Skip to main content
IBM 
ShopSupportDownloads
IBM HomeProductsConsultingIndustriesNewsAbout IBM
IBM : developerWorks : Security : Education - online courses
Introduction to cryptology: Pt. 1
Download tutorial zip fileView letter-sized PDF fileView A4-sized PDF fileE-mail this tutorial to a friend
Main menuSection menuGive feedback on this tutorialPreviousNext
5. Endgame
  


Conclusion page 4 of 5


Following this tutorial look for two related cryptology tutorials. In this part, we have addressed the basic concepts of cryptology; tutorial users should now understand the meaning of concepts like symmetric and asymetric algorithms, key-length, cryptanalysis, and algorithms/protocols. Part 2 will address symmetric and asymmetric (public-key) algorithms in terms of the basic mathematical principles of their construction. Part 3 will move on to describe a number of actual protocols, many of which use the algorithms described in part 2 as their building blocks. After completing all three tutorials, users should have an excellent foundation for constructing working cryptosystems that are tailored to their specific requirements.


Main menuSection menuGive feedback on this tutorialPreviousNext
PrivacyLegalContact