Crittography
AGENDA
- Public key algorithms
- Private key algorithms
- Cryptography algorithm construction
- Key distribution
- Key management
- Methods of attack
- Digital Signatures
- Authenticity of electronic transfers
- Non repudiation
- Principles, means and methods of disguising information to ensure its integrity, confidentiality, and authenticity