Learning Objectives
- CIA triad as applied to protocols and cryptography
- Symmetric cryptography primitives
- Block ciphers
- Message authentication codes (MAC)
- Authenticated Encryption (AE) with Associated Data (AEAD)
- Attacks
- Chosen Plaintext Attack (CPA)
- Chosen Ciphertext Attack (CCA)
- Cryptographic hash functions
- Asymmetric cryptography primitives
- Encryption
- Digital signatures
- How to design a protocol?
- Case study: 2025 eCTF protocol
- Case study: 2024 eCTF protocol