Data Protection and Security

   

I

Secret Key Cryptography

   
       

I.I

Symmetric Encryption

   

   
 

There are six tools that comprise the toolbox of cryptography consumers. [more]

 

 

 

  Sessions: [1] [2] [3] [4] [5] [6] [7]    
       

I.II

Hash Functions

   

   
 

A hash function is a function that takes as input an arbitrary long string of bits and produces a fixed-size result. [more]

 

 

 

  Sessions: [1] [2] [3] [4]    
       

I.III

Message Authentication Codes

   

   
 

Message authentication code (MAC) is a number that is appended to a message. [more]

 

 

 

  Sessions: [1]    
       

I.IV

Random Number Generators

   

   
 

In order to generate keys, initialization vectors, etc. needed in cryptographic protocols, a source of random bits unpredictable for any adversary is needed. [more]

 

 

 

  Sessions: [1]    
       

I.V

Summary

   

   
 

A brief summary of the chapter is provided. [more]

 

 

 

  Sessions: [1]    
       
       
 
  proceed to first section »