Vous êtes sur la page 1sur 4

Cryptography

(i) Common aws and weaknesses


(j) Secure Passwords
(k) S-box

Part II: Designing Cryptosystems

1. The Basic Principles


2. Little Secrets Hide Bigger Secrets
3. Open Algorithms and the Value of Peer-Review
4. Think Like a Cryptanalyst
5. Cryptography/Error Correction Systems
6. Mathematical Background
7. Computer Security is More Than Encryption
8. Unbroken is Not Necessarily Unbreakable

Part III: Cryptanalysis


Welcome to Cryptography, the study of transforming
information in order to make it secure from unintended 1. The Basic Principles
recipients or use.
2. Weaknesses
Part I: Introducing Cryptography (a) Proportionality of Secrecy
i. Length of the key
1. Introduction to Cryptography ii. Quality of Random Source
2. History of Cryptography iii. Plaintext eect on Ciphertext
(b) Statistical Leaking
(a) Classical Cryptography
(c) Faulty Implementation
(b) Contemporary Cryptography
(d) Inadequate Peer-Review
(c) Cryptography in Popular Culture
(e) Social Engineering and Coercion
(d) Timeline of Notable Events
(f) Side Channels
3. Fundamental Concepts
3. Attacks
(a) Goals of Cryptography
(a) Brute-Force Attack
(b) Goals of Cryptanalysis
(c) Role of Cryptography in Computer Security i. Dictionary Attack

(d) Symmetric Key Ciphers (b) Frequency Analysis

(e) Asymmetric Key Ciphers (c) Index of Coincidence

(f) Random Number Generation (d) Linear Cryptanalysis

(g) Hashes (e) Dierential Cryptanalysis


(h) Key Distribution and Authentication (key (f) Meet in the Middle Attack
management and the web of trust) (g) Man-in-the-middle attack

1
2

4. Breaking Hash Algorithms 3. Contemporary Ciphers


(a) Collisions (a) Symmetric Ciphers
i. Generating i. Enigma Machine
ii. Exploiting ii. Solitaire cipher
(b) Birthday Attack iii. One-Time Pads
(c) Joux Attack iv. Ciphersaber
(d) Time Memory Trade O (rainbow tables) v. Data Encryption Standard (DES)
vi. Advanced Encryption Standard
5. How Historical Systems Were Broken
(b) Asymmetric Ciphers
(a) Transposition Ciphers i. Overview
(b) Caesar Cipher ii. RSA
(c) Enigma Machine iii. ElGamal
(d) Permutation Cipher iv. Elliptic Curve
v. Blum-Goldwasser
(e) Vigenre Cipher
(c) Hashes
Part IV: Using Cryptosystems i. MD5
ii. SHA-1
1. Applying Cryptography iii. SHA-2
(a) Digital Signatures iv. SHA-3
v. RIPEMD-160
i. Introduction to Digital Signatures
vi. Tiger
ii. DSA
vii. message authentication code (often
(b) Database protection MAC); A MAC algorithm is sometimes
(c) E-Cash called a keyed (cryptographic) hash
(d) E-Voting function.
(e) DRM 4. Protocols
(f) Biometrics
(a) Authentication protocols
(g) Anonymity
i. e.g. Kerberos
2. Classical Ciphers (b) Key exchange protocols
(a) Beale Cipher i. Die-Hellman
(b) Transposition Ciphers (c) Secure Communications
(c) Caesar cipher i. e.g. SSL, SSH
(d) Atbash Cipher ii. Generate a keypair using OpenSSL
(e) Autokey cipher
Part V: Cryptography and Society
(f) Playfair Cipher
(g) Polyalphabetic substitution 1. The Changing Nature of Cryptographic Use
(h) Scytale
2. Cryptography, Governments and Laws
(i) Substitution cipher
(j) nomenclator 3. Expectations of Normal Users
(k) Permutation Cipher
Part VI: Miscellaneous
(l) Ane cipher
(m) Vigenre cipher 1. Future Possibilities
(n) Polybius square
(a) Quantum Cryptography
(o) ADFGVX cipher
(b) Faster, More Parallel Linear Computers
(p) Fractionation (Polybius square, straddling
checkerboard, CT-37c conversion table, etc.) 2. Glossary of Terms
3

3. Further Reading

4. Appendix A: Mathematical background


(a) Number Theory
(b) Group Theory
(c) Computational Complexity
(d) Prime numbers

1. Currently ungrouped content

(a) Tabula Recta


(b) Commitment schemes
(c) Zero-knowledge proofs
(d) Open source implementation of cryptographic
algorithms
(e) initialization vector
(f) Linear Cryptanalysis
(g) Dierential Cryptanalysis

Pages to be merged into the text.


Cryptography/Prime Curve/Ane Coordinates
Cryptography/Prime Curve/Chudnovsky Coordinates
Cryptography/Prime Curve/Jacobian Coordinates
Cryptography/Prime Curve/Standard Projective Coordi-
nates
Cryptography/Notes
4 1 TEXT AND IMAGE SOURCES, CONTRIBUTORS, AND LICENSES

1 Text and image sources, contributors, and licenses


1.1 Text
Cryptography Source: https://en.wikibooks.org/wiki/Cryptography?oldid=2689702 Contributors: Imran~enwikibooks, Nikai, DavidCary,
Robert Horning, Alsocal, Dvenable, Jepc, Mkn, Panic2k4, RobKohr, Iamunknown, Andreas Ipp, Charlie123, Guanabot~enwikibooks,
Ant~enwikibooks, Darklama, Think Fast, BimBot, Jguk, Hagindaz, Wknight8111, Thenub314, Tannersf, Xania, Khawarayub, Lon-
jers~enwikibooks, Mike.lifeguard, Adrignola, Avicennasis, E0, Vagentsmith, Eyreland, Vladtep and Anonymous: 13

1.2 Images
File:25_percents.svg Source: https://upload.wikimedia.org/wikipedia/commons/c/ce/25_percent.svg License: CC0 Contributors: File:
25%.svg Original artist: Ftiercel
File:Jefferson{}s_disk_cipher.jpg Source: https://upload.wikimedia.org/wikipedia/commons/4/40/Jefferson%27s_disk_cipher.jpg Li-
cense: Public domain Contributors: ? Original artist: ?
File:Loupe_light.svg Source: https://upload.wikimedia.org/wikipedia/commons/0/0c/Loupe_light.svg License: Public domain
Contributors: modied version of <a href='//commons.wikimedia.org/wiki/File:Gnome-searchtool.svg' class='image'><img alt='Gnome-
searchtool.svg' src='https://upload.wikimedia.org/wikipedia/commons/thumb/1/1e/Gnome-searchtool.svg/50px-Gnome-searchtool.
svg.png' width='50' height='50' srcset='https://upload.wikimedia.org/wikipedia/commons/thumb/1/1e/Gnome-searchtool.svg/
75px-Gnome-searchtool.svg.png 1.5x, https://upload.wikimedia.org/wikipedia/commons/thumb/1/1e/Gnome-searchtool.svg/
100px-Gnome-searchtool.svg.png 2x' data-le-width='60' data-le-height='60' /></a> Original artist: Watchduck (a.k.a. Tilman
Piesk)

1.3 Content license


Creative Commons Attribution-Share Alike 3.0

Vous aimerez peut-être aussi