Introduces secret key cryptography, covering 'one-time pad' encryption, flaws in key sharing, and the Data Encryption Standard (DES) principles and operation.
Explores RSA encryption, trapdoor functions, hash functions, and cryptographic standards, including a practical example with Apple's iMessage implementation.
Explores conventional Cryptanalysis methods, including Differential and Linear Cryptanalysis, and delves into the significance of Hypothesis Testing in Cryptography.