Cryptography

"In a world full of noise, cryptography is the whisper only the worthy can hear"


What is cryptography

Cryptography is a field of study, where we primarily focused on securing data by transforming it to ensure confidentiality, integrity, authenticity, and non-repudiation.
It uses mathematical techniques and algorithms to protect information during storage and transmission against unauthorized access or tampering.


(As you know, we are now going to take a deep dive into the sea of cryptography. Same as we do on another topics.)

Cryptography in depth

Following are the Topics which we would cover in our upcomming posts

  1. 3 Topics

    1. FOUNDATION STAGE - The Basics

    1. 1.1. What is Cryptography?
    2. 1.2. A Brief History
    3. 1.3. Cryptographic Terminology
  2. 5 Topics

    2. MATH STAGE - Core Mathematical Foundations

    1. 2.1. Number Theory
    2. 2.2. Algebra
    3. 2.3. Linear Algebra
    4. 2.4. Probability and Statistics
    5. 2.5. Information Theory
  3. 5 Topics

    3. SYMMETRIC CRYPTOGRAPHY

    1. 3.1. Block Ciphers
    2. 3.2. Stream Ciphers
    3. 3.3. Cipher Modes of Operation
    4. 3.4. Padding Techniques
    5. 3.5. Key Derivation
  4. 4 Topics

    4. ASYMMETRIC CRYPTOGRAPHY

    1. 4.1. RSA
    2. 4.2. Diffie-Hellman Key Exchange
    3. 4.3. ElGamal Encryption
    4. 4.4. ECC (Elliptic Curve Cryptography)
  5. 3 Topics

    5. CRYPTOGRAPHIC HASH FUNCTIONS

    1. 5.1. Properties
    2. 5.2. Algorithms
    3. 5.3. Applications
  6. 2 Topics

    6. AUTHENTICATION & SIGNATURES

    1. 6.1. MAC (Message Authentication Code)
    2. 6.2. Digital Signatures
  7. 6 Topics

    7. ENCRYPTION PROTOCOLS & APPLICATIONS

    1. 7.1. Transport Encryption
    2. 7.2. Network Security
    3. 7.3. File & Disk Encryption
    4. 7.4. End-to-End Encryption
    5. 7.5. Email Security
    6. 7.6. Authentication Tokens
  8. 7 Topics

    8. ADVANCED & FUTURISTIC CRYPTOGRAPHY

    1. 8.1. Post-Quantum Cryptography
    2. 8.2. Homomorphic Encryption
    3. 8.3. Secure Multi-Party Computation
    4. 8.4. Functional Encryption
    5. 8.5. Zero-Knowledge Proofs
    6. 8.6. Verifiable Delay Functions
    7. 8.7. Oblivious Transfer
  9. 3 Topics

    9. BLOCKCHAIN & CRYPTOCURRENCIES

    1. 9.1. Cryptographic Concepts in Blockchain
    2. 9.2. Zero-Knowledge in Crypto
    3. 9.3. Smart Contracts & Security
  10. 5 Topics

    10. CRYPTOGRAPHIC ATTACKS

    1. 10.1. Mathematical Attacks
    2. 10.2. Cryptanalysis
    3. 10.3. Hash Attacks
    4. 10.4. Side-channel Attacks
    5. 10.5. Protocol-Level Attacks
  11. 4 Topics

    11. IMPLEMENTATION & ENGINEERING

    1. 11.1. Secure Coding
    2. 11.2. Libraries & APIs
    3. 11.3. Random Number Generators
    4. 11.4. Hardware & Embedded
  12. 3 Topics

    12. STANDARDS, REGULATIONS & ETHICS

    1. 12.1. Standards
    2. 12.2. Legal Controls
    3. 12.3. Cryptography and Privacy Laws
  13. 4 Topics

    13. CRYPTOGRAPHY IN PRACTICE

    1. 13.1. Capture the Flag (CTF) Crypto Challenges
    2. 13.2. Learn-by-building Projects
    3. 13.3. Recommended Books
    4. 13.4. Tools to Learn

📞 Contact Us

We're always here to help!

© 2024 cyberuniversity.tech. All rights reserved.Term of service, Privacy Policy