AGENDA
Public key algorithms
Private key algorithms
Cryptography algorithm construction
Key distribution
Key management
Methods of attack
Digital Signatures
Authenticity of electronic transfers
Non repudiation
Principles, means and methods of disguising information to ensure its integrity, confidentiality, and authenticity