Useful Links
Computer Science
Cybersecurity
Ethical Hacking
1. Foundations of Ethical Hacking
2. Networking Fundamentals for Hackers
3. The Ethical Hacking Methodology
4. Web Application Security Testing
5. Wireless Network Security
6. Social Engineering
7. Mobile Device Security
8. Cryptography and Cryptanalysis
9. Advanced Evasion and Anti-Forensics
10. Cloud Security and IoT Hacking
Cryptography and Cryptanalysis
Fundamental Cryptographic Concepts
Cryptographic Objectives
Confidentiality Assurance
Data Integrity Protection
Authentication Verification
Non-Repudiation Guarantee
Cryptographic Terminology
Plaintext and Ciphertext
Encryption and Decryption
Keys and Key Space
Cryptographic Algorithms
Cryptographic Principles
Kerckhoffs's Principle
Perfect Secrecy
Computational Security
Provable Security
Symmetric Cryptography
Stream Ciphers
Stream Cipher Principles
Linear Feedback Shift Registers
RC4 Algorithm
ChaCha20 Algorithm
Block Ciphers
Block Cipher Principles
Data Encryption Standard
DES Algorithm Structure
DES Vulnerabilities
Triple DES
Advanced Encryption Standard
AES Algorithm Structure
AES Key Sizes
AES Implementation
Block Cipher Modes
Electronic Codebook Mode
Cipher Block Chaining Mode
Counter Mode
Galois/Counter Mode
Symmetric Key Management
Key Generation
Key Distribution
Key Storage
Key Rotation
Asymmetric Cryptography
Public Key Cryptography Principles
Mathematical Foundations
Key Pair Generation
Public Key Distribution
RSA Algorithm
RSA Key Generation
RSA Encryption and Decryption
RSA Digital Signatures
RSA Security Considerations
Elliptic Curve Cryptography
Elliptic Curve Mathematics
ECC Key Generation
ECDSA Digital Signatures
ECC Advantages and Disadvantages
Diffie-Hellman Key Exchange
Key Exchange Protocol
Discrete Logarithm Problem
Elliptic Curve Diffie-Hellman
Cryptographic Hash Functions
Hash Function Properties
Deterministic Output
Fixed Output Size
Avalanche Effect
Irreversibility
Common Hash Algorithms
MD5 Algorithm
MD5 Structure
MD5 Vulnerabilities
SHA Family
SHA-1 Algorithm
SHA-2 Family
SHA-3 Algorithm
Hash Function Applications
Data Integrity Verification
Password Storage
Digital Signatures
Proof of Work Systems
Digital Signatures and PKI
Digital Signature Schemes
RSA Signatures
DSA Signatures
ECDSA Signatures
Public Key Infrastructure
Certificate Authorities
Digital Certificates
X.509 Certificate Format
Certificate Validation
Certificate Revocation
Trust Models
Hierarchical Trust Model
Web of Trust Model
Bridge Trust Model
PKI Implementation
Certificate Enrollment
Certificate Management
Key Recovery and Escrow
Cryptanalysis Techniques
Classical Cryptanalysis
Frequency Analysis
Pattern Analysis
Known Plaintext Attacks
Chosen Plaintext Attacks
Modern Cryptanalysis
Differential Cryptanalysis
Linear Cryptanalysis
Side-Channel Attacks
Timing Attacks
Power Analysis Attacks
Electromagnetic Attacks
Brute Force Attacks
Exhaustive Key Search
Dictionary Attacks
Rainbow Table Attacks
Mathematical Attacks
Factorization Attacks
Discrete Logarithm Attacks
Lattice-Based Attacks
Previous
7. Mobile Device Security
Go to top
Next
9. Advanced Evasion and Anti-Forensics