Ch10
Key management
U2 - M3 - Security Mechanisms
RAITM. Chatterjee1 Public Key Algorithms ……... RAITM. Chatterjee2 Public Key Cryptography Two keys Private key known only to individual Public key available.
Security Chapter 8. Types of Threats Interception Interruption Modification Fabrication.
Cryptography and Network Security Chapter 10 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.