Explores the practical implementation of security protocols using the biometric passport as a case study, covering vulnerabilities, TLS evolution, and ChaChaPoly encryption.
Explores access control policies, authentication methods, and the principles of least privilege, emphasizing the importance of secure and user-friendly authentication protocols.
Explores Diffie-Hellman key exchange and ElGamal cryptosystem, discussing their security aspects and applications in RSA, emphasizing the Chinese Remainder Theorem's role in speeding up decryption and proving RSA correctness.