Cryptography

"In a world full of noise, cryptography is the whisper only the worthy can hear"


What is cryptography

Cryptography is a field of study, where we primarily focused on securing data by transforming it to ensure confidentiality, integrity, authenticity, and non-repudiation.
It uses mathematical techniques and algorithms to protect information during storage and transmission against unauthorized access or tampering.


(As you know, we are now going to take a deep dive into the sea of cryptography. Same as we do on another topics.)

Cryptography in depth

Following are the Topics which we would cover in our upcomming posts

  1. 1. FOUNDATION STAGE - The Basics
    1. 1.1. What is Cryptography?
    2. 1.2. A Brief History
    3. 1.3. Cryptographic Terminology
  2. 2. MATH STAGE - Core Mathematical Foundations
    1. 2.1. Number Theory
    2. 2.2. Algebra
    3. 2.3. Linear Algebra
    4. 2.4. Probability and Statistics
    5. 2.5. Information Theory
  3. 3. SYMMETRIC CRYPTOGRAPHY STAGE - Secret Key Crypto
    1. 3.1. Block Ciphers
    2. 3.2. Stream Ciphers
    3. 3.3. Cipher Modes of Operation
    4. 3.4. Padding Techniques
    5. 3.5. Key Derivation
  4. 4. ASYMMETRIC CRYPTOGRAPHY STAGE - Public Key Crypto
    1. 4.1. RSA
    2. 4.2. Diffie-Hellman Key Exchange
    3. 4.3. ElGamal Encryption
    4. 4.4. ECC (Elliptic Curve Cryptography)
  5. 5. CRYPTOGRAPHIC HASH FUNCTIONS
    1. 5.1. Properties
    2. 5.2. Algorithms
    3. 5.3. Applications
  6. 6. AUTHENTICATION & SIGNATURES
    1. 6.1. MAC (Message Authentication Code)
    2. 6.2. Digital Signatures
  7. 7. ENCRYPTION PROTOCOLS & APPLICATIONS
    1. 7.1. Transport Encryption
    2. 7.2. Network Security
    3. 7.3. File & Disk Encryption
    4. 7.4. End-to-End Encryption
    5. 7.5. Email Security
    6. 7.6. Authentication Tokens
  8. 8. ADVANCED & FUTURISTIC CRYPTOGRAPHY
    1. 8.1. Post-Quantum Cryptography
    2. 8.2. Homomorphic Encryption
    3. 8.3. Secure Multi-Party Computation
    4. 8.4. Functional Encryption
    5. 8.5. Zero-Knowledge Proofs
    6. 8.6. Verifiable Delay Functions
    7. 8.7. Oblivious Transfer
  9. 9. BLOCKCHAIN & CRYPTOCURRENCIES
    1. 9.1. Cryptographic Concepts in Blockchain
    2. 9.2. Zero-Knowledge in Crypto
    3. 9.3. Smart Contracts & Security
  10. 10. CRYPTOGRAPHIC ATTACKS
    1. 10.1. Mathematical Attacks
    2. 10.2. Cryptanalysis
    3. 10.3. Hash Attacks
    4. 10.4. Side-channel Attacks
    5. 10.5. Protocol-Level Attacks
  11. 11. IMPLEMENTATION & ENGINEERING
    1. 11.1. Secure Coding
    2. 11.2. Libraries & APIs
    3. 11.3. Random Number Generators
    4. 11.4. Hardware & Embedded
  12. 12. STANDARDS, REGULATIONS & ETHICS
    1. 12.1. Standards
    2. 12.2. Legal Controls
    3. 12.3. Cryptography and Privacy Laws
  13. 13. CRYPTOGRAPHY IN PRACTICE
    1. 13.1. Capture the Flag (CTF) Crypto Challenges
    2. 13.2. Learn-by-building Projects
    3. 13.3. Recommended Books
    4. 13.4. Tools to Learn

📞 Contact Us

We're always here to help!

© 2024 cyberuniversity.tech. All rights reserved.Term of service, Privacy Policy