Asymmetric Key Cryptography

Public-key cryptography

Public-key cryptography uses pairs of related keys to encrypt and decrypt messages, with the private key kept secret and the public key openly distributed. It is used for digital signatures, secure communication and data storage, and can be used to verify that a message or file has not been modified.

2 courses cover this concept

CSE 484 / CSE M 584 Computer Security

University of Washington

Autumn 2021

This course covers a wide range of computer security topics, including software security, cryptography, web security, malware, and physical security. It encourages a "security mindset" while requiring a firm understanding of computer science fundamentals and command-line Unix development environment.

No concepts data

+ 18 more concepts

CS 161: Computer Security

UC Berkeley

Summer 2022

This course offers an introduction to computer security, including cryptography, operating system security, network security, and software security. It uses case studies from real-world systems. Prerequisites include experience working with large codebases and a basic understanding of modular arithmetic/set notation.

No concepts data

+ 40 more concepts