Knihovna
Slovník
O projektu
Soutěž + kombinovaná mobilita
Kontakt
CS
EN
SK
ES
DE
ON-LINE –
Cryptography, cybercriminality
Cryptography, cybercriminality
Explanatory Notes
1 Basics of cryptography
2 Symmetric key cryptography
2.1 Block ciphers algorithms
2.2 Stream cipher algorithms
3 Public key cryptography
3.1 How does public key cryptography work?
4 Hybrid system: Combining Symmetric and Asymmetric Encryption
5 Hash functions
6 Digital signature
7 Key Exchange. Digital Certification
8 Cybercriminality: Introduction
9 Attack techniques
9.1 Passive attacks
9.2 Active attacks
10 Prevention tips
Cryptography, cybercriminality
Explanatory Notes
1 Basics of cryptography
2 Symmetric key cryptography
2.1 Block ciphers algorithms
2.2 Stream cipher algorithms
3 Public key cryptography
3.1 How does public key cryptography work?
4 Hybrid system: Combining Symmetric and Asymmetric Encryption
5 Hash functions
6 Digital signature
7 Key Exchange. Digital Certification
8 Cybercriminality: Introduction
9 Attack techniques
9.1 Passive attacks
9.2 Active attacks
10 Prevention tips