Symmetric-key algorithms use the same cryptographic key for both encryption and decryption of data. This shared secret between two or more parties is used to maintain a private information link, but requires all parties to have access to the key. Symmetric-key encryption is usually better for bulk encryption due to its smaller key size and faster transmission. Asymmetric-key encryption is often used to exchange the secret key for symmetric-key encryption.
University of Washington
Autumn 2021
This course covers a wide range of computer security topics, including software security, cryptography, web security, malware, and physical security. It encourages a "security mindset" while requiring a firm understanding of computer science fundamentals and command-line Unix development environment.
No concepts data
+ 18 more conceptsUC Berkeley
Summer 2022
This course offers an introduction to computer security, including cryptography, operating system security, network security, and software security. It uses case studies from real-world systems. Prerequisites include experience working with large codebases and a basic understanding of modular arithmetic/set notation.
No concepts data
+ 40 more conceptsBrown University
Spring 2022
CS1660 delivers a balanced mix of theory and practice in computer systems security. Starting with the foundational aspects of cryptography, the course navigates through security aspects of web applications, operating systems, and networks. Students will hone their "security mindset," learning to identify vulnerabilities and understand defenses across different domains.
No concepts data
+ 38 more concepts