Friday, 6 May 2016

Network & Web Security Unit 2 (Cryptography)

Cryptography, Classical Cryptographic Techniques, Encryption, Decryption, Code Breaking: Methodologies, Cryptanalysis, Cryptography Attacks, Brute-Force Attack, Use of Cryptography. Public key cryptography, Principles of Public key Cryptosystems, Cryptographic Algorithms RSA, Data Encryption Standard (DES), RC4, RC5, RC6, Blowfish, Key Management, DiffieHellman key exchange, elliptic curve cryptography.

3 comments:

  1. Cloud Ace Technologies is offering Implementation Services on Cloud Computing, Cloud Services, IT Security, Storage solutionsColocation Service Providers in Chennai

    ReplyDelete
  2. This content has a great information. So informative.

    ReplyDelete