|
| 1 | +\relax |
| 2 | +\@writefile{toc}{\contentsline {section}{\tocsection {}{1}{Introduction to Cryptography}}{1}} |
| 3 | +\@writefile{toc}{\contentsline {section}{\tocsection {}{2}{Security Policies}}{1}} |
| 4 | +\@writefile{toc}{\contentsline {subsection}{\tocsubsection {}{2.1}{Examples}}{1}} |
| 5 | +\@writefile{toc}{\contentsline {subsection}{\tocsubsection {}{2.2}{Types of Policies}}{1}} |
| 6 | +\@writefile{toc}{\contentsline {section}{\tocsection {}{3}{Security Mechanisms}}{1}} |
| 7 | +\@writefile{toc}{\contentsline {section}{\tocsection {}{4}{Adversaries}}{2}} |
| 8 | +\@writefile{toc}{\contentsline {section}{\tocsection {}{5}{Vulnerability}}{2}} |
| 9 | +\@writefile{toc}{\contentsline {section}{\tocsection {}{6}{Introduction to Cryptography}}{3}} |
| 10 | +\@writefile{toc}{\contentsline {subsection}{\tocsubsection {}{6.1}{Security Mechanisms}}{3}} |
| 11 | +\@writefile{toc}{\contentsline {subsection}{\tocsubsection {}{6.2}{Principles}}{3}} |
| 12 | +\@writefile{toc}{\contentsline {section}{\tocsection {}{7}{Growth of Cryptography}}{3}} |
| 13 | +\@writefile{toc}{\contentsline {subsection}{\tocsubsection {}{7.1}{Early Cryptography}}{3}} |
| 14 | +\@writefile{toc}{\contentsline {subsection}{\tocsubsection {}{7.2}{World War I}}{3}} |
| 15 | +\@writefile{toc}{\contentsline {subsection}{\tocsubsection {}{7.3}{Alan Turing}}{4}} |
| 16 | +\@writefile{toc}{\contentsline {subsection}{\tocsubsection {}{7.4}{Claude Shannon}}{4}} |
| 17 | +\@writefile{toc}{\contentsline {subsection}{\tocsubsection {}{7.5}{DES - U.S. Data Encryption Standard}}{4}} |
| 18 | +\@writefile{toc}{\contentsline {subsection}{\tocsubsection {}{7.6}{Computational Complexity}}{4}} |
| 19 | +\@writefile{toc}{\contentsline {section}{\tocsection {}{8}{Public Key Cryptography}}{4}} |
| 20 | +\@writefile{toc}{\contentsline {subsection}{\tocsubsection {}{8.1}{RSA (Rivest, Shamir, Adleman 1977)}}{4}} |
| 21 | +\@writefile{toc}{\contentsline {subsection}{\tocsubsection {}{8.2}{Digital Certificates}}{4}} |
| 22 | +\@writefile{toc}{\contentsline {subsection}{\tocsubsection {}{8.3}{RC4 Stream Cipher}}{4}} |
| 23 | +\@writefile{toc}{\contentsline {subsection}{\tocsubsection {}{8.4}{MD5 Hash}}{4}} |
| 24 | +\@writefile{toc}{\contentsline {subsection}{\tocsubsection {}{8.5}{World Wide Web}}{4}} |
| 25 | +\@writefile{toc}{\contentsline {section}{\tocsection {}{9}{Growth of Cryptography - Continued}}{5}} |
| 26 | +\@writefile{toc}{\contentsline {subsection}{\tocsubsection {}{9.1}{Zero Knowledge Proofs}}{5}} |
| 27 | +\@writefile{toc}{\contentsline {subsection}{\tocsubsection {}{9.2}{Micro Payments}}{5}} |
| 28 | +\@writefile{toc}{\contentsline {subsection}{\tocsubsection {}{9.3}{Voting Systems}}{5}} |
| 29 | +\@writefile{toc}{\contentsline {subsection}{\tocsubsection {}{9.4}{Fully Homomorphic Encryption}}{5}} |
| 30 | +\@writefile{toc}{\contentsline {section}{\tocsection {}{10}{Encryption and One Time Pads}}{5}} |
| 31 | +\@writefile{toc}{\contentsline {subsection}{\tocsubsection {}{10.1}{Notion of Encryption}}{5}} |
| 32 | +\@writefile{toc}{\contentsline {subsection}{\tocsubsection {}{10.2}{One Time Pad (Vernam 1917)}}{6}} |
| 33 | +\@writefile{toc}{\contentsline {subsection}{\tocsubsection {}{10.3}{Proof of Security}}{6}} |
| 34 | +\@writefile{toc}{\contentsline {section}{\tocsection {}{11}{One Time Pad}}{7}} |
| 35 | +\@writefile{toc}{\contentsline {section}{\tocsection {}{12}{Generating Randomness}}{7}} |
| 36 | +\@writefile{toc}{\contentsline {section}{\tocsection {}{13}{Cryptographic Hash Functions}}{7}} |
| 37 | +\@writefile{toc}{\contentsline {subsection}{\tocsubsection {}{13.1}{Examples}}{7}} |
| 38 | +\@writefile{toc}{\contentsline {subsection}{\tocsubsection {}{13.2}{Random Oracle Model (ROM)}}{7}} |
| 39 | +\@writefile{toc}{\contentsline {subsection}{\tocsubsection {}{13.3}{Properties}}{8}} |
| 40 | +\@writefile{toc}{\contentsline {subsection}{\tocsubsection {}{13.4}{Applications}}{8}} |
| 41 | +\@writefile{toc}{\contentsline {section}{\tocsection {}{14}{Hash Function Applications}}{9}} |
| 42 | +\@writefile{toc}{\contentsline {subsection}{\tocsubsection {}{14.1}{Password Storage}}{9}} |
| 43 | +\@writefile{toc}{\contentsline {subsection}{\tocsubsection {}{14.2}{File Modification Detector}}{9}} |
| 44 | +\@writefile{toc}{\contentsline {subsection}{\tocsubsection {}{14.3}{Digital Signatures (hash and sign)}}{9}} |
| 45 | +\@writefile{toc}{\contentsline {subsection}{\tocsubsection {}{14.4}{Commitments}}{9}} |
| 46 | +\@writefile{toc}{\contentsline {subsection}{\tocsubsection {}{14.5}{Merkle Tree}}{9}} |
| 47 | +\@writefile{toc}{\contentsline {section}{\tocsection {}{15}{Merkle-Damgard Construction}}{9}} |
| 48 | +\@writefile{toc}{\contentsline {section}{\tocsection {}{16}{Keccak}}{10}} |
| 49 | +\@writefile{toc}{\contentsline {section}{\tocsection {}{17}{The Web}}{11}} |
| 50 | +\@writefile{toc}{\contentsline {subsection}{\tocsubsection {}{17.1}{HTTP Request}}{11}} |
| 51 | +\@writefile{toc}{\contentsline {subsection}{\tocsubsection {}{17.2}{HTTP Response}}{11}} |
| 52 | +\@writefile{toc}{\contentsline {subsection}{\tocsubsection {}{17.3}{Data Content}}{11}} |
| 53 | +\@writefile{toc}{\contentsline {section}{\tocsection {}{18}{Web security}}{11}} |
| 54 | +\@writefile{toc}{\contentsline {subsection}{\tocsubsection {}{18.1}{Authentication}}{11}} |
| 55 | +\@writefile{toc}{\contentsline {subsection}{\tocsubsection {}{18.2}{Passwords}}{11}} |
| 56 | +\@writefile{toc}{\contentsline {subsection}{\tocsubsection {}{18.3}{Dictionary Attacks}}{11}} |
| 57 | +\@writefile{toc}{\contentsline {subsection}{\tocsubsection {}{18.4}{Generating Multiple Client Passwords}}{12}} |
| 58 | +\@writefile{toc}{\contentsline {subsection}{\tocsubsection {}{18.5}{Cookies}}{12}} |
| 59 | +\@writefile{toc}{\contentsline {section}{\tocsection {}{19}{Attacks on Web Applications}}{12}} |
| 60 | +\@writefile{toc}{\contentsline {subsection}{\tocsubsection {}{19.1}{SQL Injection}}{12}} |
| 61 | +\@writefile{toc}{\contentsline {subsection}{\tocsubsection {}{19.2}{CSRF: Cross Site Request Forgery}}{12}} |
| 62 | +\@writefile{toc}{\contentsline {subsection}{\tocsubsection {}{19.3}{XSS: Cross Site Scripting}}{13}} |
| 63 | +\@writefile{toc}{\contentsline {section}{\tocsection {}{20}{Buffer Overflow Overview}}{14}} |
| 64 | +\@writefile{toc}{\contentsline {subsection}{\tocsubsection {}{20.1}{Contents of Memory}}{14}} |
| 65 | +\@writefile{toc}{\contentsline {subsection}{\tocsubsection {}{20.2}{Stack Frames}}{14}} |
| 66 | +\@writefile{toc}{\contentsline {subsection}{\tocsubsection {}{20.3}{Consequences of Buffer Overflows}}{14}} |
| 67 | +\@writefile{toc}{\contentsline {subsection}{\tocsubsection {}{20.4}{Shell Code}}{14}} |
| 68 | +\@writefile{toc}{\contentsline {subsection}{\tocsubsection {}{20.5}{Return to libc Attack}}{15}} |
| 69 | +\@writefile{toc}{\contentsline {section}{\tocsection {}{21}{Buffer Overflow Prevention}}{15}} |
| 70 | +\@writefile{toc}{\contentsline {subsection}{\tocsubsection {}{21.1}{Canary Values}}{15}} |
| 71 | +\@writefile{toc}{\contentsline {subsection}{\tocsubsection {}{21.2}{Safe Functions}}{15}} |
| 72 | +\@writefile{toc}{\contentsline {subsection}{\tocsubsection {}{21.3}{Non-executable Stack}}{15}} |
| 73 | +\@writefile{toc}{\contentsline {subsection}{\tocsubsection {}{21.4}{Address Space Layout Randomizaion (ASLR)}}{15}} |
| 74 | +\@writefile{toc}{\contentsline {section}{\tocsection {}{22}{Overview of Block Ciphers}}{16}} |
| 75 | +\@writefile{toc}{\contentsline {section}{\tocsection {}{23}{Data Encryption Standard (DES)}}{16}} |
| 76 | +\@writefile{toc}{\contentsline {section}{\tocsection {}{24}{Types of Attacks}}{16}} |
| 77 | +\@writefile{toc}{\contentsline {subsection}{\tocsubsection {}{24.1}{Differential Analysis}}{16}} |
| 78 | +\@writefile{toc}{\contentsline {subsection}{\tocsubsection {}{24.2}{Linear Attacks (Matsui)}}{16}} |
| 79 | +\@writefile{toc}{\contentsline {section}{\tocsection {}{25}{Advanced Encryption Standard}}{16}} |
| 80 | +\@writefile{toc}{\contentsline {section}{\tocsection {}{26}{Ideal Block Cipher}}{17}} |
| 81 | +\@writefile{toc}{\contentsline {section}{\tocsection {}{27}{Confidentiality}}{17}} |
| 82 | +\@writefile{toc}{\contentsline {subsection}{\tocsubsection {}{27.1}{Electronic Code Book (ECB)}}{17}} |
| 83 | +\@writefile{toc}{\contentsline {subsection}{\tocsubsection {}{27.2}{CTR Mode}}{17}} |
| 84 | +\@writefile{toc}{\contentsline {section}{\tocsection {}{28}{Cipher Block Schemes}}{18}} |
| 85 | +\@writefile{toc}{\contentsline {subsection}{\tocsubsection {}{28.1}{Cipher Block Chaining (CBC)}}{18}} |
| 86 | +\@writefile{toc}{\contentsline {subsection}{\tocsubsection {}{28.2}{Cipher Feedback Mode (CFB)}}{18}} |
| 87 | +\@writefile{toc}{\contentsline {section}{\tocsection {}{29}{Ciphertext Indistinguishability}}{18}} |
| 88 | +\@writefile{toc}{\contentsline {section}{\tocsection {}{30}{Unbalanced Fiestel Encryption Mode (UFE)}}{19}} |
| 89 | +\@writefile{toc}{\contentsline {section}{\tocsection {}{31}{Message Authentication Codes (MAC)}}{19}} |
| 90 | +\@writefile{toc}{\contentsline {subsection}{\tocsubsection {}{31.1}{MAC Game}}{19}} |
| 91 | +\@writefile{toc}{\contentsline {section}{\tocsection {}{32}{Authentication}}{20}} |
| 92 | +\@writefile{toc}{\contentsline {subsection}{\tocsubsection {}{32.1}{CBC-MAC}}{20}} |
| 93 | +\@writefile{toc}{\contentsline {subsection}{\tocsubsection {}{32.2}{PRF-MAC Hash Function}}{20}} |
| 94 | +\@writefile{toc}{\contentsline {subsection}{\tocsubsection {}{32.3}{Combining MAC and Encryption}}{20}} |
| 95 | +\@writefile{toc}{\contentsline {section}{\tocsection {}{33}{EAX Mode: Authenticated Encryption}}{20}} |
| 96 | +\@writefile{toc}{\contentsline {subsection}{\tocsubsection {}{33.1}{Workings of EAX}}{20}} |
| 97 | +\@writefile{toc}{\contentsline {section}{\tocsection {}{34}{Finite Fields}}{21}} |
| 98 | +\@writefile{toc}{\contentsline {section}{\tocsection {}{35}{Finite Fields}}{22}} |
| 99 | +\@writefile{toc}{\contentsline {subsection}{\tocsubsection {}{35.1}{Computing Powers}}{22}} |
| 100 | +\@writefile{toc}{\contentsline {subsection}{\tocsubsection {}{35.2}{Generate and Test Primes}}{22}} |
| 101 | +\@writefile{toc}{\contentsline {subsection}{\tocsubsection {}{35.3}{Testing for Primality}}{22}} |
| 102 | +\@writefile{toc}{\contentsline {section}{\tocsection {}{36}{One-time MAC}}{22}} |
| 103 | +\@writefile{toc}{\contentsline {section}{\tocsection {}{37}{Number Theory}}{23}} |
| 104 | +\@writefile{toc}{\contentsline {subsection}{\tocsubsection {}{37.1}{Euclid's Algorithm for GCDs}}{23}} |
| 105 | +\@writefile{toc}{\contentsline {section}{\tocsection {}{38}{Group Theory}}{24}} |
| 106 | +\@writefile{toc}{\contentsline {subsection}{\tocsubsection {}{38.1}{Orders of Elts}}{24}} |
| 107 | +\@writefile{toc}{\contentsline {subsection}{\tocsubsection {}{38.2}{Generators}}{24}} |
| 108 | +\@writefile{toc}{\contentsline {subsection}{\tocsubsection {}{38.3}{Generate and Test}}{24}} |
| 109 | +\@writefile{toc}{\contentsline {section}{\tocsection {}{39}{Public Keys}}{24}} |
| 110 | +\@writefile{toc}{\contentsline {subsection}{\tocsubsection {}{39.1}{Common Public Key Setup}}{25}} |
| 111 | +\@writefile{toc}{\contentsline {section}{\tocsection {}{40}{Group Theory Review}}{26}} |
| 112 | +\@writefile{toc}{\contentsline {subsection}{\tocsubsection {}{40.1}{Programming with Groups}}{26}} |
| 113 | +\@writefile{toc}{\contentsline {section}{\tocsection {}{41}{Diffie-Hellman Key Exchange}}{26}} |
| 114 | +\@writefile{toc}{\contentsline {section}{\tocsection {}{42}{Different Types of Groups}}{26}} |
| 115 | +\@writefile{toc}{\contentsline {subsection}{\tocsubsection {}{42.1}{Elliptic Curves}}{27}} |
| 116 | +\@writefile{toc}{\contentsline {section}{\tocsection {}{43}{Pedersen Commitments}}{28}} |
| 117 | +\@writefile{toc}{\contentsline {subsection}{\tocsubsection {}{43.1}{Commitment Scheme Overview}}{28}} |
| 118 | +\@writefile{toc}{\contentsline {subsection}{\tocsubsection {}{43.2}{Pedersen Commitment Scheme}}{28}} |
| 119 | +\@writefile{toc}{\contentsline {subsection}{\tocsubsection {}{43.3}{Security of Pedersen Commitment Scheme}}{28}} |
| 120 | +\@writefile{toc}{\contentsline {subsection}{\tocsubsection {}{43.4}{Malleability}}{28}} |
| 121 | +\@writefile{toc}{\contentsline {section}{\tocsection {}{44}{Public Key Encryption}}{28}} |
| 122 | +\@writefile{toc}{\contentsline {subsection}{\tocsubsection {}{44.1}{ElGamal Public Key Encryption}}{29}} |
| 123 | +\@writefile{toc}{\contentsline {subsection}{\tocsubsection {}{44.2}{Security of ElGamal}}{29}} |
| 124 | +\@writefile{toc}{\contentsline {section}{\tocsection {}{45}{ElGamal: Malleability and Homomorphisms}}{30}} |
| 125 | +\@writefile{toc}{\contentsline {subsection}{\tocsubsection {}{45.1}{El Gamal is Homomorphic}}{30}} |
| 126 | +\@writefile{toc}{\contentsline {section}{\tocsection {}{46}{IND-CCA2 Security}}{30}} |
| 127 | +\@writefile{toc}{\contentsline {subsection}{\tocsubsection {}{46.1}{El Gamal and IND-CCA2 Security}}{30}} |
| 128 | +\@writefile{toc}{\contentsline {section}{\tocsection {}{47}{Cramer Shoup}}{30}} |
| 129 | +\@writefile{toc}{\contentsline {section}{\tocsection {}{48}{RSA}}{31}} |
| 130 | +\@writefile{toc}{\contentsline {subsection}{\tocsubsection {}{48.1}{Public Key Scheme}}{31}} |
| 131 | +\@writefile{toc}{\contentsline {subsection}{\tocsubsection {}{48.2}{Keygen for RSA}}{31}} |
| 132 | +\@writefile{toc}{\contentsline {subsection}{\tocsubsection {}{48.3}{Encryption and Decryption}}{31}} |
| 133 | +\@writefile{toc}{\contentsline {subsection}{\tocsubsection {}{48.4}{Proof of Correctness}}{31}} |
| 134 | +\@writefile{toc}{\contentsline {section}{\tocsection {}{49}{RSA and IND-CCA2 Security}}{32}} |
| 135 | +\@writefile{toc}{\contentsline {subsection}{\tocsubsection {}{49.1}{The Scheme}}{32}} |
| 136 | +\@writefile{toc}{\contentsline {subsection}{\tocsubsection {}{49.2}{Decryption}}{32}} |
| 137 | +\@writefile{toc}{\contentsline {subsection}{\tocsubsection {}{49.3}{IND-CCA2 Security}}{32}} |
| 138 | +\@writefile{toc}{\contentsline {subsection}{\tocsubsection {}{49.4}{Real World Attacks}}{32}} |
| 139 | +\@writefile{toc}{\contentsline {section}{\tocsection {}{50}{Digital Signatures}}{32}} |
| 140 | +\@writefile{toc}{\contentsline {subsection}{\tocsubsection {}{50.1}{}}{33}} |
| 141 | +\@writefile{toc}{\contentsline {section}{\tocsection {}{51}{Hash and Sign}}{34}} |
| 142 | +\@writefile{toc}{\contentsline {section}{\tocsection {}{52}{RSA Based Signing}}{34}} |
| 143 | +\@writefile{toc}{\contentsline {subsection}{\tocsubsection {}{52.1}{PKCS}}{34}} |
| 144 | +\@writefile{toc}{\contentsline {subsection}{\tocsubsection {}{52.2}{PSS (Probabilistic Signature Scheme)}}{34}} |
| 145 | +\@writefile{toc}{\contentsline {section}{\tocsection {}{53}{ElGamal Based Signing}}{34}} |
| 146 | +\@writefile{toc}{\contentsline {subsection}{\tocsubsection {}{53.1}{ElGamal Digital Signatures}}{34}} |
| 147 | +\newlabel{tocindent-1}{0pt} |
| 148 | +\newlabel{tocindent0}{0pt} |
| 149 | +\newlabel{tocindent1}{26.76361pt} |
| 150 | +\newlabel{tocindent2}{41.25pt} |
| 151 | +\newlabel{tocindent3}{0pt} |
| 152 | +\@writefile{toc}{\contentsline {subsection}{\tocsubsection {}{53.2}{DSS}}{35}} |
0 commit comments