What actually happens when you buy a book from Amazon? This session will use this scenario to describe the fundamentals of modern symmetric and asymmetric cryptography on which the rest of the field is built. The SSL/TLS protocol, block ciphers such as DES and AES, stream ciphers, Diffie-Hellman key exchange, and of course, RSA will all be explained and dissected. Hands on-bring your computer!
Security Strategy & Architecture Protecting Data & Applied Crypto
cryptography data security encryption strategy & trends privacy authentication
Share With Your Community