Symmetric Encryption SchemesExplores symmetric encryption schemes, including block and stream ciphers, their vulnerabilities, and the importance of key lengths.
Cryptographic Security ModelsExplores cryptographic security models, decryption vs. key recovery, the ideal cipher, MAC construction, key agreement protocol, public-key cryptosystems, and signature scheme security.
Applied Cryptography: BasicsIntroduces applied cryptography basics, historical encryption methods, and the concept of perfect secrecy with the One Time Pad.
Cryptography BasicsIntroduces cryptography basics, covering encryption, data integrity, error detection, digital signatures, and authentication.
Applied Cryptography: Symmetric IntegrityExplores symmetric cryptography for integrity, emphasizing Message Authentication Codes and different encryption approaches to ensure data confidentiality and integrity.