Authenticated Encryption
Click on the "Edit" button in the top corner of the screen to edit your slide content.
· encryption methods that ensure both confidentiality and integrity.
· We will also discuss a few odds and ends such as how to search on encrypted data. This is our last Lecture studying symmetric encryption.
· Next Lecture we start with key management and public-key cryptography.
· As usual there is also an extra credit programming project.
· This Lecture's project involves a bit of networking to experiment with a chosen ciphertext attack on a toy web site.
Commenting is not enabled on this course.