![Certificate Cryptography](https://kzhu.ai/wp-content/uploads/2022/04/Coursera-YW3C52Y4N3VV-1024x791.jpg)
My #90 course certificate from Coursera
CryptographyUniversity of Maryland College Park This course is definitely one of the best that you shouldn’t miss out...
![Public key distribution under attack, SSL/TLS handshake protocol](https://kzhu.ai/wp-content/uploads/2022/04/Cryptography-15-724x1024.jpg)
Public Key Infrastructures & SSL/TLS
An attacker can try to manipulate the public key distribution process. In particular nothing prevents an attacker from...
![Identification scheme, Fiat-Shamir transform, Schnorr Identification scheme](https://kzhu.ai/wp-content/uploads/2022/04/Cryptography-14-724x1024.jpg)
Discrete Logarithm Based Digital Signature
Identification Schemes Identification schemes are extremely important as building block for digital signature scheme. An identification scheme is...
![Digital Signature, Plain RSA Signature](https://kzhu.ai/wp-content/uploads/2022/04/Cryptography-13-724x1024.jpg)
Digital Signature
Digital signature is a mechanism that can be used to provide integrity in the public key setting, analogous...
![El Gamel Encryption, Plain RSA Encryption](https://kzhu.ai/wp-content/uploads/2022/04/Cryptography-12-724x1024.jpg)
Public Key Encryption
A public-key encryption scheme is composed of three probabilistic polynomial time algorithms: Gen The key-generation algorithm that on...
![Diffie-Hellman Key Exchange](https://kzhu.ai/wp-content/uploads/2022/04/Cryptography-11-724x1024.jpg)
Public Key Revolution
A New Direction in Cryptography Recall that the private-key cryptography allows two users who share a secret to...
![](https://kzhu.ai/wp-content/uploads/2022/04/roberto-sorin-2XLqS8D0FKc-unsplash.jpg)
Factoring, RSA, Discrete-Logarithm and Diffie-Hellman
Problems like addition, multiplication, modular arithmetic, exponentiation can be solved in polynomial time, so they are seen as...
![](https://kzhu.ai/wp-content/uploads/2022/04/nick-hillier-yD5rv8_WzxA-unsplash.jpg)
Number Theory and Group Theory
Number theory studies integers and operation on them. Basics of number theory have natural application, like addition, subtraction,...
![A fixed-length message authentication codes, authenticated encryption.](https://kzhu.ai/wp-content/uploads/2022/03/Cryptography-8-724x1024.jpg)
Message Authentication Codes & Authenticated Encryption
Besides the secrecy of communication, we also need to be concerned with integrity, which ensures that a message...
![Chosen plaintext attacks secure encryption, Proof by reduction](https://kzhu.ai/wp-content/uploads/2022/02/Cryptography-5-724x1024.jpg)
Private Key Encryption
Limitations of Perfect Secrecy Recall that the perfect secrecy has two limitations: The first limitation can be circumvented...
![Pseudo one-time pad, distinguisher, proofs by reduction](https://kzhu.ai/wp-content/uploads/2022/02/Cryptography-3-scaled-e1644505441730.jpg)
Computational Secrecy, Pseudo-randomness, and Proof of Security
Limitations of the One-Time Pad The one-time pad encryption scheme achieves perfect secrecy, but nowadays it is not...
![](https://kzhu.ai/wp-content/uploads/2022/02/christopher-burns-Kj2SaNHG-hg-unsplash.jpg)
Introduction to Classical Cryptography
In dictionary, cryptography is defined as the art of writing or solving codes. Historically, cryptography focused exclusively on...