Cryptology

9/14/98


Click here to start


Table of Contents

Cryptology

Information Ingegrity Functions

Integrity Functions

Reasons for Cheating

Reasons for Cheating (2)

Mathematical Conventions

Encryption/Decryption with Key Key Key

Classic Methods of Cryptanlysis

Modern Cryptographic Attacks

Simple Ciphers

Information Theory and Perfect Secrecy

Practical Security (Shannon)

Common Cryptographic Methods

Compression and Cryptography

Types of Stream Ciphers

Stream Ciphers

Secret Key Systems

DES Introduction

DES Overview

DES Internals

IDEA

Key Management

Secrecy and Authenticity

Public Key Cryptosystems

Diffie Hellman Key Exchange

RSA Algorithm

RSA Internals

Other Public Key Cryptosystems

Common Applications

Direct Implementations

Other real world uses of cryptography

Author: Jeehye Yun

Email: jeehye@umiacs.umd.edu

Home Page: www.research.umbc.edu/~jeehye/cmsc491b