Cryptography Fundamentals for Developers and Security Professionals
Cryptography ensures confidentiality and authenticity of digital documents. The mathematics behind cryptography show us why, and how far, it can be trusted.
What you'll learn
The Java and .NET frameworks contain all the algorithms you need to keep your users' data secret from prying eyes. Web servers like Apache, Tomcat, and IIS, combined with tools like OpenSSL, keep your users secure online. But to use these tools correctly, and to avoid mistakes of the past, you must understand how cryptography works. Learn the math behind encryption and digital signatures. Study examples of how it has been misused, and explore the possibilities that cryptography enables in digital currency and collaboration.
Table of contents
- Introduction 1m
- Block Ciphers 2m
- Confusion and Key Schedules 1m
- Diffusion and Cipher Block Chaining 2m
- Initialization Vectors 1m
- DES 1m
- AES 3m
- Modern Cryptanalysis 2m
- Compression and Error Correction 4m
- Public and Private Keys 3m
- Inverse Exponents Example 2m
- Finding Inverse Exponents 5m
- The RSA Algorithm 2m
- Patterns in RSA 3m
- Discrete Logarithm Problem 6m
- Elliptic Curve 3m
- Digital Signatures 3m
- Hashing Algorithms 2m
- Birthday Attack 4m
- Trust 2m
- Summary 1m
- Passwords 2m
- Hashed Passwords 2m
- Rainbow Tables 4m
- Salted Hashed Passwords 2m
- Computing Password Entropy 4m
- Password Based Key Derivation Functions 4m
- Progressive Salted Hashed Passwords 2m
- Federation 4m
- Kerberos 1m
- WS-Trust and WS-Federation 2m
- XML Signature Wrapping Attacks 2m
- OAuth 6m
- OpenID Connect 3m
- Conclusion 1m