CRYPTOGRAPHY AND APPLICATIONS CRYPTOGRAPHY I. ALGORITHMS II. HASH...
2.
Cryptography and Applications
Cryptography
i.
Algorithms
ii.
Hashing
iii.
SHA
iv.
Message Digest
v.
Hashing Summary
vi.
Symmetric Encryption
vii.
DES
viii.
3DES
ix.
AES
x.
CAST
xi.
RC
xii.
Blowfish
xiii.
IDEA
xiv.
Symmetric Encryption Summary
xv.
Asymmetric Encryption
xvi.
RSA
xvii.
Diffie-Hellman
xviii.
ElGamal
xix.
ECC
xx.
Asymmetric Encryption Summary
xxi.
Steganography
xxii.
Cryptography Algorithm Use
xxiii.
Confidentiality
xxiv.
Integrity
xxv.
Nonrepudiation
xxvi.
Authentication
xxvii.
Digital Signatures
xxviii.
Key Escrow
xxix.
Cryptographic Applications
Public Key Infrastructure
i.
The Basics of Public Key Infrastructures
ii.
Certificate Authorities
iii.
Registration Authorities
iv.
Local Registration Authorities
v.
Certificate Repositories
vi.
Trust and Certificate Verification
vii.
Digital Certificates
viii.
Certificate Attributes
ix.
Certificate Extensions
x.
Certificate Lifecycles
xi.
Centralized or Decentralized Infrastructures
xii.
Hardware Storage Devices
xiii.
Private Key Protection
xiv.
Key Recovery
xv.
Key Escrow
xvi.
Public Certificate Authorities
xvii.
In-house Certificate Authorities
xviii.
Outsourced Certificate Authorities
Security in Infrastructure
i.
Physical Security
ii.
The Security Problem
iii.
Physical Security Safeguards