Information Security Notes
Information Security
01: Intro
02: Security goals, Adversarial models, Formal security notions
Computational vs. Perfect Secrecy
Adversarial Models
Security Goals (CIA triad)
Security Games
IND-EAV
IND-CPA
IND-CCA
03: Symmetric-key encryption, block ciphers, modes of operation, the DES and AES ciphers
Block Cipher Modes
Advanced Encryption Standard (AES)
04: Hash functions & The SHA hash function family
SHA Hash family
05: Message authentication codes & Authenticated encryption
Padding & Padding Oracle Attacks
Message Authentication Codes
Authenticated Encryption
06: Public-key cryptography
Math Primer
Diffie-Hellman
07: Digital Signatures
Digital Signature Schemes
08: RSA\/ECDSA Signature Schemes & Digital Certificates
09: Digital Certificates
10: The Transport Layer Security (TLS) protocol. Secure shell (SSH)
11: Randomness, pseudo-randomness, Key generation, & Key Lengths
12: Secure password generation and storage
MIDTERM
PYTHON CHEAT SHEET
Powered by
GitBook
Adversarial Models
Adversarial Models
Passive
observes cipher texts
Active (malicious)
can MODIFY or REPLACE cipher texts!
man in the middle
results matching "
"
No results matching "
"