Cryptography is a technique used to secure communication by converting readable information into an unreadable format. It protects data from unauthorized access and ensures that only the intended receiver can understand the message
- Used to secure communication by converting readable data into an unreadable form.
- Plaintext is the original message; ciphertext is the encrypted form (via encryption/decryption).
- Ensures data is kept private, unchanged, verified, and the sender cannot deny sending it.
- Uses symmetric (single key), asymmetric (public/private key), and hash functions (SHA, MD5).

Introduction
Understand the basic concepts of cryptography, its goals, terminology, and how cryptographic systems work. This section explains the fundamentals of securing information and the basic components of cryptographic systems.
- Introduction to Cryptography
- History of Cryptography
- Cryptography vs Cryptanalysis
- Cryptography vs Cryptology
- Cryptography Principles
- Cryptography and its Types
- Advantages and Disadvantages of Cryptography
- Introduction to Cryptosystem
- Components of Cryptosystem
- Key Management in Cryptography
- Random Number Generation in Cryptography
- Mathematical Foundations of Cryptography
Classical Cryptography
Such techniques were used before modern computers., mainly use substitution and transposition methods to hide the original message.
Substitution Ciphers
These work by replacing each letter or group of letters in the plaintext with another letter or symbol according to a specific rule.
- Caesar Cipher
- Monoalphabetic Cipher
- Playfair Cipher
- Hill Cipher
- Polyalphabetic Cipher
- One Time Pad
Transposition Ciphers
It rearranges the order of characters in the plaintext instead of replacing them. The letters remain the same but their positions are changed.
Symmetric Key Cryptography
Uses the same secret key for both encryption and decryption, making it fast and efficient for handling large amounts of data.
- Symmetric Key Cryptography
- Stream Cipher
- Block Cipher
- Block Size vs Key Size
- Padding Techniques (PKCS7)
Data Encryption Standard (DES)
Early symmetric encryption algorithm that secures data using a 56-bit key and processes information in fixed-size blocks.
- Data Encryption
- Encryption Algorithms
- Data Encryption Standard (DES)
- Strength of Data encryption standard (DES)
- Double DES and Triple DES
Advanced Encryption Standard (AES)
A modern symmetric encryption algorithm widely used for secure communication, offering stronger security and larger key sizes than DES.
- Introduction to AES
- AES Structure
- AES Transformation Function
- AES Key Expansion Algorithm
- Implementation of AES
- AES vs DES
Modes of Operation
Defines how block ciphers process large data securely by using techniques like chaining and randomness to prevent patterns.
- ECB Mode
- CBC Mode
- CFB Mode
- OFB Mode
- CTR Mode
- GCM Mode
Asymmetric Key Cryptography
Uses a pair of keys—public and private—to enable secure communication without sharing secret keys beforehand.
- Public Key Cryptography
- RSA Algorithm
- Diffie Hellman Key Exchange
- Digital Signature Standard (DSS)
- Elliptic Curve Cryptography (ECC)
- Elliptic Curve Digital Signature Algorithm
Hash Functions and Data Integrity
Converts input data into a fixed-length value to ensure data integrity and support secure password storage
- Hash Functions in Cryptography
- Collision Resistance
- Pre-image Resistance
- SHA Algorithm
- MD5 Algorithm
- Difference between MD5 and SHA1
- Data Integrity in Cryptography
Digital Signatures and Authentication
Used to verify the sender’s identity and ensure the message is authentic and has not been altered during transmission.
- Message Authentication
- Message Authentication Code (MAC)
- HMAC
- Digital Signatures
- Public Key Infrastructure
Cryptanalysis and Attacks
Focuses on techniques used to break secure systems and reveal hidden information.
- Cryptanalysis and Types of Attacks
- Attacks on Cryptosystem
- Brute Force Attack
- Dictionary Attack
- Rainbow Table Attack
Modern Cryptography Techniques
Includes advanced techniques designed for complex digital systems. These methods are used in areas like cloud security, quantum computing, and digital communication.
- Hybrid Cryptography
- Cloud Cryptography
- Quantum Cryptography
- Image Steganography
- DNA Cryptography
- One Time Password (OTP) Algorithm
- Post-Quantum Cryptography
- Zero Knowledge Proof (ZKP)
- Homomorphic Encryption
Real-World Applications of Cryptography
Cryptography is widely used in real-world applications to secure communication, protect sensitive data, and ensure user privacy. It plays a crucial role in systems like HTTPS, digital payments, and secure messaging.
- SSL/TLS Protocol
- HTTPS Working
- End-to-End Encryption (E2EE)
- Password Hashing (bcrypt, scrypt, Argon2)
- Digital Certificates
Cryptography in Network & Systems
Used to secure data transmission, protect stored information, and prevent unauthorized access in networks and systems.
- VPN
- SSH
- Secure Email (PGP)
- Disk Encryption
Cryptography Comparisons
These comparisons help understand the differences between various cryptographic algorithms and security concepts used in real-world systems.
- RSA vs Diffie-Hellman
- RSA vs DSA
- MD5 vs SHA
- Stream Cipher vs Block Cipher
- Encryption vs Cryptography
- Steganography vs Cryptography
- Cryptography vs Cyber Security