Line 5: | Line 5: | ||
* Categories of cryptography | * Categories of cryptography | ||
* \t symmetric key | * \t symmetric key | ||
− | * | + | * \t asymmetric key |
+ | Symmetric key example | ||
+ | * Block cipher | ||
+ | * Hash function | ||
+ | Asymmetric key example (*) | ||
+ | * RSA | ||
+ | * \t history | ||
+ | * \t mechanism | ||
+ | * \t application & pros and cons | ||
+ | |||
+ | Discussion of cybersecurity | ||
+ | * how big prime we use? | ||
− | |||
− | |||
− | |||
Revision as of 13:48, 11 November 2022
Group 10: Encryption methods in Cyber security
Introduction of cryptography
- Overview of cryptography
- Categories of cryptography
- \t symmetric key
- \t asymmetric key
Symmetric key example
- Block cipher
- Hash function
Asymmetric key example (*)
- RSA
- \t history
- \t mechanism
- \t application & pros and cons
Discussion of cybersecurity
- how big prime we use?