ECB Penguin and HashingExplores symmetric encryption, social engineering, and secure hashing techniques, focusing on ECB vulnerabilities and SHA-256 usage.
Cryptography: Secret KeyIntroduces secret key cryptography, covering 'one-time pad' encryption, flaws in key sharing, and the Data Encryption Standard (DES) principles and operation.
Encryption Key UsageCovers the usage of encryption keys in the context of image encryption using Scratch.
Conditional Access IICovers conditional access, encryption, decryption, authentication, and advanced encryption standards, exploring identity-based encryption, biometrics, and attribute-based encryption.