Introduction
Cryptography
()
1. Encryption
Understanding encryption
()
Symmetric and asymmetric cryptography
()
Goals of cryptography
()
Codes and ciphers
()
Choosing encryption algorithms
()
The perfect encryption algorithm
()
The cryptographic lifecycle
()
2. Symmetric Cryptography
Data Encryption Standard
()
3DES
()
AES, Blowfish, and Twofish
()
RC4
()
Steganography
()
3. Asymmetric Cryptography
Rivest-Shamir-Adleman (RSA)
()
PGP and GnuPG
()
Elliptic curve and quantum cryptography
()
4. Key Management
Cryptographic key security
()
Key exchange
()
Diffie-Hellman
()
Key escrow
()
Key stretching
()
5. Public Key Infrastructure
Trust models
()
PKI and digital certificates
()
Hash functions
()
Digital signatures
()
Create a digital certificate
()
Revoke a digital certificate
()
Certificate stapling
()
6. Transport Encryption
TLS and SSL
()
IPsec
()
Securing common protocols
()
DKIM
()
Tor and perfect forward secrecy
()
7. Cryptanalytic Attacks
Brute force attacks
()
Knowledge-based attacks
()
Conclusion
What's next?
()