Skip to content

Secgroup Ca' Foscari

  • Home
  • Projects
  • Teaching
  • Competitions
  • People
  • Blog
  • Privacy Policy
  • Copyright
Secgroup Ca' Foscari

Cryptography

Recommended books

  • D. R. Stinson, Cryptography, Theory and Practice, CRC Press.
  • A. J. Menezes, P. C. van Oorschot, S. A. Vanstone, Handbook of Applied Cryptography, CRC Press.
  • R. J. Anderson, Security Engineering: A Guide to Building Dependable Distributed Systems, Wiley, 2008.
  • J. Erickson, Hacking, the art of exploitation, No starch press, 2008.

Table of contents

  • Introduction
  • Classical cryptography
    • Monoalphabetic ciphers
    • A formal definition of cryptosystem
    • Polyalphabetic ciphers
    • Known-plaintext attacks
    • Stream ciphers
    • Shannon theory on perfect ciphers
  • Modern cryptography
    • Composition of ciphers
    • The Advanced Encryption Standard (AES)
    • Block cipher modes of operation
    • More block ciphers
    • Meet-in-the-middle attack
    • Asymmetric-key ciphers
    • The RSA cipher
    • Security of RSA
    • Digital signatures, cryptographic hash functions and MACs
  • Applied cryptography
    • Strong authentication based on symmetric-key cryptography
    • Diffie-Hellman key agreement
    • Strong authentication based on asymmetric-key cryptography
    • Key management

Menu

  • Home
  • Projects
  • Teaching
    • Cryptography
      • Challenges (2014/15)
      • Introduction
      • Monoalphabetic ciphers
      • Definition of cipher
      • Polyalphabetic ciphers
      • Known-plaintext attacks
      • Stream ciphers
      • Perfect ciphers
      • Composition of ciphers
      • The AES cipher
      • Block cipher modes
      • More block ciphers
      • Meet-in-the-middle
      • Asymmetric-key ciphers
      • The RSA cipher
      • Security of RSA
      • Signatures, hashes and MACs
      • Sym-key authentication
      • Diffie-Hellman
      • Asym-key authentication
      • Key management
    • System Security
    • Security 2
    • Sicurezza
    • Sistemi Operativi 2
    • Security 1 (until aa. 2021/22)
    • How to post source code
    • Linux VM with docker
  • Competitions
  • People
  • Blog
  • Privacy Policy
  • Copyright

Recent Posts

  • CyberChallenge.IT, register by February 6!
  • How secure is HTTPS?
  • New attacks on crypto tokens
  • Clipperz seminar @ secgroup
  • DEFCON CTF 2015 hackercalc exploit

Search

Login

  • Log in
  • Entries feed
  • Comments feed
  • WordPress.org
  • Home
  • Projects
  • Teaching
  • Competitions
  • People
  • Blog
  • Privacy Policy
  • Copyright
Secgroup Ca' Foscari Privacy Policy Proudly powered by WordPress