The Mathematics used to secure data.
Metauni Lectures
Vulnerabilities
- CA Compromise
- Key Compromise
- Flawed Cryptographic Algorithm Implementation
- Outdated Algorithms
- Weak Random Number Generation
Attacks
- Side Channel Attack
- SSL Stripping
- SSL Downgrade
- Collision Attack
- Birthday Attack
- Pass The Hash Attack
- Wienerâs Attack
- Chinese Remainder Theorem
Concepts
Algorithm Types
- Cipher
- Key Exchange Algorithms
- Hashing Algorithms
- Signature Algorithm
- Key Stretching Algorithms
- Consensus Algorithm
Core Concepts
- Key
- Keygen
- Cryptographic Threat Models
- Secrecy
- Integrity
- Authenticity
- Kerckhoffâs Principle
- Shannonâs Maxim
- Symmetric Cryptography
- Asymmetric Cryptography
- Digital Signature
- PKC
- Salting
- Peppering
- ECC
- Message Authentication Code
- TLS
- PKCS