This document provides an overview of security and cryptography topics including:
- The basics of security including confidentiality, authenticity, integrity, and non-repudiation goals and how symmetric and asymmetric cryptography help achieve them.
- Symmetric cryptography algorithms like DES, Triple DES, and AES and how they operate using symmetric keys for encryption and decryption.
- Cryptographic hashing and message authentication codes (MACs) and how they provide integrity and authentication.
- Asymmetric (public key) cryptography like RSA and ECC using key pairs for encryption, signatures, and key exchange without pre-shared secrets.
- Key exchange methods like Diffie-Hellman and how public key infrastructure (PKI) uses digital