Introduction

Security Goals, Cryptographic Attacks, Services and Mechanisms, Techniques

Introduction to Number Theory

  • Euclidean Algorithm
  • Modular Airthmetic
  • Prime Numbers
  • Fermat Theorem
  • Euler Theorem
  • Euler’s Totient Function
  • Extended Euclidean Algorithm
  • Testing for Primality
  • Chinese Remainder Theorem
  • Discrete Logirthms

Symmetric Ciphers

  • Classic Encryption Techniques - Symmetric Cipher Model
  • Substitution Techniques - same as 1st
  • Transposition Techniques - same as 1st
  • Block Ciphers
  • Data Encryption Standard (DES)
  • Strength of DES
  • Block Cipher Design Principles
  • Advanced Encryption Standard AES
  • AES Structure
  • Transformation Functions
  • Key Expansion