• Information Security Notes
  • Information Security
  • 01: Intro
  • 02: Security goals, Adversarial models, Formal security notions
    • Computational vs. Perfect Secrecy
    • Adversarial Models
    • Security Goals (CIA triad)
    • Security Games
      • IND-EAV
      • IND-CPA
      • IND-CCA
  • 03: Symmetric-key encryption, block ciphers, modes of operation, the DES and AES ciphers
    • Block Cipher Modes
    • Advanced Encryption Standard (AES)
  • 04: Hash functions & The SHA hash function family
    • SHA Hash family
  • 05: Message authentication codes & Authenticated encryption
    • Padding & Padding Oracle Attacks
    • Message Authentication Codes
    • Authenticated Encryption
  • 06: Public-key cryptography
    • Math Primer
    • Diffie-Hellman
  • 07: Digital Signatures
    • Digital Signature Schemes
  • 08: RSA\/ECDSA Signature Schemes & Digital Certificates
  • 09: Digital Certificates
  • 10: The Transport Layer Security (TLS) protocol. Secure shell (SSH)
  • 11: Randomness, pseudo-randomness, Key generation, & Key Lengths
  • 12: Secure password generation and storage
  • MIDTERM
  • PYTHON CHEAT SHEET
Powered by GitBook

Information Security

SE 4472 - Information Security Notes

Table of Contents

  • 01: Intro
  • 02: Security Goals, Adversarial models, Formal security notions
  • 03: Symmetric-key encryption, block ciphers, modes of operation, the DES and AES ciphers
  • 04: Hash functions & The SHA hash function family
  • 05: Message authentication codes & Authenticated encryption
  • 06: Public-key cryptography
  • 07: Digital Signatures.
  • 08: RSA\/ECDSA Signature Schemes & Digital Certificates
  • 09: Digital Certificates
  • 10: The Transport Layer Security (TLS) protocol. Secure shell (SSH).
  • 11: Randomness and pedudo-randomness. Key generation. Current recommended minimum acceptable key lengths.
  • 12: Secure password generation and storage.

results matching ""

    No results matching ""