Post date: Jan 24, 2016 10:4:24 AM
Chapter 2: Cryptographic Tools
• Confidentiality with Symmetric Encryption
• Manage Authentication and Hash Functions
• Public Key Encryption
• Digital Signatures and Key Management
• Random and Pseudorandom Numbers
In the news: