Introduction
Security Goals, Cryptographic Attacks, Services and Mechanisms, Techniques
Introduction to Number Theory
- Euclidean Algorithm
- Modular Airthmetic
- Prime Numbers
- Fermat Theorem
- Euler Theorem
- Euler’s Totient Function
- Extended Euclidean Algorithm
- Testing for Primality
- Chinese Remainder Theorem
- Discrete Logirthms
Symmetric Ciphers
- Classic Encryption Techniques - Symmetric Cipher Model
- Substitution Techniques - same as 1st
- Transposition Techniques - same as 1st
- Block Ciphers
- Data Encryption Standard (DES)
- Strength of DES
- Block Cipher Design Principles
- Advanced Encryption Standard AES
- AES Structure
- Transformation Functions
- Key Expansion