- Scenarios
- Secure communication: HTTPS/802.11i WPA2
- Encrypting files on disk: EFS, TrueCrypt
- Content protection: DVD/CSS, Blue-ray/AACS
- User Authentication
- Building blocks
- Plain-text and cipher-text
- Algorithm: publicly known, never use a proprietary cipher
- Key: one-time key/many-time key(dynamic key)
- Series Videos
- What is cryptography
- History of cryptography
- Discrete probability Crash course
- Discrete probability crash course cont
- Information theoretic security and the one time pad
- Stream ciphers and pseudo random generators
- Attacks on stream ciphers and the one time pad
- Real world stream ciphers
- PRG Security Definitions
- Semantic Security
- Stream ciphers are semantically secure
- What are block ciphers
- The Data Encryption Standard
- Exhaustive search attacks
- More attacks on block ciphers
- The AES block cipher
- Block ciphers from PRGs
- Review PRPs and PRFs
- Modes of operation one time key
- Security for many time key
- Modes of operation many time key CBC
- Modes of operation many time key CTR
- Message Authentication Codes
- MACs Based On PRFs
- CBC MAC and NMAC
- MAC padding
- PMAC and the Carter Wegman MAC
- Introduction (Collision Resistance)
- Generic birthday attack
- The Merkle Damgard Paradigm
- Constructing compression functions
- HMAC
- Timing attacks on MAC verification
- Active attacks on CPA secure encryption
- Definitions (Authenticated Encryption)
- Chosen ciphertext attacks
- Constructions from ciphers and MACs
- Case study TLS
- CBC padding attacks
- Attacking non atomic decryption
- Key Derivation
- Deterministic Encryption
- Deterministic EncryptionSIV and wide PRP
- Tweakable encryption
- Format preserving encryption