Contents
- Ancient cryptography: Vigenère, Enigma, Vernam cipher, Shannon theory
- Diffie-Hellman cryptography: algebra, Diffie-Hellman, ElGamal
- RSA cryptography: number theory, RSA, factoring
- Elliptic curve cryptography: elliptic curves over a finite field, ECDH, ECIES
- Symmetric encryption: block ciphers, stream ciphers, exhaustive search
- Integrity and authentication: hashing, MAC, birthday paradox
- Applications to symmetric cryptography: mobile telephony, Bluetooth, WiFi
- Public-key cryptography: cryptosystem, digital signature
- Trust establishment: secure communication, trust setups
- Case studies: Bluetooth, TLS, SSH, PGP, biometric passport