Authenticated Encryption

Click on the "Edit" button in the top corner of the screen to edit your slide content.

·       encryption methods that ensure both confidentiality and integrity.

·       We will also discuss a few odds and ends such as how to search on encrypted data. This is our last Lecture studying symmetric encryption.

·       Next Lecture we start with key management and public-key cryptography.

·       As usual there is also an extra credit programming project.

·       This Lecture's project involves a bit of networking to experiment with a chosen ciphertext attack on a toy web site.

Commenting is not enabled on this course.