Cryptography III

In the third part of the series on cryptography, the basics of asymmetric cryptography, how it works, how can it be applied, and which security attributes can be addressed will be explained.

By the end of this course, you will be able to:

Competencies you acquire:
Asymmetric Cryptography; Digital Signature Technology; Hash Functions; Public Key Infrastructure; Digital Certificates
Required prior knowledge:
IT Security Basics; Cryptography I, II
40 min