Skip to content

lherich/cryptography

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

11 Commits
 
 
 
 
 
 

Repository files navigation

cryptography

presentation

presentation/main.pdf

algorithm

  • classic
    • caesar cipher
    • shift cipher
    • vigenere cipher
  • modern
    • symmetric (secret-key)
      • encryption schemes
        • stream cipher
        • block cipher
          • substitution-permutation-networks
            • S-boxes
            • P-Boxes
          • feistel-networks
          • modes of operation
            • electronic codebook mode (ECB)
              • watermarking attacks
            • cipher-block chaining (CBC)
              • padding oracle on downgraded legacy encryption (POODLE)
            • output-feedback (OFB)
            • counter mode (CTR)
            • eXtended text stealing (XTS)
        • hash functions
          • Merkle-Damgard transform
        • message authentication Codes (MAC)
          • CBC-MAC
          • NMAC (?)
          • HMAC
      • asymmetric (public-key)
        • factorization
          • RSA
        • discrete-log
          • Diffie-Hellman (DH)
          • ElGamal
          • digital signature algorithm (DSA)
        • lamport one-time signature scheme

concepts

  • one-way functions (?)
  • CF (?!)
  • pseudo-random generators (PRG)
  • pseudo-random functions (PRF)
  • pseudo-random permutations (PRP)
  • oracle
  • random oracle model

theoretic cryptographic attacks

  • encryption schemes
    • eavesdropping (EAV)
    • known-plaintext attack (KPA)
    • chosen-plaintext attack (CPA, für Pubk equiv. zu EAV)
    • chosen-ciphertext attack 1 (CCA1)
    • chosen-ciphertext attack 2 (CCA2)
  • MAC/signature schemes
    • adaptive-chosen-message attack (ACMA)

attack methods

  • brute-force method
  • frequency analysis
  • Kasiski-test
  • Friedman-test
  • differential cryptanalysis
  • rainbow tables

number theory

  • modular arithmetic
  • modular exponentiation (square-and-multiply algorithm)
  • groups
  • extended Euclidean algorithm
  • Chinese remainder theorem
  • discrete logarithm
  • quadratic residue

Figures

eavesdropping (EAV)

eavesdropping (EAV)

known-plaintext attack (KPA)

known-plaintext attack (KPA)

chosen-plaintext attack (CPA)

chosen-plaintext attack (CPA)

chosen-ciphertext attack (CCA)

chosen-ciphertext attack (CCA)

adaptive-chosen-message attack (ACMA)

adaptive-chosen-message attack (ACMA)

About

No description, website, or topics provided.

Resources

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages