Data Protection and Security

   

I

Secret Key Cryptography

   

I.V

Summary

   

   
 

We can roughly divide cryptography into two types: secret-key cryptography and public-key cryptography. We have studied the first type in this chapter by discussing symmetric encryption and hash functions. Message authentication codes and random number generators were also introduced in short. The topic we will cover in the next chapter, public-key cryptography differs from secret-key cryptography also in the type of mathematics involved, as we shall see.

 

 


   

I.Q

Quiz

   

   
 

 

 


   
       
       
 
«previous session [1]  
   
       
 
«return to previous section  
  concepts »