Repository files navigation
presentation/main.pdf
classic
caesar cipher
shift cipher
vigenere cipher
modern
symmetric (secret-key)
encryption schemes
stream cipher
block cipher
substitution-permutation-networks
feistel-networks
modes of operation
electronic codebook mode (ECB)
cipher-block chaining (CBC)
padding oracle on downgraded legacy encryption (POODLE)
output-feedback (OFB)
counter mode (CTR)
eXtended text stealing (XTS)
hash functions
message authentication Codes (MAC)
asymmetric (public-key)
factorization
discrete-log
Diffie-Hellman (DH)
ElGamal
digital signature algorithm (DSA)
lamport one-time signature scheme
one-way functions (?)
CF (?!)
pseudo-random generators (PRG)
pseudo-random functions (PRF)
pseudo-random permutations (PRP)
oracle
random oracle model
theoretic cryptographic attacks
encryption schemes
eavesdropping (EAV)
known-plaintext attack (KPA)
chosen-plaintext attack (CPA, für Pubk equiv. zu EAV)
chosen-ciphertext attack 1 (CCA1)
chosen-ciphertext attack 2 (CCA2)
MAC/signature schemes
adaptive-chosen-message attack (ACMA)
brute-force method
frequency analysis
Kasiski-test
Friedman-test
differential cryptanalysis
rainbow tables
modular arithmetic
modular exponentiation (square-and-multiply algorithm)
groups
extended Euclidean algorithm
Chinese remainder theorem
discrete logarithm
quadratic residue
known-plaintext attack (KPA)
chosen-plaintext attack (CPA)
chosen-ciphertext attack (CCA)
adaptive-chosen-message attack (ACMA)
About
No description, website, or topics provided.
Resources
Stars
Watchers
Forks
You can’t perform that action at this time.