User:Ysfcay/Books/Cryptology and Security


Cryptology and Security Fundamentals edit


from wikipedia.org - Created by Shepherd edit

Cryptology
Stream Cipher Algorithms
RC4
A5/1
A5/2
Block Cipher Algorithms
Substitution–permutation network
Feistel cipher
Data Encryption Standard
DES supplementary material
Advanced Encryption Standard
Camellia (cipher)
Hill cipher
Blowfish (cipher)
Playfair cipher
RC2
Block cipher mode of operation
Secure Communication and Mobile Networks
Point-to-point (telecommunications)
Point-to-multipoint communication
Peer-to-peer
Friend-to-friend
Instant messaging
End-to-end encryption
Network switching subsystem
Attack Scenes
Second Layer Attacks
MAC flooding
VLAN hopping
Spanning Tree Protocol
MAC spoofing
ARP spoofing