Skip to main content
๐ณ Cryptography
-
๐ชด Stanford Cryptography 1
-
Advanced Encryption Standard (AES)
-
Advantage
-
Block Cipher
-
Cipher
-
Confidentiality
-
Consistency Equation
-
Data Encryption Standard (DES)
-
Digital Signatures
-
eStream Ciphers
-
Fault Attack
-
Feistel Network
-
Handshake Protocol
-
Indistinguishability
-
Integrity
-
Linear Cryptanalysis
-
Linear Feedback Shit Register
-
One Time Pad
-
Point Distribution
-
Probability Event
-
Pseudo-random Function
-
Pseudo-random Generator
-
Pseudo-random Permutation
-
Quantum Attack
-
Random Variable
-
Randomized Algorithms
-
RC4
-
Round Keys
-
Salsa20
-
Shanon Perfect Secrecy
-
Side Channel Attack
-
Stream Cipher
-
Substitution Permutation Network
-
Symmetric Encryption
-
The Birthday Paradox
-
The worst type of vulnerability is a cipher text only attack
-
TLS
-
Uniform Distribution
-
Uniform Random Variable
-
Union Bound
-
Unpredictability
-
Variable Independence
-
XOR
-
You should only use encryption algorithms which are publicly known and peer reviewed