Data Protection and Security |
|||||
I |
Secret Key Cryptography |
||||
I.I |
Symmetric Encryption |
||||
There are six tools that comprise the toolbox of cryptography consumers. [more] |
|||||
Sessions: [1] [2] [3] [4] [5] [6] [7] | |||||
I.II |
Hash Functions |
||||
A hash function is a function that takes as input an arbitrary long string of bits and produces a fixed-size result. [more] |
|||||
Sessions: [1] [2] [3] [4] | |||||
I.III |
Message Authentication Codes |
||||
Message authentication code (MAC) is a number that is appended to a message. [more] |
|||||
Sessions: [1] | |||||
I.IV |
Random Number Generators |
||||
In order to generate keys, initialization vectors, etc. needed in cryptographic protocols, a source of random bits unpredictable for any adversary is needed. [more] |
|||||
Sessions: [1] | |||||
I.V |
Summary |
||||
A brief summary of the chapter is provided. [more] |
|||||
Sessions: [1] | |||||
|
|||||