Conditional Access IICovers conditional access, encryption, decryption, authentication, and advanced encryption standards, exploring identity-based encryption, biometrics, and attribute-based encryption.
Perfect Secrecy: One-time PadExplores perfect secrecy, the one-time pad encryption method, attacks on encryption systems, and the Vigenère cipher.
Exercise: Choosing CapsulesCovers a series of exercises related to encryption functions, starting with basic ones and progressing to modern encryption methods.
Mobile Telephony SecurityExplores 2G mobile telephony security, covering authentication, encryption, privacy concerns, and vulnerabilities in encryption algorithms.
Cryptography: General FrameworkExplores the principles of cryptography, encryption, and information security, emphasizing confidentiality, integrity, and responsibility.
Homomorphic EncryptionExplores homomorphic encryption, enabling computations on encrypted data without decryption, with practical applications in secure medical clouds.
Encryption Project: Scratch BasicsCovers the basics of starting an encryption project using Scratch and provides step-by-step guidance on implementing encryption techniques.
Cryptanalysis: ConventionalExplores conventional Cryptanalysis methods, including Differential and Linear Cryptanalysis, and delves into the significance of Hypothesis Testing in Cryptography.
Symmetric Encryption: DES and AESExplores DES and AES encryption, discussing weak keys, attacks, AES structure, IV importance, and various modes of operation for secure encryption.