Security and Cryptography (S2, 2015)

Public Key Cryptography

Lecture Material

Readings

Videos

Notes

RSA Key Generation Example 1 RSA Key Generation Example 2 RSA Encryption for Confidentiality RSA Probable Message Attack Proof of RSA Encryption Success Diffie-Hellman Key Exchange Example 1 Diffie-Hellman Key Exchange Example 2 Man-in-the-middle attack on Diffie-Hellman

Return to: Course Home | Course List | Steven Gordon's Home | SIIT