Cryptography II
The second part of the series on cryptography will focus on the basics of symmetric cryptography, how it works and how can it be applied, and which security attributes can be addressed.
By the end of this course, you will be able to:
- Understand the basics of symmetric cryptography algorithms including stream and block ciphers
- Understand the significance of random numbers
- Understand applications of message authentication codes
- Understand the challenges in key handling with symmetric ciphers
- Competencies you acquire:
- Symmetric Cryptography
- Level:
- Intermediate
- Required prior knowledge:
- IT Security Basics;
Cryptography I
- Duration:
- 40 min