Line 5: Line 5:
 
* Categories of cryptography
 
* Categories of cryptography
 
* \t symmetric key
 
* \t symmetric key
*  
+
* \t asymmetric key
  
 +
Symmetric key example
 +
* Block cipher
 +
* Hash function
  
 +
Asymmetric key example (*)
 +
* RSA
 +
* \t history
 +
* \t mechanism
 +
* \t application & pros and cons
 +
 +
Discussion of cybersecurity
 +
* how big prime we use?
  
- Block cipher
 
- Hash function
 
-
 
  
  

Revision as of 13:48, 11 November 2022

Group 10: Encryption methods in Cyber security

Introduction of cryptography

  • Overview of cryptography
  • Categories of cryptography
  • \t symmetric key
  • \t asymmetric key

Symmetric key example

  • Block cipher
  • Hash function

Asymmetric key example (*)

  • RSA
  • \t history
  • \t mechanism
  • \t application & pros and cons

Discussion of cybersecurity

  • how big prime we use?

Alumni Liaison

Meet a recent graduate heading to Sweden for a Postdoctorate.

Christine Berkesch