Descarga CSV

Business cryptography

Programación
40 horas

Objetivos

- Understand classical algorithms and their historical significance in cryptography.

- Explore symmetric key algorithms and their use in secure communication.

- Identify asymmetric-key algorithms and their applications in data protection.

- Learn about hash functions and their role in data integrity.

- Analyse digital certificates and their importance in online security.

- Examine PKI infrastructure and its role in trust management.

- Discover cryptographic applications in real-world business scenarios.

Índice de contenidos

UNIT 1. INTRODUCTION. CLASSICAL ALGORITHMS Introduction Principle of cryptography Classic algorithms (I) Classic algorithms (II) Enigma UNIT 2. SYMMETRIC KEY ALGORITHM Introduction Principles of symmetric encryption Symmetric key algorithms Other symmetric algorithms Unit summary UNIT 3. ASYMMETRIC-KEY ALGORITHMS. HASH FUNCTION Introduction Asymmetric key algorithm Hash function and collisions Digital signature Unit summary UNIT 4. DIGITAL CERTIFICATES, PKI AND CRYPTOGRAPHIC APPLICATIONS Digital certificates Digital signature Tools and applications (I) Tools and applications (II) The future of cryptography

Más cursos relacionados