Chap 2: Elementary Cryptography
Chap 2: Elementary Cryptography
Cryptography
Concepts of encryption
Cryptanalysis: how encryption systems are
“broken”
Symmetric (secret key) encryption and the DES
and AES algorithms
Asymmetric (public key) encryption and the
RSA algorithm
Key exchange protocols and certificates
Digital signatures
Cryptographic hash functions
Advantages
• Easy to memorize and implement
Disadvantage
• Pattern is obvious