I am constantly updating this website with additional notes, as fast as I study and compartmentalize new information into notes and rules. See the (manually changed) Last Change at the bottom of the page, referring to changes made to this specific page. There are more subcategories to this category:
Cryptographic Summaries
List of Cryptography Equations INCOMPLETE
Symmetric Cryptography INCOMPLETE
"Anyone, from the most clueless amateur to the best cryptographer, can create an algorithm that he himself can't break." - Bruce Schneier.
Public-Key Cryptography
"I've been posting my public key for 15 years now, but no one has ever asked me for it or used it for anything as far as I can tell. Maybe I should try posting my private key instead." - xkcd.
Hash Functions & Digital Signatures
"The next 120 seconds, are going to be very important for your life!"
- Christof Paar, inventor of Cryptography.
Message Authentication
"Trust, but verify." - Russian proverb.
Key Management
"The unknown message is: It's time to move to a longer key length"
- The plaintext discovered by distributed.net in the RC5-56 challenge, after 250 days of distributed brute-forcing through 34 quadrillion keys. This milestone, achieved on October 19, 1997, highlighted the limitations of 56-bit encryption and the power of distributed computing.
Post-Quantum Cryptography
"If computers that you build are quantum,
Then spies of all factions will want 'em.
Our codes will all fail,
And they'll read our email,
Till we've crypto that's quantum, and daunt 'em."
- Peter Shor, Scientist.