The Mathematics used to secure data.
Metauni Lectures
Vulnerabilities
- CA Compromise
- Key Compromise
- Flawed Cryptographic Algorithm Implementation
- Outdated Algorithms
- Weak Random Number Generation
Attacks
- Side Channel Attack
- SSL Stripping
- SSL Downgrade
- Collision Attack
- Birthday Attack
- Pass The Hash Attack
- Chinese Remainder Theorem
Concepts
Algorithm Types
- Cipher
- Key Exchange Algorithms
- Hashing Algorithms
- Signature Algorithm
- Key Stretching Algorithms
- Consensus Algorithm