Introduction to Information Security |
- Why do we need security?
- Confidentiality, Integrity, Availability
- Authentication, Authorization, Accounting
- Information Theory
- Encoding, Compression, Encryption
|
Classical Cryptosystems |
- Monoalphabetic Systems
- Polyalphabetic Systems
- Substitution Ciphers
- Transposition Ciphers
- Cryptanalysis: Brute Force, Frequency Analysis, Kasiski Analysis
|
Character Encoding Fundamentals |
- From alphabet to bits
- Representations: Binary, Decimal, Hexadecimal
- Encoding Schemes: ASCII, UTF, ISO
- Bit-wise operations
|
Block Ciphers |
- Boolean Functions: Truth tables, Non-linearity, Walsh transform
- Building blocks: SP-Networks, Feistel Structure
- DES
- AES Competition and Candidates
- Mode of Operations
- Cryptanalysis: Differential and Linear Cryptanalysis
- Authenticated Encryption
|
Stream Ciphers |
- Building blocks: LFSR, Combining functions, Linear Complexity
- Random Number Generators: Key stream generator
- PRNGs and TRNGs
- eSTREAM Ciphers
|
Hash Functions |
- Building Blocks: Resistance (Pre-image, 2nd Pre-image, Collusion), ARX, Merkle–Damgard, Sponge
- SHA3 Competition and Candidates
- Password hashing and cracking: Salting, Rainbow tables, Key Derivation Functions
- Message Authentication Codes
|
Midterm
|
An Introduction to Number Theory |
- Fundamental Theorem of Arithmetic
- Modular arithmetic
- Prime numbers and primality tests
- Euler Totient Function
- Extended Euclidean algorithm
|
Public Key Cryptography |
- Trapdoor functions: Computational complexity, Mathematical problems: Discrete Logarithm, Factorization
- Key Exchange Problem
- Diffie-Hellman Key Exchange: Man-in-the-Middle attacks
- RSA
- ElGamal
- ECC
- Digital Signatures
|
More Cryptographic Primitives |
- Hybrid Encryption
- Lightweight ciphers
- Quantum Cryptography
- Post-quantum Cryptography
- Steganography
- Secret Sharing
- Homomorphic Encryption
|
Protocols and Applications |
- Blockchain Fundamentals
- Public Key Infrastructure: TLS
- PGP
- TOR
- OTR and E2EE
- TOTP/HOTP
- Wireless Comm: Wi-Fi, Bluetooth, GSM
- IPSec, Wireguard, OpenVPN
- Cryptography in daily life
- Cryptography tools
|
Final
|