Introduction
Welcome
()
What you need to know
()
1. Encryption
Understanding encryption
()
Symmetric and asymmetric cryptography
()
Goals of cryptography
()
Codes and ciphers
()
Cryptographic math
()
The perfect encryption algorithm
()
Choosing encryption algorithms
()
The cryptographic lifecycle
()
2. Symmetric Cryptography
Data encryption standard
()
3DES
()
AES, Blowfish, and Twofish
()
RC4
()
Cipher modes
()
Steganography
()
3. Asymmetric Cryptography
Rivest-Shamir-Adleman (RSA)
()
PGP and GnuPG
()
Elliptic curve and quantum cryptography
()
Tor and perfect forward secrecy
()
4. Key Management
Key exchange
()
Diffie-Hellman
()
Key escrow
()
Key stretching
()
5. Public Key Infrastructure
Trust models
()
PKI and digital certificates
()
Hash functions
()
Digital signatures
()
Digital signature standard
()
Create a digital certificate
()
Revoke a digital certificate
()
Certificate stapling
()
Certificate authorities
()
Certificate subjects
()
Certificate types
()
Certificate formats
()
6. Cryptanalytic Attacks
Brute force attacks
()
Knowledge-based attacks
()
7. Cryptographic Applications
Digital rights management
()
Specialized use cases
()