_____________________________________________________________________________________


Introduction to Cryptography by Christof Paar

1. Lecture 1: Introduction to Cryptography by Christof Paar (YouTube).

2. Lecture 2: Modular Arithmetic and Historical Ciphers by Christof Paar (YouTube).

3. Lecture 3: Stream Ciphers, Random Numbers and the One Time Pad by Christof Paar (YouTube).

4. Lecture 4: Stream Ciphers and Linear Feedback Shift Registers by Christof Paar (YouTube).

5. Lecture 5: Data Encryption Standard (DES): Encryption by Christof Paar (YouTube).

6. Lecture 6: Data Encryption Standard (DES): Key Schedule and Decryption by Christof Paar (YouTube).

7. Lecture 7: Introduction to Galois Fields for the AES by Christof Paar (YouTube).

8. Lecture 8: Advanced Encryption Standard (AES) by Christof Paar (YouTube).

9. Lecture 9: Modes of Operation for Block Ciphers by Christof Paar (YouTube).

10. Lecture 10: Multiple Encryption and Brute-Force Attacks by Christof Paar (YouTube).

11. Lecture 11: Number Theory for PKC: Euclidean Algorithm, Euler's Phi Function & Euler's Theorem (YouTube).

12. Lecture 12: The RSA Cryptosystem and Efficient Exponentiation by Christof Paar (YouTube).

13. Lecture 13: Diffie-Hellman Key Exchange and the Discrete Log Problem by Christof Paar (YouTube).

14. Lecture 14: The Generalized Discrete Log Problem and the Security of Diffie-Hellman by Christof Paar (YouTube).

15. Lecture 15: Elgamal Encryption Scheme by Christof Paar (YouTube).

16. Lecture 16: Introduction to Elliptic Curves by Christof Paar (YouTube).

17. Lecture 17: Elliptic Curve Cryptography (ECC) by Christof Paar (YouTube).

18. Lecture 18: Digital Signatures and Security Services by Christof Paar (YouTube).

19. Lecture 19: Elgamal Digital Signature by Christof Paar (YouTube).

20. Lecture 20: Hash Functions by Christof Paar (YouTube).

21. Lecture 21 (update): SHA-3 Hash Function by Christof Paar (YouTube).

22. Lecture 22: MAC (Message Authentication Codes) and HMAC by Christof Paar (YouTube).

23. Lecture 23: Symmetric Key Establishment and Kerberos by Christof Paar (YouTube).

24. Lecture 24: Man-in-the-middle Attack, Certificates and PKI by Christof Paar (YouTube).


Basic & Advanced Cryptography and Public Key Infrastructure by Sunny Classroom

25. Private Key Encryption (Symmetric Key Encryption) (YouTube).

26. Public Key Encryption (Asymmetric Key Encryption) (YouTube).

27. How hash function work? (YouTube).

28. Tricks to hack hashed passwords (YouTube).

29. Dictionary Attack and Brute Force Attack: hacking passwords (YouTube).

30. Kerberos - authentication protocol (YouTube).

31. How to salt and pepper passwords? (YouTube).

32. What is digital signature? (YouTube).

33. Why digital certificate? (YouTube).

34. How SSL certificate works? (YouTube).

35. PKI - trust & chain of trust -why, who and how? (YouTube).

36. SSL/TLS handshake Protocol (YouTube).

37. PKI: self-signed digital certificate? (YouTube).

38. Revocation of digital certificates: CRL, OCSP, OCSP stapling (YouTube).


Unlocking Information Security @edX by Tel Aviv University

39. Unlocking Information Security I (edX course).

The course description states the students will learn the following concepts:

        • Information Security basic terminology, vulnerabilities, exploits, and an in-depth look at a real case-study (namely, Meltdown).
        • An overview of cryptography with an emphasis on symmetric ciphers.
        • A high-level examination of hash functions and an overview of common hash algorithms.
        • A critical look at different authentication schemes, including passwords, challenge-response, and biometrics.
        • An overview of the most critical vulnerability of all times - buffer overflow, including common variants like Variable and Stack Overflow and simple yet effective mitigation techniques like canaries and DEP.

40. Unlocking Information Security II (edX course).

The course description states the students will learn the following concepts:

        • An introduction to the typical Internet protocol stack vulnerabilities, including IP Spoofing, TCP Injections, and DDoS, and useful defenses against them like NAT Boxes and Firewalls.
        • An in-depth look at the cryptographic concepts and techniques that make up the security infrastructure of the Internet: Diffie-Hellman Key Exchange, RSA Public-Key Cryptography, Digital Signatures and MAC.
        • A survey of the world wide web's security concerns (SQL Injections, CSRF, and XSS): is the Internet ultimately vulnerable or is there a silver lining?
        • An introduction to the world of malware: viruses, worms, Trojans and more - computer viruses and how to beat them.


Cryptography Course Materials (2020/2021) by University of Cambridge

41. Slide show (PDF).

42. Lecture recordings (Web page).

43. Slides handout (4 slides per page) (PDF).

Cryptographic Key Length Recommendation

44. Cryptographic Key Length Recommendation by BlueKrypt (Web).

Information security short videos by Aleksander Essex from Western University

45. Information Security Goals and Principles (YouTube).

46. Encryption Basics and Classical Ciphers (YouTube).

47. Semantic Security and the One-Time Pad (YouTube).

48. Encrypting with Block Ciphers (YouTube).

49. Fingerprinting with Hash Functions (YouTube).

50. Authenticating Data with Message Authentication Codes (YouTube).


AES Animation by Enrique Zabala

51. AES Rijndael Cipher explained as a Flash animation (YouTube).


Additional references

52. Ross Anderson (2020). Security Engineering. A guide to building dependable distributed systems. Third edition. Wiley.
    Second and first edition are freely available at the web page of the book.

53. A. G. Konheim (2007). Computer security and cryptography. John Wiley & Sons.

54. Paul C. van Oorschot (2020). Computer Security and the Internet Tools and Jewels. Springer.


Last modified: Thursday, 16 December 2021, 9:43 AM