Chapter 1
Symmetric Key Cryptography
Classical ciphers and cryptanalysis
medium • 1 min read
Feistel networks and block cipher design principles
medium • 2 min read
Data Encryption Standard (DES) and AES algorithms
medium • 3 min read
Block cipher modes of operation (ECB, CBC, GCM)
medium • 4 min read
Stream ciphers and pseudo-random number generators
medium • 5 min read
Chapter 2
Public Key Cryptography
Cryptographic hash functions (SHA-2, SHA-3)
medium • 1 min read
Message Authentication Codes (HMAC)
medium • 2 min read
Digital signatures (DSA, RSA signatures)
medium • 3 min read
Public Key Infrastructure (PKI) and X.509 certificates
medium • 4 min read
Key management and certificate revocation
medium • 5 min read
Chapter 4
Network Security Protocols
Chapter 5