Revision as of 14:48, 11 November 2022 by Student49MA279F22 (Talk | contribs)

Group 10: Encryption methods in Cyber security

Introduction of cryptography

  • Overview of cryptography
  • Categories of cryptography
  • \t symmetric key
  • \t asymmetric key

Symmetric key example

  • Block cipher
  • Hash function

Asymmetric key example (*)

  • RSA
  • \t history
  • \t mechanism
  • \t application & pros and cons

Discussion of cybersecurity

  • how big prime we use?

Alumni Liaison

Correspondence Chess Grandmaster and Purdue Alumni

Prof. Dan Fleetwood