Proof of Origin
                                                                                                                                                                    1. Proof of Delivery
                                                                                                                                                                    2. Availability
                                                                                                                                                                      1. System Availability
                                                                                                                                                                        1. Data Availability
                                                                                                                                                                          1. Service Continuity
                                                                                                                                                                          2. Authorization
                                                                                                                                                                            1. Access Control
                                                                                                                                                                              1. Permission Management
                                                                                                                                                                              2. Accountability
                                                                                                                                                                                1. Audit Trails
                                                                                                                                                                                  1. Logging and Monitoring
                                                                                                                                                                                  2. Security Goal Relationships
                                                                                                                                                                                    1. Interdependencies
                                                                                                                                                                                      1. Trade-offs
                                                                                                                                                                                        1. Balanced Security Design
                                                                                                                                                                                      2. Threat Models and Attack Classifications
                                                                                                                                                                                        1. Passive Attacks
                                                                                                                                                                                          1. Eavesdropping
                                                                                                                                                                                            1. Traffic Analysis
                                                                                                                                                                                              1. Cryptanalysis
                                                                                                                                                                                              2. Active Attacks
                                                                                                                                                                                                1. Masquerade
                                                                                                                                                                                                  1. Replay
                                                                                                                                                                                                    1. Message Modification
                                                                                                                                                                                                      1. Denial of Service
                                                                                                                                                                                                      2. Insider vs. Outsider Threats
                                                                                                                                                                                                        1. Computational vs. Information-Theoretic Attacks