Cryptography 2
Last week we started to look at cryptography. We focused on ways of encoding data, and looked at how hashes can be used to store passwords securely, and for validating the contents of messages.
This week we will look at the two main forms of encryption that are used heavily in modern computer systems.
- Symmetric Encryption
- Key Exchange
- Asymmetric Encryption
For the Offline pre-reading we will look at the theory behind the different algorithms
In the On-Line Lecture, we will recap the pre-reading, and see how we can use these in our code
In the The Face To Face sessions, we will explore using the in more depth. And look at some practical applications.