Cryptography
by shaik rasheedali
1. Symmetric
2. Uses
2.1. Confidentiality
2.2. Integrity
2.3. Availability
3. Crypto systems
3.1. Asymmetric
3.2. Hybrid
3.3. Hashing
4. Key management
4.1. Creation/distribution
4.2. Storage/destruction
4.3. Recovery
4.4. Key escrow
5. Encryption
5.1. Stream
5.2. Block
6. Crypto Attacks
6.1. Chosen Plain Text
6.2. Social Engineering for key discovery
6.3. Brute Force
6.4. Cipher-text
6.5. Known Plain Text
6.6. Chosen Cipher text
6.7. Implementation Attacks
7. Email Security
7.1. S/MIME
7.2. PGP
8. PKI
8.1. Certificate Authority
9. Network Security
9.1. SSL
9.2. VPN
9.3. IPSEC
10. Hashing
10.1. MD5
10.2. SHA
10.3. HMAC
11. @li