Login to filter by course Login to filter by course Reset
Security Algorithms: DESExplores perfect confidentiality, algorithmic security, one-way functions in DES, and the challenges of NP-complete problems.
Symmetric Encryption: DES and AESExplores DES and AES encryption, discussing weak keys, attacks, AES structure, IV importance, and various modes of operation for secure encryption.
Cryptanalysis: ConventionalExplores conventional Cryptanalysis methods, including Differential and Linear Cryptanalysis, and delves into the significance of Hypothesis Testing in Cryptography.
Mobile Telephony SecurityExplores 2G mobile telephony security, covering authentication, encryption, privacy concerns, and vulnerabilities in encryption algorithms.
ECB Penguin and HashingExplores symmetric encryption, social engineering, and secure hashing techniques, focusing on ECB vulnerabilities and SHA-256 usage.
Exercise: Choosing CapsulesCovers a series of exercises related to encryption functions, starting with basic ones and progressing to modern encryption methods.
RSA: Trapdoor One-Way FunctionsExplores RSA encryption, trapdoor functions, hash functions, and cryptographic standards, including a practical example with Apple's iMessage implementation.
Cryptography: General FrameworkExplores the principles of cryptography, encryption, and information security, emphasizing confidentiality, integrity, and responsibility.