Cryptology#


Table of Contents#


Resources#

  • [ g ] Awesome Cryptography

  • [ h ] NaCl: Networking and Cryptography Library

  • [ h ] TweetNaCl: a crypto library in 100 tweets

  • [ h ] TweetNaCl.js

https://www.keylength.com/en/compare/

  • [ y ] 10-25-2017. “Cryptography: Crash Course Computer Science #33”.

  • [ y ] 03-04-2015. MIT OpenCourseware. “21. Cryptography: Hash Functions”. Design and Analysis of Algorithms (Spring 2015).

  • [ y ] 03-04-2015. MIT OpenCourseware. “22. Cryptography: Encryption”. Design and Analysis of Algorithms (Spring 2015).

  • [ y ] 09-27-2013. VideosCoursera. “Cryptography I”.

  • [ y ] 08-08-2022. “Jonathan Katz - Introduction to Cryptography Part 1 of 3 - IPAM at UCLA”.

  • [ y ] 08-08-2022. “Jonathan Katz - Introduction to Cryptography Part 2 of 3 - IPAM at UCLA”.

  • [ y ] 08-08-2022. “Jonathan Katz - Introduction to Cryptography Part 3 of 3 - IPAM at UCLA”.

more

  • [ y ] 02-03-2024. OskarPuzzle. “PRBS Generator - What are Pseudo-Random Binary Sequences used for?”.


Texts#

  • Aumasson, Jean-Philippe. (2021). Crypto Dictionary: 500 Tasty Tidbits for the Curious Cryptographer. No Starch Press.

  • Aumasson, Jean-Philippe. (2017). Serious Cryptography: A Practical Introduction to Modern Encryption. No Starch Press.

  • Dunin, Elonka & Klaus Schmeh. (2023). Codebreaking: A Practical Guide. No Starch Press.

  • Hoffstein, Jeffrey, Jill Pipher, & Joseph H. Silverman. (2014). An Introduction to Mathematical Cryptography, 2nd Ed. Springer Undergraduate Texts in Mathematics.

  • [ h ][ y ] Katz, Jonathan & Yehuda Lindell. Introduction to Modern Cryptography. 3e. Chapman & Hall CRC Cryptography and Network Security Series.

  • [ h ] Menezes, Alfred J., Paul C. van Oorschot, & Scott A. Vanstone. (1996). Handbook of Applied Cryptography. CRC Press.

  • Mitani, Masaaki; Shinichi Sato; Idero Hinoki; & Verte Corp. (2018). The Manga Guide to Cryptography. No Starch Press.

  • McAndrew, Alasdair. (2016). Introduction to Cryptography with Open-Source Software. CRC Press.

  • Rubin, Frank. (2022). Secret Key Cryptography: Ciphers, from simple to unbreakable. Manning.

  • [ h ] Sweigart, Al. (2018). Cracking Codes with Python: An Introduction to Building and Breaking Ciphers. No Starch Press.

  • Wong, David. (2021). Real-World Cryptography. Manning.


Figures#

  • [ w ] 1945----- Adleman, Leonard

  • [ w ] --------- Chaum, David

  • [ w ] 1944----- Diffie, Whitfield

  • [ w ] --------- Dwork, Cynthia

  • [ w ] 1936-2020 Edwards, Harold

  • [ w ] 1915-1990 Feistel, Horst

  • [ w ] 1945----- Hellman, Martin

  • [ w ] --------- Jakobsson, Markus

  • [ w ] --------- Katz, Jonathan [ h ]

  • [ w ] 1952----- Merkle, Ralph

  • [ w ] --------- Naor, Moni

  • [ w ] 1947----- Rivest, Ronald

  • [ w ] 1943----- Schnorr, Claus

  • [ w ] 1952----- Shamir, Adi


Terms#

  • [ w ] 40-Bit Encryption

  • [ w ] 56-Bit Encryption

  • [ w ] Advanced Encryption Standard (AES)

  • [ w ] Adversary

  • [ w ] Alice

  • [ w ] Atbash

  • [ w ] Authenticated Encryption

  • [ w ] Authentication

  • [ w ] Attack Model

  • [ w ] Avalanche Effect

  • [ w ] Bar Mitzvah Attack

  • [ w ] Birthday Attack

  • [ w ] Blind Signature

  • [ w ] Block Cipher

  • [ w ] Block Cipher Mode of Operation

  • [ w ] Bob

  • [ w ] Brute-Force Attack

  • [ w ] Caesar Cipher

  • [ w ] CCM Mode

  • [ w ] Certificate Authority

  • [ w ] Challenge-Response Authentication

  • [ w ] Cipher

  • [ w ] Cipher Block Chaining Message Authentication Code (CBC-MAC)

  • [ w ] Cipher Suite

  • [ w ] Ciphertext

  • [ w ] Classical Cipher

  • [ w ] Code

  • [ w ] Codebook

  • [ w ] Collision Attack

  • [ w ] Communications Security

  • [ w ] Computationally Bounded Adversary

  • [ w ] Computer Security

  • [ w ] Confusion and Diffusion

  • [ w ] Cryptanalysis

  • [ w ] Crypto-Shredding

  • [ w ] Cryptographic Hash Function

  • [ w ] Cryptographic Primitive

  • [ w ] Cryptographic Protocol

  • [ w ] Cryptography

  • [ w ] Cryptography Export

  • [ w ] Cryptosystem

  • [ w ] Data Encryption Standard (DES)

  • [ w ] Diehard Tests

  • [ w ] Differential Cryptanalysis

  • [ w ] Diffie-Hellman Key Exchange

  • [ w ] Digital Certificate

  • [ w ] Digital Signature

  • [ w ] Distributed Key Generation (DKG)

  • [ w ] Edwards-Curve Digital Signature Algorithm (EdDSA)

  • [ w ] Elliptic-Curve Cryptography

  • [ w ] Elliptic-Curve Diffie-Hellman (ECDH)

  • [ w ] Encryption

  • [ w ] End-to-End Encryption (E2EE)

  • [ w ] Feistel Network

  • [ w ] Fluhrer, Mantin, Shamir Attack

  • [ w ] Format-Preserving Encryption

  • [ w ] Forward Secrecy

  • [ w ] Frequency Analysis

  • [ w ] Fundamental Theorem of Arithmetic

  • [ w ] Galois/Counter Mode (GCM)

  • [ w ] Generic Group Model

  • [ w ] GNU Privacy Guard (GnuPG)

  • [ w ] Hash-Based Message Authentication Code (HMAC)

  • [ w ] Hash Function

  • [ w ] HMAC-Based Key Derivation Function (HKDF)

  • [ w ] Hybrid Cryptosystem

  • [ w ] Identity-Based Cryptography

  • [ w ] Identity-Based Encryption

  • [ w ] Information-Theoretic Security

  • [ w ] Initialization Vector (IV)

  • [ w ] Kerckhoff’s Principle

  • [ w ] Key

  • [ w ] Key-Agreement Protocol

  • [ w ] Key Derivation Function (KDF)

  • [ w ] Key Exchange

  • [ w ] Key Generation

  • [ w ] Key Generator

  • [ w ] Key Management

  • [ w ] Key Schedule

  • [ w ] Key Server

  • [ w ] Key Size

  • [ w ] Key Stream

  • [ w ] Known-Plaintext Attack (KPA)

  • [ w ] Linear Cryptanalysis

  • [ w ] Link Encryption

  • [ w ] Lookup Table

  • [ w ] MD2

  • [ w ] MD4

  • [ w ] MD5

  • [ w ] MD6

  • [ w ] Mersenne Twister

  • [ w ] Message

  • [ w ] Message Authentication Code (MAC)

  • [ w ] Multiple Encryption

  • [ w ] Mutual Authentication

  • [ w ] Negligible Function

  • [ w ] Non-Cryptographic Hash Function (NCHF)

  • [ w ] Nonce

  • [ w ] Null Cipher

  • [ w ] One-Time Pad

  • [ w ] Partitioning Cryptanalysis

  • [ w ] Passphrase

  • [ w ] Password

  • [ w ] Permutation

  • [ w ] Plaintext

  • [ w ] Preimage Attack

  • [ w ] Pretty Good Privacy (PGP)

  • [ w ] Product Cipher

  • [ w ] Provable Security

  • [ w ] Pseudo Random Function Family (PRF)

  • [ w ] Pseudo Random Number Generator (PRNG)

  • [ w ] Public-Key Certificate

  • [ w ] Public-Key Cryptography

  • [ w ] Public-Key Infrastructure (PKI)

  • [ w ] Quantum Cryptography

  • [ w ] Quantum Key Distribution

  • [ w ] Random Oracle

  • [ w ] Randomized Algorithm

  • [ w ] RC2

  • [ w ] RC4

  • [ w ] RC5

  • [ w ] RC6

  • [ w ] Related-Key Attack

  • [ w ] Replay Attack

  • [ w ] Rivest-Shamir-Adleman (RSA)

  • [ w ] ROT13

  • [ w ] Round

  • [ w ] Schnor Signature

  • [ w ] Secret Sharing

  • [ w ] Secure Channel

  • [ w ] Secure Communication

  • [ w ] Secure Multi Party Computation

  • [ w ] Security Engineering

  • [ w ] Security Level

  • [ w ] Security Protocol Notation

  • [ w ] Security Through Obscurity

  • [ w ] Session Key

  • [ w ] Shared Secret

  • [ w ] Side-Channel Attack

  • [ w ] Signals Intelligence

  • [ w ] Slide Attack

  • [ w ] Standard Model

  • [ w ] Steganography

  • [ w ] Stream Cipher

  • [ w ] Stream Cipher Attack

  • [ w ] Strong Cryptography

  • [ w ] Substitution Cipher

  • [ w ] Sybil Attack

  • [ w ] Symmetric-Key Algorithm

  • [ w ] Threshold Cryptosystem

  • [ w ] Transposition Cipher

  • [ w ] Trust Metric

  • [ w ] Twisted Edwards Curve

  • [ w ] Unconditional Security

  • [ w ] VeraCrypt

  • [ w ] Vigenère Cipher

  • [ w ] Web of Trust

  • [ w ] Zero Knowledge Proof (ZKP)