Cryptography Design and Implementation
From Smithnet Wiki
Revision as of 21:02, 17 February 2023 by
NickPGSmith
(
talk
|
contribs
)
(1 revision imported)
(
diff
)
← Older revision
|
Latest revision
(
diff
) |
Newer revision →
(
diff
)
Jump to navigation
Jump to search
Contents
1
Encryption
1.1
Understanding encryption
1.2
Symmetric and asymmetric encryption
1.3
Goals of cryptography
1.4
Codes and cyphers
1.5
Cryptographic math
1.6
Choosing encryption algorithms
1.7
The perfect encryption algorithm
1.8
The cryptographic lifecycle
2
Symmetric Cryptography
2.1
Data Encryption Standard (DES)
2.2
3DES
2.3
AES, blowfish, twofish
2.4
RC4
2.5
Cypher modes
2.6
Steganography
3
Asymmetric Cryptography
3.1
Rivest, Shamir, Adelman (RSA)
3.2
PGP and GnuPG
3.3
Elliptic-curve and quantum cryptography
4
Key Management
4.1
Key exchange
4.2
Diffie-Hellman
4.3
Key escrow
4.4
Key stretching
4.5
Hardware security modules
5
Public Key Infrastructure
5.1
Trust models
5.2
PKI and digital certificates
5.3
Hash functions
5.4
Digital signatures
5.5
Digital Signature standard
5.6
Create a digital certificate
5.7
Revoke a digital certificate
5.8
Certificate stapling
5.9
Certificate authorities
5.10
Certificate subjects
5.11
Certificate types
5.12
Certificate formats
6
Cryptanalytic Attacks
6.1
Brute force attacks
6.2
Knowledge-based attacks
6.3
Limitations of encryption algorithms
7
Cryptographic Applications
7.1
TLS and SSL
7.2
Information rights management
7.3
Specialised use cases
7.4
Blockchain
Encryption
Understanding encryption
Symmetric and asymmetric encryption
Goals of cryptography
Codes and cyphers
Cryptographic math
Choosing encryption algorithms
The perfect encryption algorithm
The cryptographic lifecycle
Symmetric Cryptography
Data Encryption Standard (DES)
3DES
AES, blowfish, twofish
RC4
Cypher modes
Steganography
Asymmetric Cryptography
Rivest, Shamir, Adelman (RSA)
PGP and GnuPG
Elliptic-curve and quantum cryptography
Key Management
Key exchange
Diffie-Hellman
Key escrow
Key stretching
Hardware security modules
Public Key Infrastructure
Trust models
PKI and digital certificates
Hash functions
Digital signatures
Digital Signature standard
Create a digital certificate
Revoke a digital certificate
Certificate stapling
Certificate authorities
Certificate subjects
Certificate types
Certificate formats
Cryptanalytic Attacks
Brute force attacks
Knowledge-based attacks
Limitations of encryption algorithms
Cryptographic Applications
TLS and SSL
Information rights management
Specialised use cases
Blockchain
Navigation menu
Personal tools
Log in
Namespaces
Page
Discussion
British English
Views
Read
View source
View history
More
Search
Navigation
Main page
Recent changes
Random page
Help about MediaWiki
Tools
What links here
Related changes
Special pages
Printable version
Permanent link
Page information