Cryptography
★ ★ ★ ★ ★ WAGmob: Over One million paying customer ★ ★ ★ ★ ★ <br /> <br />WAGmob brings you Simple 'n Easy, on-the-go learning ebook for "Cryptography". <br /> <br />The ebook provides: <br /> <br />Snack sized chapters for easy learning. <br /> <br />Designed for both students and adults. <br /> <br /> <br />This ebook provides a quick summary of essential concepts of Cryptography by following snack sized chapters: <br /> <br /> <br />Introduction: <br /> <br />• Secret Writing <br />• Cryptography <br />• Historical usage <br />• Encryption <br />• Plain – Text and Cipher – Text <br />• Decryption <br />• Steganography <br />• Cryptanalysis <br /> <br /> <br />Symmetric Cryptography: <br /> <br />• Cryptography Methods <br />• Symmetric (Secret – Key) Encryption <br />• Block and Stream Ciphers <br />• Encryption Algorithms <br />• Data Encryption Standard (DES) <br />• Triple DES <br />• Advanced Encryption Standard (AES) <br />• International Data Encryption Algorithm (IDEA) <br />• Twofish <br />• Blowfish <br />• Rivest Cipher <br /> <br /> <br />Asymmetric Cryptography: <br /> <br />• Public-key cryptography <br />• Asymmetric (Public –Key) Encryption <br />• Secure Communications using Public-Key Cryptography <br />• Diffie–Hellman key exchange <br />• Elliptic Curve Cryptography <br />• ElGamal encryption system <br />• RSA <br />• Key generation in RSA Algorithm <br /> <br /> <br />Public Key Infrastructure: <br /> <br />• Public Key Infrastructure (PKI) <br />• Certificate Authority (CA) <br />• Certificate Revocation List (CRL) <br />• Registration Authority <br />• Trust Models - Single/Hierarchical AND Web of Trust etc. <br /> <br /> <br />Digital Certificates and Signatures: <br /> <br />• Digital Certificates <br />• Digital Signatures <br />• X.509 digital certificate <br />• Structure of a X.509 digital certificate <br /> <br /> <br />Hash Algorithms: <br /> <br />• Hashing <br />• Cryptographic hash function <br />• Applications of Cryptographic hash function <br />• MD-5 <br />• SHA <br />• SHA-1 <br />• SHA-1 (160 bit message) Algorithm Framework <br />• SHA-2 <br /> <br /> <br />Encrypted Communication: <br /> <br />• Introduction to Secure Communication <br />• Encryption of Data at Rest <br />• Encryption of Data in Transit <br />• SSH <br />• Secure Sockets Layer (SSL) <br />• Transport Layer Security (TLS) <br />• Internet Protocol security (IPsec) <br />• The Point-to-Point Tunneling Protocol (PPTP) <br /> <br /> <br />Cryptographic attacks: <br /> <br />• Introduction <br />• Cryptographic Attack Methods <br />• Known Plaintext and Ciphertext-Only Attacks <br />• Chosen Plaintext and Chosen Ciphertext Attacks <br />• Adaptive Chosen Plaintext and Adaptive Chosen Ciphertext Attacks <br />• Replay Attack <br />• Man-in-the-middle Attack <br />• Brute Force Attack <br /> <br /> <br />Cryptography Terms: <br /> <br />• Cryptography Terms <br /> <br /> <br />About WAGmob ebooks: <br /> <br />1) A companion ebook for on-the-go, bite-sized learning. <br />2) Offers value for money (a lifetime of free updates). <br />3) Over One million paying customers from 175+ countries. <br /> <br />Our Vision: A platform to create, amplify & distribute SIMPLE ’N EASY ebookS for a lifetime of on-the-go learning. <br /> <br />Our Mission: A simple ’n easy WAGmob ebooks in every hand. <br /> <br />visit us: www.WAGmob.com <br /> <br />Please write to us at [email protected]. We would love to improve this ebook.