Ethical Hacking ITRONIX CERTIFIED

Cryptography Industrial Training

 

CHAPTER 1: Problem of Trust—Evolution of Cryptography

CHAPTER 2: Introduction of Cryptography and Basic Terminologies

CHAPTER 3: Mathematics Related to Cryptography – Number Theory

CHAPTER 4: Probability theory

CHAPTER 5: Classical Cryptosystems – Techniques of Cryptography (150+ Practical Cryptographic Techniques)

CHAPTER 6: Cryptanalyst Techniques (Breaking of Cryptosystems)

CHAPTER 7: Shanon’s Theory of Cryptography

CHAPTER 8: Symmetric Key Settings

CHAPTER 9: Block Ciphers (Concept of Boxes)

CHAPTER 10: Data Encryption Standards (DES)

CHAPTER 11: Cryptanalysis of DES

CHAPTER 12: Advance Encryption Standards (AES)

CHAPTER 13: Cryptanalysis on AES

CHAPTER 14: Linear Cryptanalysis

CHAPTER 15: Differential Cryptanalysis

CHAPTER 16: Boomerangs and Other Coconut Attacks – Cryptanalytical Attacks

CHAPTER 17: Overview of S-Boxes and their Constructions

CHAPTER 18: Modes of Operation on Block Ciphers

CHAPTER 19: Public Key Cryptography

CHAPTER 20: Digital Signatures and Certificates and their Constructions

CHAPTER 21: Stream Ciphers

CHAPTER 22: Random Bit Generator – Pseudorandomness and its testing

CHAPTER 23: Introduction to Cryptgraphic Hash Functions

CHAPTER 24: Difference between Hash Functions and Encryption Standards

CHAPTER 25: Random Oracle Model and its Probability Testing

CHAPTER 26: Preimage, Second Preimage and Collision (Algorithms to find and their Reductions)

CHAPTER 27: Construction of Iterated Hash Functions

CHAPTER 28: Markel Damgard Construction

CHAPTER 29: Practical Attacks on Cryptographic hash functions (Commitment Pitfalls)

CHAPTER 30: Message Authentication Codes and Message Detection Codes (The tree Structure)

CHAPTER 31: Construction of Hash Functions (SHA-0,SHA-1,SHA-2,SHA-3 and their Families)

CHAPTER 32: Attacks on Hash Functions and their practical workings

CHAPTER 33: Construction of Message Detection Codes (MD-5)

CHAPTER 34: Attacks on Message Detection Codes (Breakage of MD-5) (Published in Hackin9)

CHAPTER 35: Meaningful Collisions

CHAPTER 36: Unkeyed Hash Functions and Construction of IV based MACs

CHAPTER 37: Construction of HMACs and NMACs

CHAPTER 38: Construction of CBC MAC and its breakage

CHAPTER 39: Chinese Remainder Theorem

CHAPTER 40: The RSA cryptosystem (complete explanation and modelling) and its construction

CHAPTER 41: Testing for the generation of Prime Numbers – Primality Testing Algorithms

CHAPTER 42: Security of RSA Cryptosystem

CHAPTER 43: Algorithms helps for factoring of the large numbers

CHAPTER 44: Discrete Logarithm Problem

CHAPTER 45: Diffie-Hellman Key Exchange cryptosystem

CHAPTER 46: Attack on Diffie-Hellman Cryptosystem

CHAPTER 47: Elgamal Cryptosystem and its security and attack methodologies

CHAPTER 48: Introduction to Elliptical Curve Cryptography

CHAPTER 49: Applications of Elliptical Curve Cryptography

CHAPTER 50: Implementation of Elliptical Curve Cryptography

CHAPTER 51: Role of Cryptography in Network Construction

CHAPTER 52: System Security (Viruses,Worms and Trojans etc and their building and effects on systems)

CHAPTER 53: Practical Implementation of Buffer Overflow (Published in Hackin9)

CHAPTER 54: Role of Encryption in Intrusion Detection System (Published in E-forensics and Pentestmag)

CHAPTER 55: Creation on Advance Intrusion Detection Environment (Published in Pentestmag)

Leave a Reply

Your email address will not be published. Required fields are marked *