Industry-relevant training in Business, Technology, and Design to help professionals and graduates upskill for real-world careers.
Fun, engaging games to boost memory, math fluency, typing speed, and English skills—perfect for learners of all ages.
Cryptography is essential for securing information in the digital age, encompassing both mathematical and computational methods for protecting data integrity, confidentiality, and non-repudiation. This module explores the key principles of cryptographic algorithms, including symmetric and asymmetric methods, and highlights the role of digital certificates and public key infrastructure in establishing trust. Additionally, it emphasizes the importance of robust random number generation for cryptographic security.
5.1
Pseudo-Random Number Generators (Prngs)
Pseudo-Random Number Generators (PRNGs) are algorithms that produce sequences of numbers that appear random but are deterministically generated. Their role is crucial in cryptographic applications, ensuring security through unpredictability.
References
Untitled document (19).pdfClass Notes
Memorization
What we have learnt
Final Test
Revision Tests
Term: Cryptography
Definition: The science and art of secure communication amidst potential adversaries.
Term: SymmetricKey Cryptography
Definition: An encryption method where the same key is used for both encrypting and decrypting data.
Term: AsymmetricKey Cryptography
Definition: A method using a pair of keys (public and private) for encryption and decryption.
Term: Hash Function
Definition: An algorithm that converts input data into a fixed-size string, used in integrity verification.
Term: Digital Signature
Definition: A cryptographic mechanism that provides authentication and integrity for messages.
Term: Public Key Infrastructure (PKI)
Definition: A framework to manage digital certificates and establish trust in public key systems.