What security services does cryptography provide? What security services does cryptography not provide?Data confidentiality:
... [Show More]
How to achieve data confidentiality? How to protect the confidentiality of bulk data (say 1 Giga bytes)?
What does Kerckhoffs' assumption/principle tell us? Why is it important?
What is brute-force attack? What do you need to know in order to mount brute- force attacks?
CCA and CCA2: What are
[Show Less]