Introduction to Cryptography
Applications of Cryptography
Blockchain and Digital Currencies
Symmetric Key Cryptography
Asymmetric Key Cryptography
Types of Cryptography
Hash Functions
Symmetric Key Cryptography
Validation of Public Keys
Implementing Cryptographic Algorithms
# Iterate through each character in the encrypted message
Testing the Cipher
"L" (shifted by 24 places) becomes "J"
Encrypting the message
plaintext_int = [ord(i) for i in plaintext]
Decrypting the Message
Testing the Cipher
The Diffie–Hellman (DH) Key Exchange Algorithm
Preparing the Algorithm
Implementing the Key Exchange
Generating the Secret Shared Key
Cybersecurity, Cryptography and Blockchain
Read the sentences and tick True or False.
Describe the core principles of cryptography and how it works.
Outline the various applications of cryptography in the modern digital word.
List the three main types of cryptographic algorithms.
Design a representation of asymmetric key cryptography.
List the advantages and disadvantages of the three main types of cryptographic algorithms.
Analyze how webs of trust are used to validate public keys in cryptography.
Explain how hackers can use cryptanalysis to gain access to encrypted data.