正在加载图片...
2 Chapter 8 Objectives Learn basic terms and primitives of cryptography Deep dive into how symmetric encryption algorithms work Study the rsa asymmetric encryption algorithm Compare message digest algorithms Explain the math behind digital signatures Learn the concepts behind quantum cryptography From Security in Computing, Fifth Edition, by Charles P Pfleeger, et al. (ISBN: 9780134085043) Copyright 2015 by Pearson Education, Inc. All rights reservedChapter 8 Objectives • Learn basic terms and primitives of cryptography • Deep dive into how symmetric encryption algorithms work • Study the RSA asymmetric encryption algorithm • Compare message digest algorithms • Explain the math behind digital signatures • Learn the concepts behind quantum cryptography 2 From Security in Computing, Fifth Edition, by Charles P. Pfleeger, et al. (ISBN: 9780134085043). Copyright 2015 by Pearson Education, Inc. All rights reserved
<<向上翻页向下翻页>>
©2008-现在 cucdc.com 高等教育资讯网 版权所有