Cryptography Design and Implementation
From Smithnet Wiki
Jump to navigation
Jump to search
Encryption
Understanding encryption
Symmetric and asymmetric encryption
Goals of cryptography
Codes and cyphers
Cryptographic math
Choosing encryption algorithms
The perfect encryption algorithm
The cryptographic lifecycle
Symmetric Cryptography
Data Encryption Standard (DES)
3DES
AES, blowfish, twofish
RC4
Cypher modes
Steganography
Asymmetric Cryptography
Rivest, Shamir, Adelman (RSA)
PGP and GnuPG
Elliptic-curve and quantum cryptography
Key Management
Key exchange
Diffie-Hellman
Key escrow
Key stretching
Hardware security modules
Public Key Infrastructure
Trust models
PKI and digital certificates
Hash functions
Digital signatures
Digital Signature standard
Create a digital certificate
Revoke a digital certificate
Certificate stapling
Certificate authorities
Certificate subjects
Certificate types
Certificate formats
Cryptanalytic Attacks
Brute force attacks
Knowledge-based attacks
Limitations of encryption algorithms
Cryptographic Applications
TLS and SSL
Information rights management
Specialised use cases
Blockchain