SE 4472 - Information Security Notes
Table of Contents
- 01: Intro
- 02: Security Goals, Adversarial models, Formal security notions
- 03: Symmetric-key encryption, block ciphers, modes of operation, the DES and AES ciphers
- 04: Hash functions & The SHA hash function family
- 05: Message authentication codes & Authenticated encryption
- 06: Public-key cryptography
- 07: Digital Signatures.
- 08: RSA\/ECDSA Signature Schemes & Digital Certificates
- 09: Digital Certificates
- 10: The Transport Layer Security (TLS) protocol. Secure shell (SSH).
- 11: Randomness and pedudo-randomness. Key generation. Current recommended minimum acceptable key lengths.
- 12: Secure password generation and storage.