How cryptography can be used for data security or infiltration, focusing on strengths and weaknesses, modes, as well as issues that must be addressed in an implementation.
- The basic elements of a cryptographic system to include privacy/confidentiality, authentication, integrity, non-repudiation, and key exchange.
- Two techniques used to preserve message confidentiality: Symmetric and Asymmetric Encryption Algorithms. Specifically address the differences between the two.
- How cryptography can be used for data security or infiltration, focusing on strengths and weaknesses, modes, as well as issues that must be addressed in an implementation.