The Mathematics used to secure data.
Metauni Lectures
Vulnerabilities
- CA Compromise
- Key Compromise
- Flawed Cryptographic Algorithm Implementation
- Outdated Algorithms
- Weak Random Number Generation
Attacks
- Side Channel Attack
- SSL Stripping
- SSL Downgrade
- Collision Attack
- Birthday Attack
- Pass The Hash Attack
- Chinese Remainder Theorem
Concepts
Algorithm Types
- Cipher
- Key Exchange Algorithms
- Hashing Algorithms
- Signature Algorithm
- Key Stretching Algorithms
- Consensus Algorithm
Core Concepts
- Key
- Keygen
- CPA
- Known Plaintext Attack
- IND-CPA
- IND-CCA
- Symmetric Cryptography
- Asymmetric Cryptography
- Digital Signature
- PKC
- Salting
- Peppering