Cosa impari in questo corso?
What makes certain ciphers perfect, how the Lorenz Cipher was brokenLesson 2: Symmetric Encryption
Sending messages when two people share a secretLesson 3: Key Exchange
Techniques to establish a shared secretLesson 4: Asymmetric Encryption
Exchanging information using public key cryptosystemsLesson 5: Public Key Protocols
Encrypted key exchange, certificates, secure commerceLesson 6: Using Cryptographic Primitives
How cryptography can be useful for anonymizing communication, voting, and digital cashLesson 7: Secure Computation
Computing without exposing data