|  | | Symmetric encryption algorithms
1. Getting started
2. Diffusion and substitution - general
3. Diffusion and substitution - Gnosis cipher, part 1
4. Diffusion and substitution - Gnosis cipher, part 2
5. All praise XOR
6. XOR in action
7. Snake-oil warning, part 1
8. Snake-oil warning, part 2
9. Sub-algorithm rounds
10. S-boxes, part 1
11. S-boxes, part 2
12. Avalanche effects, part 1
13. Avalanche effects, part 2
14. Avalanche effects, part 3
15. Feistel networks
|