Cryptography

RNG

Hash functions

PBKDF

AKE

  • An Introduction to Authenticated Key Exchange Protocols (slides)

Vulnerability

Attacks

  • Sybil attack the attacker subverts the reputation system of a peer-to-peer network by creating a large number of pseudonymous identities and uses them to gain a disproportionately large influence
  • cryptopals We've built a collection of 48 exercises that demonstrate attacks on real-world crypto.