Information Security Notes
Information Security
01: Intro
02: Security goals, Adversarial models, Formal security notions
Computational vs. Perfect Secrecy
Adversarial Models
Security Goals (CIA triad)
Security Games
IND-EAV
IND-CPA
IND-CCA
03: Symmetric-key encryption, block ciphers, modes of operation, the DES and AES ciphers
Block Cipher Modes
Advanced Encryption Standard (AES)
04: Hash functions & The SHA hash function family
SHA Hash family
05: Message authentication codes & Authenticated encryption
Padding & Padding Oracle Attacks
Message Authentication Codes
Authenticated Encryption
06: Public-key cryptography
Math Primer
Diffie-Hellman
07: Digital Signatures
Digital Signature Schemes
08: RSA\/ECDSA Signature Schemes & Digital Certificates
09: Digital Certificates
10: The Transport Layer Security (TLS) protocol. Secure shell (SSH)
11: Randomness, pseudo-randomness, Key generation, & Key Lengths
12: Secure password generation and storage
MIDTERM
PYTHON CHEAT SHEET
Powered by
GitBook
PYTHON CHEAT SHEET
http:\/\/www.cogsci.rpi.edu\/~destem\/igd\/python_cheat_sheet.pdf
results matching "
"
No results matching "
"