Mutual trust: This is the study of techniques and algorithms for providing mutual trust in two main areas. ![]() cryptographic hash functions, with the related topics of message authentication codes and digital signatures. The three main areas of study in this category are: 1. Cryptographic algorithms: This is the study of techniques for ensuring the secrecy and/or authenticity of information.Network Security Cryptographic algorithms and protocols Symmetric ciphers Asymmetric encryption Data integrity: hash functions Authentication Mutual Trust Computer Security Network Security The material in this book is organized into four broad categories: 1 Cryptography and Network Security Chapter 1ΔΆ Roadmap Cryptographic algorithms and protocols Mutual Trust
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |