Crittography

AGENDA

  • Public key algorithms
  • Private key algorithms
  • Cryptography algorithm construction
  • Key distribution
  • Key management
  • Methods of attack
  • Digital Signatures
  • Authenticity of electronic transfers
  • Non repudiation
  • Principles, means and methods of disguising information to ensure its integrity, confidentiality, and authenticity