Public-key cryptography uses pairs of related keys to encrypt and decrypt messages, with the private key kept secret and the public key openly distributed. It is used for digital signatures, secure communication and data storage, and can be used to verify that a message or file has not been modified.
University of Washington
Autumn 2021
This course covers a wide range of computer security topics, including software security, cryptography, web security, malware, and physical security. It encourages a "security mindset" while requiring a firm understanding of computer science fundamentals and command-line Unix development environment.
No concepts data
+ 18 more conceptsUC Berkeley
Summer 2022
This course offers an introduction to computer security, including cryptography, operating system security, network security, and software security. It uses case studies from real-world systems. Prerequisites include experience working with large codebases and a basic understanding of modular arithmetic/set notation.
No concepts data
+ 40 more concepts