1. Definitions and Concepts
    1. Cryptology
      1. Cryptography
      2. Cryptoanalysis
    2. Encryption
      1. Plaintext
      2. Ciphertext
      3. Keyspace
        1. Key
        2. Key clustering
    3. Cryptosystem
      1. SW
      2. Protocols
      3. Algorithm
      4. Keys
      5. Strength
      6. Synchronous
      7. Asynchronous
    4. Kerckhoffs' principle
    5. One-time Pad
    6. Running and Concealment ciphers
    7. Steganography
  2. Types of ciphers
    1. Substitution cipher
      1. Caesar cipher
    2. Transposition cipher
    3. Frequency analysis
    4. KDFs
    5. Polyalphabetic
  3. Methods of Encryption
    1. Symmetric
      1. Strengths
      2. Weaknesses
      3. Algorithms
        1. DES
        2. 3DES
        3. Blowfish
        4. IDEA
        5. RC4, RC5, RC6
        6. AES
    2. Asymmetric
      1. Strengths
      2. Weaknesses
      3. Algorithms
        1. RSA
        2. ECC
        3. Diffie-Hellman
        4. El Gamal
        5. DSA
        6. Merkle-Hellman Knapsack
    3. Block Ciphers
    4. Stream Cipher
      1. Keystream generators
    5. Attributes
      1. Confusion
      2. Diffusion
    6. Avalanche effect
    7. IV
    8. Hybrid encryption methods
  4. Types of Symmetric Systems
    1. DES
      1. ECB
        1. Pin
      2. CBC
        1. Doc
      3. CFB
        1. Stream
      4. OFB
        1. Voice,video
      5. CTR
    2. 3DES
      1. DES-EEE3
      2. DES-EDE3
      3. DES-EEE2
      4. DES-EDE2
    3. AES
    4. Other algorithms
      1. Block
        1. Blowfish
        2. IDEA
        3. RC5
        4. RC6
      2. Stream
        1. RC4
  5. Types of Asymmetric Systems
    1. Diffie-Hellman
    2. RSA
    3. El Gamal
    4. ECC
    5. Knapsack
    6. Zero Knowledge Proof
  6. Message Integrity
    1. MAC
      1. HMAC
      2. CBC-MAC
      3. CMAC
    2. MD2
    3. MD4
    4. MD5
    5. SHA
    6. HAVAL
    7. Tiger
    8. RIPEMD
    9. Attacks
      1. Birthday attack
    10. Digital Signature
  7. Public Key Infrastructure
    1. Certificate Authority
      1. Cross certification
      2. CRL
      3. OCSP
    2. Registration Authority
    3. Certificate
  8. Key Management
    1. Kerberos
    2. Principles
    3. Recovery
  9. Trusted Platform Module
    1. Persistent memory
      1. EK
      2. SRK
    2. Versatile memory
      1. AIK
      2. PCR
      3. Storage
  10. Link Encryption vs End-to-End Encryption
    1. Link
      1. Traffic-flow security
      2. Pros
      3. Cons
    2. End-to-end
      1. Pros
      2. Cons
  11. E-mail Standards
    1. MIME
    2. SMIME
    3. PGP
      1. Key ring
      2. Web of trust
    4. Quantum cryptography
  12. Internet Security
    1. HTTP
    2. HTTPS
      1. SSL
      2. TLS
    3. S-HTTP
    4. SET
    5. Cookies
    6. SSH
    7. IPSec
      1. AH
      2. ESP
      3. IKE
        1. ISAKMP
        2. OAKLEY
      4. SKIP
  13. Attacks
    1. Active
      1. Known-Plaintext
        1. Linear Cryptanalysis
      2. Chosen-Plaintext
        1. Differential Cryptanalysis
      3. Chosen-Ciphertext
      4. Replay
      5. Algebraic
      6. Analytic
      7. Statistical
      8. Social Engineering
      9. Meet-in-the-Middle
    2. Passive
      1. Sniffing
      2. Side-Channel