Linked e-resources

Details

Intro
Preface
Contents
1: Basics and History
1.1 What It Is About: The Scenario
1.1.1 An Initial Overview
1.1.2 Sending and Storing Information
1.1.3 Receiving and Reading Information
1.2 Alphabets and Digitisation
1.2.1 Alphabets and Modulo Calculation
1.2.2 Digitisation and Bytes
1.3 Caesar Cipher
1.3.1 Shift Cipher
1.3.2 Affine Cipher
1.4 Secret Writing of the Illuminati
1.4.1 Illuminati Alphabet and Secret Writing
1.4.2 Monoalphabetic Ciphers
1.5 Vigenère Cipher
1.5.1 Polyalphabetic Ciphers
1.5.2 Vigenère Tableau

1.5.3 Smoothing of Statistical Frequencies
1.6 Kasiski and Friedman Attack
1.6.1 Kasiski Attack
1.6.2 Friedman Coincidence Index
1.6.3 Friedman Attack
1.7 Enigma Machine
1.7.1 Structure of the Enigma Machine
1.7.2 Configuration of the Enigma Machine
1.7.3 Deciphering and Security with Enigma
2: Symmetric Ciphers
2.1 Keys and Attack Strategies
2.1.1 Algorithm and Key
2.1.2 Symmetric and Asymmetric Ciphers
2.1.3 Kerckhoff's Principle
2.1.4 Military Secrets
2.1.5 Attack Strategies
2.2 Vernam Cipher and Pseudo-Randomness

2.2.1 Vernam Cipher
2.2.2 Shift Registers
2.2.3 Pseudo-Randomness and Cryptanalysis
2.3 GSM Mobile Communications
2.3.1 The GSM Mobile Communications Standard
2.3.2 GSM Data Encryption
2.3.3 A5 Cipher of Version A5/1
2.4 Feistel Cipher
2.4.1 Stream Ciphers and Block Ciphers
2.4.2 Confusion and Diffusion
2.4.3 Construction Principle of a Feistel Cipher
2.5 Data Encryption Standard DES
2.5.1 From LUCIFER to DES
2.5.2 DES as Feistel Cipher
2.5.3 DES Expansion
2.5.4 DES Key Addition
2.5.5 DES S-Boxes
2.5.6 DES Permutation

2.5.7 DES Key Selection
2.5.8 Security of the DES
2.5.9 Differential Cryptanalysis Using the Example of DES
2.5.10 Linear Cryptanalysis Using the Example of DES
2.5.11 Brute-Force Attack and Triple-DES
2.6 Operating Modes of Block Ciphers
2.6.1 Electronic Codebook Mode
2.6.2 Cipher Block Chaining Mode
2.6.3 Cipher Feedback Mode
2.6.4 Output Feedback Mode
2.6.5 Counter Mode
2.7 UMTS/LTE Mobile Communications and Digital Television
2.7.1 The UMTS/LTE Mobile Communications Standard
2.7.2 A5 Cipher of Versions A5/3 and A5/4
2.7.3 DVB and MPEG2

2.7.4 CSA Encryption
2.8 Advanced Encryption Standard AES
2.8.1 Rijndael Procedure and AES
2.8.2 Addition and Multiplication of Bytes
2.8.3 AES State Matrix
2.8.4 AES Subbyte
2.8.5 AES ShiftRow
2.8.6 AES MixColumn
2.8.7 AES AddRoundKey
2.8.8 AES Decryption
2.8.9 Security of the AES
2.9 Hard Disk and ZIP Archive
2.9.1 Hard Disk
2.9.2 CBC-AES Hard Disk Encryption
2.9.3 XTS-AES Hard Disk Encryption
2.9.4 ZIP Archive
3: Public-Key Ciphers
3.1 Factorization and RSA Cipher
3.1.1 Prime Numbers and Factorization

Browse Subjects

Show more subjects...

Statistics

from
to
Export