Definitions and Concepts
Cryptology
Cryptography
Cryptoanalysis
Encryption
Plaintext
Ciphertext
Keyspace
Key
Key clustering
Cryptosystem
SW
Protocols
Algorithm
Keys
Strength
Synchronous
Asynchronous
Kerckhoffs' principle
One-time Pad
Running and Concealment ciphers
Steganography
Types of ciphers
Substitution cipher
Caesar cipher
Transposition cipher
Frequency analysis
KDFs
Polyalphabetic
Methods of Encryption
Symmetric
Strengths
Weaknesses
Algorithms
DES
3DES
Blowfish
IDEA
RC4, RC5, RC6
AES
Asymmetric
Strengths
Weaknesses
Algorithms
RSA
ECC
Diffie-Hellman
El Gamal
DSA
Merkle-Hellman Knapsack
Block Ciphers
Stream Cipher
Keystream generators
Attributes
Confusion
Diffusion
Avalanche effect
IV
Hybrid encryption methods
Types of Symmetric Systems
DES
ECB
Pin
CBC
Doc
CFB
Stream
OFB
Voice,video
CTR
3DES
DES-EEE3
DES-EDE3
DES-EEE2
DES-EDE2
AES
Other algorithms
Block
Blowfish
IDEA
RC5
RC6
Stream
RC4
Types of Asymmetric Systems
Diffie-Hellman
RSA
El Gamal
ECC
Knapsack
Zero Knowledge Proof
Message Integrity
MAC
HMAC
CBC-MAC
CMAC
MD2
MD4
MD5
SHA
HAVAL
Tiger
RIPEMD
Attacks
Birthday attack
Digital Signature
Public Key Infrastructure
Certificate Authority
Cross certification
CRL
OCSP
Registration Authority
Certificate
Key Management
Kerberos
Principles
Recovery
Trusted Platform Module
Persistent memory
EK
SRK
Versatile memory
AIK
PCR
Storage
Link Encryption vs End-to-End Encryption
Link
Traffic-flow security
Pros
Cons
End-to-end
Pros
Cons
E-mail Standards
MIME
SMIME
PGP
Key ring
Web of trust
Quantum cryptography
Internet Security
HTTP
HTTPS
SSL
TLS
S-HTTP
SET
Cookies
SSH
IPSec
AH
ESP
IKE
ISAKMP
OAKLEY
SKIP
Attacks
Active
Known-Plaintext
Linear Cryptanalysis
Chosen-Plaintext
Differential Cryptanalysis
Chosen-Ciphertext
Replay
Algebraic
Analytic
Statistical
Social Engineering
Meet-in-the-Middle
Passive
Sniffing
Side-Channel