• Public Key Infrastructure (PKI)
• Certificate Authority (CA)
• Certificate Revocation List (CRL)
• Registration Authority
• Trust Models - Single/Hierarchical AND Web of Trust etc.
Digital Certificates and Signatures:
• Digital Certificates
• Digital Signatures
• X.509 digital certificate
• Structure of a X.509 digital certificate
Hash Algorithms:
• Hashing
• Cryptographic hash function
• Applications of Cryptographic hash function
• MD-5
• SHA
• SHA-1
• SHA-1 (160 bit message) Algorithm Framework
• SHA-2
Encrypted Communication:
• Introduction to Secure Communication
• Encryption of Data at Rest
• Encryption of Data in Transit
• SSH
• Secure Sockets Layer (SSL)
• Transport Layer Security (TLS)
• Internet Protocol security (IPsec)
• The Point-to-Point Tunneling Protocol (PPTP)
Cryptographic attacks:
• Introduction
• Cryptographic Attack Methods
• Known Plaintext and Ciphertext-Only Attacks
• Chosen Plaintext and Chosen Ciphertext Attacks
• Adaptive Chosen Plaintext and Adaptive Chosen Ciphertext Attacks
• Replay Attack
• Man-in-the-middle Attack
• Brute Force Attack
Cryptography Terms:
• Cryptography Terms
About WAGmob ebooks:
1) A companion ebook for on-the-go, bite-sized learning.
2) Offers value for money (a lifetime of free updates).
3) Over One million paying customers from 175+ countries.
Our Vision: A platform to create, amplify & distribute SIMPLE ’N EASY ebookS for a lifetime of on-the-go learning.
Our Mission: A simple ’n easy WAGmob ebooks in every hand.
visit us: www.WAGmob.com
Please write to us at Team@WAGmob.com. We would love to improve this ebook.