Revision as of 14:48, 11 November 2022 by Student49MA279F22 (Talk | contribs)

Group 10: Encryption methods in Cyber security

Introduction of cryptography

  • Overview of cryptography
  • Categories of cryptography
  • \t symmetric key
  • \t asymmetric key

Symmetric key example

  • Block cipher
  • Hash function

Asymmetric key example (*)

  • RSA
  • \t history
  • \t mechanism
  • \t application & pros and cons

Discussion of cybersecurity

  • how big prime we use?

Alumni Liaison

Ph.D. on Applied Mathematics in Aug 2007. Involved on applications of image super-resolution to electron microscopy

Francisco Blanco-Silva