Table of Contents
- The Role of Cryptography in the Connected World
- Secure Channel and the CIA Triad
- A Secret to Share
- Encryption and Decryption
- Entity Authentication
- Transport Layer Security at a Glance
- Public-Key Cryptography
- Elliptic Curves
- Digital Signatures
- Digital Certificates and Certification Authorities
- Hash Functions and Message Authentication Codes
- Secrets and Keys in TLS 1.3
- TLS Handshake Protocol Revisited
- Block Ciphers and Their Modes of Operation
- Authenticated Encryption
- The Galois Counter Mode
- TLS Record Protocol Revisited
- TLS Cipher Suites
- Attacks on Cryptography
- Attacks on the TLS Handshake Protocol
- Attacks on the TLS Record Protocol
- Attacks on TLS Implementations

