First page Back Continue Last page Graphics
Public Key Cryptography
Agenda:
Message authentication – authentication codes and hash functions
Public key encryption – principles and algorithms
Exchange of conventional keys
Digital signatures
Revisit key management