Table of Contents

  1. Introduction
  2. Digital Cryptography
    1. Encryption
    2. Cipher Keys
    3. Classical Ciphers
    4. Digital Ciphers
    5. Data Encryption Standard
    6. Other Block Ciphers
    7. Stream Ciphers
    8. Cryptographic Hash Functions
  3. Checking Integrity
    1. Message Authentication Code (MAC)
    2. Key Exchange
    3. Asymmetric Encryption Algorithms
    4. Public Key Authentication
    5. Digital Signatures
    6. Digital Signature Standard
    7. Cryptography Flashcards
  4. Secure Transactions
    1. Wireless Security
    2. Pretty Good Privacy (PGP and OpenPGP)
    3. Secure Protocols
    4. TLS Transaction
    5. E-Commerce Activity
  5. Cryptanalysis
    1. Classical Cryptanalysis
    2. Digital Cryptanalysis
    3. Man in the Middle Attacks
    4. Prior Knowledge Attacks
    5. Brute Force Attacks
    6. Current Key Recommendations
  6. Summary
  7. Further Reading