Symmetric Cryptography
Classical cryptosystem
Substitution cipher
Caesar cipher
Monoalphabetic
Polyalphabetic
Vigenere cipher
Vernam cipher
Enigma cipher
Playfair
Hill cipher
one time pad(OTP)
Transposition cipher
Rail fence
Columnar transposition
double transposition
Route cipher
Modern cryptosystem
Stream cipher
A 5/1
A 5/2
RC4
Block cipher
Algorithms
RC2
RC5
RC6
DES
3DES
AES
Modes
ECB
Electronic Codebook
CBC
Cipher Block Chaining
CFB
Cipher Feedback Mode
OFB
Output Feedback Mode
CTR
Counter iteration mode
services
Confidentiality
Intigrity
Authentication
Non-repudiation
Key exchange
Asymmetric Cryptography
Public key cryptosystems
RSA
Diffie-Hellman
ECC
elliptic curve cryptography
DSA
NTRU
Hybrid encryption scheme
ECIES
ECC cryptography + KDF + Symmetric encryption algo. + MAC algo.
Hash Functions
One way Hash functions
Message Digest (MD)
MD2
MD4
MD5
MD6
Secure Hash Algorithm (SHA)
SHA-0
SHA-1
SHA-2
SHA-2 family
SHA-224
SHA-256
SHA-384
SHA-512
SHA-3
RIPEMD (RACE Integrity Primitives Evaluation Message Digest)
RIPEMD-128
RIPEMD-160
RIPEMD-256
RIPEMD-320
Message Authentication Code (MAC)
Algorithms
HMAC
CMAC
KMAC
GMAC
Poly1305
UMAC
VMAC
KDF (Key Derivation Function)
PBKDF2
Bcrypt
Scrypt
Argon2
Randomness
Secure random number generators
PRNG
Pseudo Random Number Genertators
CSPRNG
Cryptographic Secure Random Number Generators
PKI (Public Key Infrastructure)
Infrastructure
Decentralized PKI
Blockchain-based PKI
Components
pub key certificate
Private key tokens
Certification authority
Key functions
Generating key pairs
Issuing digital certificates
Publishing Certificates
Verifying Certificates
Revocation of Certificates
Registration authority
certificate management system
Digital signatures
usage
Sign messages
Verify signatures
schemes and algorithms
RSA signatures
ECDSA
EIGamal signatures
Attacks & Cryptanalysis
Common
Known plaintext analysis(KPA)
Chosen Plaintext Analysis(CPA)
Ciphertext Only Attack (COA)
Adaptive Chosen Plaintext(ACPA)
Side channel Attack(SCA)
Replay attack
Timing Attacks
Symmetric
Brute Force Attack(BFA)
Dictionary Attack
MITM
Linear Cryptanalysis
Differential Cryptanalysis
Hash systems
Birthday attack
Rainbow table