Module 20: Cryptography
Cryptography Concepts
20.1 Cryptography
-
- Types of Cryptography
20.2 Government Access to Keys (GAK)
Encryption Algorithms
20.3 Ciphers
20.4 Data Encryption Standard (DES)
20.5 Advanced Encryption Standard (AES)
20.6 RC4, RC5, and RC6 Algorithms
20.7 Twofish
20.8 The DSA and Related Signature Schemes
20.9 Rivest Shamir Adleman (RSA)
20.10 Diffie-Hellman
20.11 Message Digest (One-Way Hash) Functions
-
- Message Digest Function: MD5
- Secure Hashing Algorithm (SHA)
- RIPEMD – 160
- HMAC
Cryptography Tools
20.12 MD5 Hash Calculators
20.13 Hash Calculators for Mobile
20.14 Cryptography Tools
-
- Advanced Encryption Package 2017
- BCTextEncoder
- Cryptography Tools
20.15 Cryptography Tools for Mobile
Public Key Infrastructure (PKI)
20.16 Public Key Infrastructure (PKI)
-
- Certification Authorities
- Signed Certificate (CA) Vs. Self Signed Certificate
Email Encryption
20.17 Digital Signature
20.18 Secure Sockets Layer (SSL)
20.19 Transport Layer Security (TLS)
20.20 Cryptography Toolkit
-
- OpenSSL
- Keyczar
20.21 Pretty Good Privacy (PGP)
Disk Encryption
20.22 Disk Encryption
20.23 Disk Encryption Tools
-
- VeraCrypt
- Symantec Drive Encryption
- Disk Encryption Tools
Cryptanalysis
20.24 Cryptanalysis Methods
-
- Linear Cryptanalysis
- Differential Cryptanalysis
- Integral Cryptanalysis
20.25 Code Breaking Methodologies
20.26 Cryptography Attacks
-
- Brute-Force Attack
- Birthday Attack
- Birthday Paradox: Probability
- Meet-in-the-Middle Attack on Digital Signature Schemes
- Side Channel Attack
- Hash Collision Attack
- DUHK Attack
- Rainbow Table Attack
20.27 Cryptanalysis Tools
20.28 Online MD5 Decryption Tools
Countermeasures
20.29 How to Defend Against Cryptographic Attacks