Cryptography Design and Implementation

From Smithnet Wiki
Jump to navigation Jump to search

Encryption

Understanding encryption

Symmetric and asymmetric encryption

Goals of cryptography

Codes and cyphers

Cryptographic math

Choosing encryption algorithms

The perfect encryption algorithm

The cryptographic lifecycle

Symmetric Cryptography

Data Encryption Standard (DES)

3DES

AES, blowfish, twofish

RC4

Cypher modes

Steganography

Asymmetric Cryptography

Rivest, Shamir, Adelman (RSA)

PGP and GnuPG

Elliptic-curve and quantum cryptography

Key Management

Key exchange

Diffie-Hellman

Key escrow

Key stretching

Hardware security modules

Public Key Infrastructure

Trust models

PKI and digital certificates

Hash functions

Digital signatures

Digital Signature standard

Create a digital certificate

Revoke a digital certificate

Certificate stapling

Certificate authorities

Certificate subjects

Certificate types

Certificate formats

Cryptanalytic Attacks

Brute force attacks

Knowledge-based attacks

Limitations of encryption algorithms

Cryptographic Applications

TLS and SSL

Information rights management

Specialised use cases

Blockchain