Cryptographic Security FundamentalsCovers cryptographic security fundamentals, including collision search algorithms, public-key cryptography, and risks of underestimating collision attacks.
Conditional Access IICovers conditional access, encryption, decryption, authentication, and advanced encryption standards, exploring identity-based encryption, biometrics, and attribute-based encryption.
Hash Functions and TablesIntroduces hashing tables, including the Birthday Lemma, Direct-Address Tables, collisions, and Chained-Hash-Search.
Hash Tables AnalysisCovers the analysis of hash tables, including search operations and expected collisions.
Authentication: PasswordsCovers the importance of passwords in authentication, including secure transfer, storage, and checking techniques.
ECB Penguin and HashingExplores symmetric encryption, social engineering, and secure hashing techniques, focusing on ECB vulnerabilities and SHA-256 usage.
Hashing and SortingCovers hashing, sorting, extendible hashing, linear hashing, and external sorting.