symmetric encryption:
one-time pad, attacks: ciphertext, know plaintext, chosen plaintext,
stream ciphers, PRNG and its desired properties,
LFSR and its weaknesses, A5/1, RC4,
substitution ciphers and frequency analysis,
block ciphers, encryption modes: ECB, CBC, Feistel architecture,
DES, RC5,
key-length problem for DES, triple DES (why "double DES" does not work),
differential cryptanalysis: idea for a single round, fault analysis against the last round,
3-round DES, 4-round DES and characteristics,
linear cryptanalysis, AES
asymmetric methods:
confidentiality and authentication via asymmetric encryption,
hybrid encryption,
discrete logarithm techniques:
discrete logarithm problem,
ElGamal encryption scheme, fast exponentiation: Gauss method, addition chain,
computing Discrete Logarithm: exhaustive search,
baby-step giant-step, Floyd scheme and rho Pollard, Pohlig-Hellman,
ElGamal signature scheme,
extended Eucliden Algorithm and computing inverses: binary GCD,
attacks on ElGamal signature: poor randomness, EG without hash function,
EG without checking range of coefficients, DSA signature,
Schnorr signature, Goh-Jarecki signatures and provable security in random
oracle model and CDH Problem,
pairings based cryptography:
bilinear mappings, ID based cryptography - encryption based on bilinear
mappings,
key management and authentication:
Shamir key transport protocol, Diffie-Hellman protocol,
man-in-the-middle attack,
security assumptions: computational DH, decisional DH, MTI protocol,
establishing a joint value with bit commitment, commitments based
on hash functions and Pedersen commitments,
storing keys with secret sharing: (n,n)-scheme based on XOR,
(n,k) scheme based on Lagrangian interpolation,
secret sharing schemes based on
Boolean circuits with threshold gates, Kerberos - idea of the protocol,
random key predistribution, Blom scheme,
authentication with SSH, authentication with SSL,
password authenticated key exchange - PACE protocol,
hash chains - Lamport scheme, microTesla,
challenge and response paradigm, implementation with electronic signature
and problems of proofs against a third party,
zero knowledge proofs -- idea, interactive proof for graph
isomorphism, notion of a simulator for ZKP,
FFS: zero knowledge proof of knowledge of a square root
mod RSA number