Secret Key AgreementExplains secret key agreement systems, perfect secrecy, and the criteria for secure communication.
Secret Key Generation: Polar CodingExplores secret key generation using polar coding for short blocklengths, discussing key capacity, rate-leakage pairs, and practical implementation.
Authentication: PasswordsCovers the importance of passwords in authentication, including secure transfer, storage, and checking techniques.
Authentication - TokensCovers the concept of tokens, how they work, and the implementation of two-factor authentication.
Symmetric Encryption: DES and AESExplores DES and AES encryption, discussing weak keys, attacks, AES structure, IV importance, and various modes of operation for secure encryption.
Cryptography: Secret KeyIntroduces secret key cryptography, covering 'one-time pad' encryption, flaws in key sharing, and the Data Encryption Standard (DES) principles and operation.