Index
A
- Advanced Encryption Standard (AES)
- about / Strong encryption with AES
- encrypting with / Strong encryption with AES
- ASCII data / ASCII data
B
- base64 encoding
- about / base64 encoding
- ASCII data / ASCII data
- binary data / Binary data
- challenges / Challenge 2 – base64
- binary data / Binary data
C
- Caesar cipher
- about / Caesar cipher and ROT13
- implementing, in Python / Implementing the Caesar cipher in Python
- challenges / Challenge 1 – the Caesar cipher
- CBC modes / ECB and CBC modes
- cipher block chaining (CBC) / ECB and CBC modes, CBC
- connection signature resolving key (CSRK) / Bluetooth – LE
- cryptography / About cryptography
E
- ECB modes / ECB and CBC modes
- electronic codebook (ECB) / ECB and CBC modes, ECB
H
- hashes
- about / What are hashes?
- cracking / Challenge 2 – cracking many-round hashes
I
- Internet of Things (IoT)
- about / What's next?
- cryptography within / Cryptography within IoT
- ZigBee cryptographic keys / ZigBee cryptographic keys
- ZigBee key management, complexity / Complexity of ZigBee key management
- Bluetooth low energy / Bluetooth – LE
L
- Linux password hashes / Linux password hashes
- about / Linux password hashes
- cracking / Challenge 3 – cracking Linux hashes
- long-term key (LTK) / Bluetooth – LE
M
- MD5 hashes / MD5 and SHA hashes
N
- National Institute of Standards / What are hashes?
O
- Oracle attack
- padding / Padding oracle attack
P
- Python
- setting up / Installing and setting up Python
- installing / Installing and setting up Python
- using, on Mac / Using Python on Mac or Linux
- using, on Linux / Using Python on Mac or Linux
- installing, on Windows / Installing Python on Windows
R
- ROT13 / Caesar cipher and ROT13, ROT13
- RSA
- encrypting with / Strong encryption with RSA
- public key encryption / Public key encryption
- algorithm / RSA algorithm
- Python, implementing / Implementation in Python
- cracking, with factors / Challenge – cracking RSA with similar factors
- integers, in Python / Large integers in Python
S
- Secure Hash Algorithm (SHA) / What are hashes?
- SHA-3 / What are hashes?
- SHA hashes / MD5 and SHA hashes
W
- Windows password hashes
- about / Windows password hashes
- obtaining, with Cain / Getting hashes with Cain
- MD4 / MD4 and Unicode
- Unicode / MD4 and Unicode
- cracking, with Google / Cracking hashes with Google
- cracking, with wordlists / Cracking hashes with wordlists
- cracking / Challenge 1 – cracking Windows hashes
X
- XOR / XOR
- about / XOR
- challenges / Challenge 3 – XOR
Z
- ZigBee cryptographic keys
- about / ZigBee cryptographic keys
- link key / ZigBee cryptographic keys
- key-transport key / ZigBee cryptographic keys