June 2020
Intermediate to advanced
382 pages
11h 39m
English
Cryptographic algorithms are typically used to meet one or more security goals:
Authentication: Simply put, authentication is how we prove that a user is who they claim to be. Through the process of authentication, we ensure that a user's identity is verified. The process of authentication starts by having the user present their identity. This is followed by providing information that is only known by the user and so can only be produced by them.
Confidentiality: Data that needs to be protected is called sensitive data. Confidentiality is the concept of restricting sensitive data to authorized users only. To protect the confidentiality of sensitive data during its transit or in storage, you need to render ...
Read now
Unlock full access