Revision as of 13:48, 11 November 2022 by Student49MA279F22 (Talk | contribs)
Group 10: Encryption methods in Cyber security
Introduction of cryptography
- Overview of cryptography
- Categories of cryptography
- \t symmetric key
- \t asymmetric key
Symmetric key example
- Block cipher
- Hash function
Asymmetric key example (*)
- RSA
- \t history
- \t mechanism
- \t application & pros and cons
Discussion of cybersecurity
- how big prime we use?