· Confidentiality, Data-Integrity and Non-repudiation – terminology
· Attack types
· Information security requirements
· Cryptography Fundamentals
· Symmetric and non-symmetric encryption
· Symmetric stream ciphers
· Symmetric block ciphers
· Symmetric block encryption modes
· Non-symmetric encryption
· Hybrid Encryption
· Crypto hash functions and Message Digest
· MAC (Message Authentication Code)
· Digital signatures
· Authenticated Encryption & GCM
· Certificates (X.509 and extensions)
· Certificate Authority
· CRL
· OCSP (RFC 6960)
· Perfect forward secrecy
· SSL design goals
· SSL Record Layer protocol
· SSL Handshake
· SSL Alert protocols
· SSL Cipher suites
· SSL Vesions
· Summary
· Q&A
· Evaluation