Perfect Secrecy: One-time PadExplores perfect secrecy, the one-time pad encryption method, attacks on encryption systems, and the Vigenère cipher.
Secret Key AgreementExplains secret key agreement systems, perfect secrecy, and the criteria for secure communication.
Conditional Access IICovers conditional access, encryption, decryption, authentication, and advanced encryption standards, exploring identity-based encryption, biometrics, and attribute-based encryption.
Public Key Cryptography: RSAExplores public key cryptography, focusing on RSA, key generation, encryption, decryption, security challenges, and vulnerabilities.
Cryptographic Security ModelsExplores cryptographic security models, decryption vs. key recovery, the ideal cipher, MAC construction, key agreement protocol, public-key cryptosystems, and signature scheme security.
RSA: Privacy and SignaturesExplores RSA encryption for privacy and digital signatures, covering keys generation, decoding, possible attacks, hash functions, and cryptographic standards.
Cryptography BasicsIntroduces cryptography basics, covering encryption, data integrity, error detection, digital signatures, and authentication.
Discrete Exponentiation ComplexityExplores discrete exponentiation complexity, cyclic groups, and practical cryptography, including popular algorithms like Diffie-Hellman and RSA.