_____________________________________________________________________________________
1. Lecture 1: Introduction to Cryptography by Christof Paar (YouTube).
2. Lecture 2: Modular Arithmetic and Historical Ciphers by Christof Paar (YouTube).
3. Lecture 3: Stream Ciphers, Random Numbers and the One Time Pad by Christof Paar (YouTube).
4. Lecture 4: Stream Ciphers and Linear Feedback Shift Registers by Christof Paar (YouTube).
5. Lecture 5: Data Encryption Standard (DES): Encryption by Christof Paar (YouTube).
6. Lecture 6: Data Encryption Standard (DES): Key Schedule and Decryption by Christof Paar (YouTube).
7. Lecture 7: Introduction to Galois Fields for the AES by Christof Paar (YouTube).
8. Lecture 8: Advanced Encryption Standard (AES) by Christof Paar (YouTube).
9. Lecture 9: Modes of Operation for Block Ciphers by Christof Paar (YouTube).
10. Lecture 10: Multiple Encryption and Brute-Force Attacks by Christof Paar (YouTube).
11. Lecture 11: Number Theory for PKC: Euclidean Algorithm, Euler's Phi Function & Euler's Theorem (YouTube).
12. Lecture 12: The RSA Cryptosystem and Efficient Exponentiation by Christof Paar (YouTube).
13. Lecture 13: Diffie-Hellman Key Exchange and the Discrete Log Problem by Christof Paar (YouTube).
15. Lecture 15: Elgamal Encryption Scheme by Christof Paar (YouTube).
16. Lecture 16: Introduction to Elliptic Curves by Christof Paar (YouTube).
17. Lecture 17: Elliptic Curve Cryptography (ECC) by Christof Paar (YouTube).
18. Lecture 18: Digital Signatures and Security Services by Christof Paar (YouTube).
19. Lecture 19: Elgamal Digital Signature by Christof Paar (YouTube).
20. Lecture 20: Hash Functions by Christof Paar (YouTube).
21. Lecture 21 (update): SHA-3 Hash Function by Christof Paar (YouTube).
22. Lecture 22: MAC (Message Authentication Codes) and HMAC by Christof Paar (YouTube).
23. Lecture 23: Symmetric Key Establishment and Kerberos by Christof Paar (YouTube).
24. Lecture 24: Man-in-the-middle Attack, Certificates and PKI by Christof Paar (YouTube).
25. Private Key Encryption (Symmetric Key Encryption) (YouTube).
26. Public Key Encryption (Asymmetric Key Encryption) (YouTube).
27. How hash function work? (YouTube).
28. Tricks to hack hashed passwords (YouTube).
29. Dictionary Attack and Brute Force Attack: hacking passwords (YouTube).
30. Kerberos - authentication protocol (YouTube).
31. How to salt and pepper passwords? (YouTube).
32. What is digital signature? (YouTube).
33. Why digital certificate? (YouTube).
34. How SSL certificate works? (YouTube).
35. PKI - trust & chain of trust -why, who and how? (YouTube).
36. SSL/TLS handshake Protocol (YouTube).
37. PKI: self-signed digital certificate? (YouTube).
38. Revocation of digital certificates: CRL, OCSP, OCSP stapling (YouTube).
39. Unlocking Information Security I (edX course).
The course description states the students will learn the following concepts:
40. Unlocking Information Security II (edX course).
The course description states the students will learn the following concepts:
45. Information Security Goals and Principles (YouTube).
46. Encryption Basics and Classical Ciphers (YouTube).
47. Semantic Security and the One-Time Pad (YouTube).
48. Encrypting with Block Ciphers (YouTube).
49. Fingerprinting with Hash Functions (YouTube).
50. Authenticating Data with Message Authentication Codes (YouTube).
51. AES Rijndael Cipher explained as a Flash animation (YouTube).
54. Paul C. van Oorschot (2020). Computer Security and the Internet Tools and Jewels. Springer.