
Part I: Introducing Cryptography
- Introduction to Cryptography
- History of Cryptography
- Classical Cryptography
- Contemporary Cryptography
- Cryptography in Popular Culture
- Timeline of Notable Events
- Fundamental Concepts
- Goals of Cryptography
- Goals of Cryptanalysis
- Role of Cryptography in Computer Security
- Symmetric Key Ciphers
- Asymmetric Key Ciphers
- Random Number Generation
- Hashes
- Key Distribution and Authentication (key management and the web of trust)
- Common flaws and weaknesses
- Secure Passwords
- S-box
Part II: Designing Cryptosystems
- The Basic Principles
- Little Secrets Hide Bigger Secrets
- Open Algorithms and the Value of Peer-Review
- Think Like a Cryptanalyst
- Cryptography/Error Correction Systems
- Mathematical Background
- Computer Security is More Than Encryption
- Unbroken is Not Necessarily Unbreakable
Part III: Cryptanalysis
- The Basic Principles
- Weaknesses
- Proportionality of Secrecy
- Length of the key
- Quality of Random Source
- Plaintext effect on Ciphertext
- Statistical Leaking
- Faulty Implementation
- Inadequate Peer-Review
- Social Engineering and Coercion
- Leakage and Side Channels
- Proportionality of Secrecy
- Attacks
- Brute-Force Attack
- Dictionary Attack
- Frequency Analysis
- Index of Coincidence
- Linear Cryptanalysis
- Differential Cryptanalysis
- Meet in the Middle Attack
- Man-in-the-middle attack
- Brute-Force Attack
- Breaking Hash Algorithms
- Collisions
- Generating
- Exploiting
- Birthday Attack
- Joux Attack
- Time Memory Trade Off (rainbow tables)
- Collisions
- How Historical Systems Were Broken
- Transposition Ciphers
- Caesar Cipher
- Enigma Machine
- Permutation Cipher
- Vigenère Cipher
Part IV: Using Cryptosystems
- Applying Cryptography
- Digital Signatures
- Database protection
- E-Cash
- E-Voting
- DRM
- Biometrics
- Anonymity
- Classical Ciphers
- Beale Cipher
- Transposition Ciphers
- Caesar cipher
- Atbash Cipher
- Autokey cipher
- Playfair Cipher
- Polyalphabetic substitution
- Scytale
- Substitution cipher
- nomenclator
- Permutation Cipher
- Affine cipher
- Vigenère cipher
- Polybius square
- ADFGVX cipher
- Fractionation (Polybius square, straddling checkerboard, CT-37c conversion table, etc.)
- Contemporary Ciphers
- Symmetric Ciphers
- Enigma Machine
- Solitaire cipher
- One-Time Pads
- Ciphersaber
- Data Encryption Standard (DES)
- Advanced Encryption Standard
- Asymmetric Ciphers
- Hashes
- MD5
- SHA-1
- SHA-2
- RadioGatún, the direct predecessor of SHA-3
- SHA-3
- RIPEMD-160
- Tiger
- message authentication code (often MAC); A MAC algorithm is sometimes called a keyed (cryptographic) hash function.
- Symmetric Ciphers
- Protocols
- Authentication protocols
- e.g. Kerberos
- Key exchange protocols
- Secure Communications
- e.g. SSL, SSH
- Generate a keypair using OpenSSL
- Authentication protocols
Part V: Cryptography and Society
- The Changing Nature of Cryptographic Use
- Cryptography, Governments and Laws
- Expectations of Normal Users
Part VI: Miscellaneous
- Future Possibilities
- Quantum Cryptography
- Faster, More Parallel Linear Computers
- Glossary of Terms
- Further Reading
- Appendix A: Mathematical background
- Number Theory
- Group Theory
- Computational Complexity
- Prime numbers
- Currently ungrouped content
- Tabula Recta
- Commitment schemes
- Zero-knowledge proofs
- Open source implementation of cryptographic algorithms
- initialization vector
- Linear Cryptanalysis
- Differential Cryptanalysis
Almost all of these topics have articles about them in Wikipedia (there are about 50-100 crypto related articles) so many sections could be imported.
|
Pages to be merged into the text.
Cryptography/Prime Curve/Affine Coordinates
Cryptography/Prime Curve/Chudnovsky Coordinates
Cryptography/Prime Curve/Jacobian Coordinates
Cryptography/Prime Curve/Standard Projective Coordinates
Sources: Wikipedia:cryptography, Wikipedia:Transposition cipher, Wikipedia:Caesar cipher, Wikipedia:Frequency analysis, Wikipedia:Brute-force search. |
This article is issued from Wikibooks. The text is licensed under Creative Commons - Attribution - Sharealike. Additional terms may apply for the media files.