First page
Back
Continue
Last page
Graphics
Requirements & Weaknesses
Requirements
A
strong
encryption algorithm
Secure
process
for sender & receiver to
obtain secret keys
Methods of Attack
Cryptanalysis
Brute force