![]() ![]() ![]() First, key management and distribution deals with establishing trust in the encryption keys used between two communicating entities. Mutual trust: This is the study of techniques and algorithms for providing mutual trust in two main areas.cryptographic hash functions, with the related topics of message authentication codes and digital signatures. The three main areas of study in this category are: 1. Cryptographic algorithms: This is the study of techniques for ensuring the secrecy and/or authenticity of information.Network Security Cryptographic algorithms and protocols Symmetric ciphers Asymmetric encryption Data integrity: hash functions Authentication Mutual Trust Computer Security Network Security The material in this book is organized into four broad categories: 1 Cryptography and Network Security Chapter 1ΔΆ Roadmap Cryptographic algorithms and protocols Mutual Trust ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |