This session is a continuation of previous session on cryptography. It completes the discussion with a hands-on example on asymmetric encryption and the use of digital signatures. Finally, the use of Diffie-Hellman algorithm (for key exchange) is discussed. The session is concluded with the concept and use of Digital certificates. www.arifbutt.m

Leave a Reply

Your email address will not be published. Required fields are marked *