Quantum Cryptography and Post-Quantum Cryptography

Quantum Cryptography and Post-Quantum Cryptography represent two distinct approaches to securing information in the era of quantum computing. Quantum Cryptography, such as Quantum Key Distribution (QKD), utilizes the principles of quantum mechanics to create provably secure communication channels where any attempt to eavesdrop is immediately detectable due to the disturbance of the quantum state. In contrast, Post-Quantum Cryptography (PQC), or quantum-resistant cryptography, involves the development of new classical algorithms that can run on conventional computers but are mathematically designed to be secure against attacks from both classical and future quantum computers, ensuring the long-term security of data against the threat of quantum code-breaking.

  1. Foundations of Modern Cryptography
    1. Classical Cryptography Fundamentals
      1. Symmetric-Key Cryptography
        1. Definition and Basic Principles
          1. Block Ciphers
            1. Structure and Operation
              1. Advanced Encryption Standard (AES)
                1. Data Encryption Standard (DES)
                  1. Triple DES (3DES)
                    1. Modes of Operation
                      1. Electronic Codebook (ECB)
                        1. Cipher Block Chaining (CBC)
                          1. Counter (CTR)
                            1. Galois/Counter Mode (GCM)
                              1. Output Feedback (OFB)
                                1. Cipher Feedback (CFB)
                              2. Stream Ciphers
                                1. Structure and Operation
                                  1. RC4 Algorithm
                                    1. Salsa20 and ChaCha20
                                      1. Linear Feedback Shift Registers
                                      2. Key Distribution Problem
                                        1. Challenges in Secure Key Exchange
                                          1. Historical Solutions
                                            1. Trusted Third Party Approaches
                                          2. Asymmetric-Key Cryptography
                                            1. Definition and Basic Principles
                                              1. Key Pairs
                                                1. Public Key Properties
                                                  1. Private Key Properties
                                                    1. Key Generation Algorithms
                                                      1. Key Management Practices
                                                      2. RSA Cryptosystem
                                                        1. Mathematical Foundation
                                                          1. Key Generation Process
                                                            1. Encryption and Decryption
                                                              1. Security Analysis
                                                              2. Elliptic Curve Cryptography
                                                                1. Mathematical Foundation
                                                                  1. Elliptic Curve Operations
                                                                    1. Key Generation
                                                                      1. Encryption and Decryption
                                                                      2. Digital Signatures
                                                                        1. Signing Process
                                                                          1. Verification Process
                                                                            1. RSA Signatures
                                                                              1. DSA and ECDSA
                                                                                1. Authentication Properties
                                                                                  1. Integrity Properties
                                                                                  2. Key Exchange Protocols
                                                                                    1. Diffie-Hellman Key Exchange
                                                                                      1. Elliptic Curve Diffie-Hellman
                                                                                        1. Security Considerations
                                                                                          1. Man-in-the-Middle Vulnerabilities
                                                                                        2. Cryptographic Hash Functions
                                                                                          1. Properties
                                                                                            1. Preimage Resistance
                                                                                              1. Second Preimage Resistance
                                                                                                1. Collision Resistance
                                                                                                2. SHA-2 Family
                                                                                                  1. SHA-3 Family
                                                                                                    1. MD5 and SHA-1 Vulnerabilities
                                                                                                      1. Applications
                                                                                                        1. Data Integrity Verification
                                                                                                          1. Digital Signature Support
                                                                                                            1. Password Hashing
                                                                                                              1. Merkle Trees
                                                                                                            2. Security Assumptions in Classical Cryptography
                                                                                                              1. Integer Factorization Problem
                                                                                                                1. Mathematical Definition
                                                                                                                  1. Role in RSA Security
                                                                                                                    1. Computational Complexity
                                                                                                                      1. Best Known Classical Algorithms
                                                                                                                      2. Discrete Logarithm Problem
                                                                                                                        1. Mathematical Definition
                                                                                                                          1. Role in Diffie-Hellman Security
                                                                                                                            1. Role in DSA Security
                                                                                                                              1. Computational Complexity
                                                                                                                              2. Elliptic Curve Discrete Logarithm Problem
                                                                                                                                1. Mathematical Definition
                                                                                                                                  1. Role in ECC Security
                                                                                                                                    1. Computational Complexity
                                                                                                                                      1. Advantages over Standard DLP