| |
After finishing this tutorial, you should
have a good understanding of the principles that underlie
symmetric and asymmetric encryption algorithms. Tutorial users
have also seen one example of constructing an actual
protocol based on the these covered algorithms. In the next
installment, users will discover two main things: (1) the
ways that fundamental algorithms can be combined to achieve
a number of "exotic" and somewhat wondrous goals; (2) some
limitations and pitfalls that broad cryptographic goals are
subject to. Stay tuned.
|