Skip to content

Cryptography 2

Last week we started to look at cryptography. We focused on ways of encoding data, and looked at how hashes can be used to store passwords securely, and for validating the contents of messages.

This week we will look at the two main forms of encryption that are used heavily in modern computer systems.

  • Symmetric Encryption
  • Key Exchange
  • Asymmetric Encryption

For the Offline pre-reading we will look at the theory behind the different algorithms

In the On-Line Lecture, we will recap the pre-reading, and see how we can use these in our code

In the The Face To Face sessions, we will explore using the in more depth. And look at some practical applications.

Back to top