★ ★ ★ ★ ★ WAGmob: Over One million paying customer ★ ★ ★ ★ ★
WAGmob brings you Simple 'n Easy, on-the-go learning ebook for "Cryptography".
The ebook provides:
Snack sized chapters for easy learning.
Designed for both students and adults.
This ebook provides a quick summary of essential concepts of Cryptography by following snack sized chapters:
Introduction:
• Secret Writing
• Cryptography
• Historical usage
• Encryption
• Plain – Text and Cipher – Text
• Decryption
• Steganography
• Cryptanalysis
Symmetric Cryptography:
• Cryptography Methods
• Symmetric (Secret – Key) Encryption
• Block and Stream Ciphers
• Encryption Algorithms
• Data Encryption Standard (DES)
• Triple DES
• Advanced Encryption Standard (AES)
• International Data Encryption Algorithm (IDEA)
• Twofish
• Blowfish
• Rivest Cipher
Asymmetric Cryptography:
• Public-key cryptography
• Asymmetric (Public –Key) Encryption
• Secure Communications using Public-Key Cryptography
• Diffie–Hellman key exchange
• Elliptic Curve Cryptography
• ElGamal encryption system
• RSA
• Key generation in RSA Algorithm
Public Key Infrastructure:
• Public Key Infrastructure (PKI)
• Certificate Authority (CA)
• Certificate Revocation List (CRL)
• Registration Authority
• Trust Models - Single/Hierarchical AND Web of Trust etc.
Digital Certificates and Signatures:
• Digital Certificates
• Digital Signatures
• X.509 digital certificate
• Structure of a X.509 digital certificate
Hash Algorithms:
• Hashing
• Cryptographic hash function
• Applications of Cryptographic hash function
• MD-5
• SHA
• SHA-1
• SHA-1 (160 bit message) Algorithm Framework
• SHA-2
Encrypted Communication:
• Introduction to Secure Communication
• Encryption of Data at Rest
• Encryption of Data in Transit
• SSH
• Secure Sockets Layer (SSL)
• Transport Layer Security (TLS)
• Internet Protocol security (IPsec)
• The Point-to-Point Tunneling Protocol (PPTP)
Cryptographic attacks:
• Introduction
• Cryptographic Attack Methods
• Known Plaintext and Ciphertext-Only Attacks
• Chosen Plaintext and Chosen Ciphertext Attacks
• Adaptive Chosen Plaintext and Adaptive Chosen Ciphertext Attacks
• Replay Attack
• Man-in-the-middle Attack
• Brute Force Attack
Cryptography Terms:
• Cryptography Terms
About WAGmob ebooks:
1) A companion ebook for on-the-go, bite-sized learning.
2) Offers value for money (a lifetime of free updates).
3) Over One million paying customers from 175+ countries.
Our Vision: A platform to create, amplify & distribute SIMPLE ’N EASY ebookS for a lifetime of on-the-go learning.
Our Mission: A simple ’n easy WAGmob ebooks in every hand.
visit us: www.WAGmob.com
Please write to us at Team@WAGmob.com. We would love to improve this ebook.
WAGmob brings you Simple 'n Easy, on-the-go learning ebook for "Cryptography".
The ebook provides:
Snack sized chapters for easy learning.
Designed for both students and adults.
This ebook provides a quick summary of essential concepts of Cryptography by following snack sized chapters:
Introduction:
• Secret Writing
• Cryptography
• Historical usage
• Encryption
• Plain – Text and Cipher – Text
• Decryption
• Steganography
• Cryptanalysis
Symmetric Cryptography:
• Cryptography Methods
• Symmetric (Secret – Key) Encryption
• Block and Stream Ciphers
• Encryption Algorithms
• Data Encryption Standard (DES)
• Triple DES
• Advanced Encryption Standard (AES)
• International Data Encryption Algorithm (IDEA)
• Twofish
• Blowfish
• Rivest Cipher
Asymmetric Cryptography:
• Public-key cryptography
• Asymmetric (Public –Key) Encryption
• Secure Communications using Public-Key Cryptography
• Diffie–Hellman key exchange
• Elliptic Curve Cryptography
• ElGamal encryption system
• RSA
• Key generation in RSA Algorithm
Public Key Infrastructure:
• Public Key Infrastructure (PKI)
• Certificate Authority (CA)
• Certificate Revocation List (CRL)
• Registration Authority
• Trust Models - Single/Hierarchical AND Web of Trust etc.
Digital Certificates and Signatures:
• Digital Certificates
• Digital Signatures
• X.509 digital certificate
• Structure of a X.509 digital certificate
Hash Algorithms:
• Hashing
• Cryptographic hash function
• Applications of Cryptographic hash function
• MD-5
• SHA
• SHA-1
• SHA-1 (160 bit message) Algorithm Framework
• SHA-2
Encrypted Communication:
• Introduction to Secure Communication
• Encryption of Data at Rest
• Encryption of Data in Transit
• SSH
• Secure Sockets Layer (SSL)
• Transport Layer Security (TLS)
• Internet Protocol security (IPsec)
• The Point-to-Point Tunneling Protocol (PPTP)
Cryptographic attacks:
• Introduction
• Cryptographic Attack Methods
• Known Plaintext and Ciphertext-Only Attacks
• Chosen Plaintext and Chosen Ciphertext Attacks
• Adaptive Chosen Plaintext and Adaptive Chosen Ciphertext Attacks
• Replay Attack
• Man-in-the-middle Attack
• Brute Force Attack
Cryptography Terms:
• Cryptography Terms
About WAGmob ebooks:
1) A companion ebook for on-the-go, bite-sized learning.
2) Offers value for money (a lifetime of free updates).
3) Over One million paying customers from 175+ countries.
Our Vision: A platform to create, amplify & distribute SIMPLE ’N EASY ebookS for a lifetime of on-the-go learning.
Our Mission: A simple ’n easy WAGmob ebooks in every hand.
visit us: www.WAGmob.com
Please write to us at Team@WAGmob.com. We would love to improve this ebook.