Data Security
Learning Outcomes
At the end of this course, the students will be able to apply the techniques and procedures relating to information security
Topics
- Introduction to cryptography
- Introduction to number theory
- Public key parameter
- Row and bit pseudorandom
- Stream & block ciphers
- Public key encryption
- Data integrity and hash function
- Authentification and identification
- Digital signature
- Key making protocols
- Key management techniques
- Efficient Implementation
- Algorithm implementation
Published at :
SOCIAL MEDIA
Let’s relentlessly connected and get caught up each other.
Looking for tweets ...