Symmetric Encryption: Physical LimitsExplores the physical limits and security aspects of symmetric encryption schemes, including energy consumption, key recovery, and distinguisher security.
Symmetric Encryption SchemesExplores symmetric encryption schemes, including block and stream ciphers, their vulnerabilities, and the importance of key lengths.
Perfect Secrecy: One-time PadExplores perfect secrecy, the one-time pad encryption method, attacks on encryption systems, and the Vigenère cipher.
Conditional Access IICovers conditional access, encryption, decryption, authentication, and advanced encryption standards, exploring identity-based encryption, biometrics, and attribute-based encryption.
Applied Cryptography: BasicsIntroduces applied cryptography basics, historical encryption methods, and the concept of perfect secrecy with the One Time Pad.