This session is a continuation of previous session on cryptography. It completes the discussion with a hands-on example on asymmetric encryption and the use of digital signatures. Finally, the use of Diffie-Hellman algorithm (for key exchange) is discussed. The session is concluded with the concept and use of Digital certificates.
www.arifbutt.m