Cybersecurity

1.Substitution cipher, classification of Attacks

post-thumbnail

2.Modular Arithmetic, ultiplicative Inverse, Shift & Affine Cipher

post-thumbnail

3.Stream Cipher, Random Number Generator

post-thumbnail

4.DES (Data Encryption Standard)

post-thumbnail

5.AES Basic, GF(Galois Field)

post-thumbnail

6.AES Architecture

post-thumbnail

7.Block Ciphers , ECB, CBC

post-thumbnail

8.OFB, 2DES, 3DES

post-thumbnail

9.Euclidean algorithm, RSA

post-thumbnail

10.Square-and-Multiply algorithm, Diffie-Hellman Key Exchange(DHKE)

post-thumbnail

11.Cyber HW

post-thumbnail

12.Mid Term Example

post-thumbnail

13.기말범위: Review of DLP

post-thumbnail

14.Elgamal Encryption

post-thumbnail

15.Elliptic Curve Cryptography(ECC)

post-thumbnail

16.ECDLP, ECDH (double)

post-thumbnail

17.Digital RSA Signiture

post-thumbnail

18.Elgammal Signature, Hash function

post-thumbnail

19.Birthday Attack, SHA-1 Merkle-Damgård

post-thumbnail

20.HW4

post-thumbnail

21.MAC, HMAC, Markle-Damgord construction

post-thumbnail

22.KDC (Key Distribution Center)

post-thumbnail

23.Man-in-the-Middle Attack(MITM), CA

post-thumbnail

24.Cyber HW 5

post-thumbnail