IS Lab8_ProMax Update: This version adds multifile format compatibility for documents
This commit is contained in:
parent
7955070fa6
commit
06de0d900b
24 changed files with 485 additions and 0 deletions
5
IS/Lab/Lab8_ProMax/PKSE/documents/doc1.md
Normal file
5
IS/Lab/Lab8_ProMax/PKSE/documents/doc1.md
Normal file
|
@ -0,0 +1,5 @@
|
|||
# Introduction to Cryptography
|
||||
|
||||
Cryptography is the practice and study of techniques for secure communication.
|
||||
It involves encryption, decryption, and various security protocols.
|
||||
|
5
IS/Lab/Lab8_ProMax/PKSE/documents/doc10.md
Normal file
5
IS/Lab/Lab8_ProMax/PKSE/documents/doc10.md
Normal file
|
@ -0,0 +1,5 @@
|
|||
# Blockchain and Cryptography
|
||||
|
||||
Blockchain technology relies heavily on cryptographic hash functions.
|
||||
Bitcoin and other cryptocurrencies use encryption for security.
|
||||
|
5
IS/Lab/Lab8_ProMax/PKSE/documents/doc2.md
Normal file
5
IS/Lab/Lab8_ProMax/PKSE/documents/doc2.md
Normal file
|
@ -0,0 +1,5 @@
|
|||
# Symmetric Encryption
|
||||
|
||||
Symmetric encryption uses the same key for encryption and decryption.
|
||||
AES is a popular symmetric encryption algorithm used worldwide.
|
||||
|
5
IS/Lab/Lab8_ProMax/PKSE/documents/doc3.md
Normal file
5
IS/Lab/Lab8_ProMax/PKSE/documents/doc3.md
Normal file
|
@ -0,0 +1,5 @@
|
|||
# Asymmetric Encryption
|
||||
|
||||
Asymmetric encryption uses a pair of keys: public and private.
|
||||
RSA and ECC are examples of asymmetric encryption algorithms.
|
||||
|
5
IS/Lab/Lab8_ProMax/PKSE/documents/doc4.md
Normal file
5
IS/Lab/Lab8_ProMax/PKSE/documents/doc4.md
Normal file
|
@ -0,0 +1,5 @@
|
|||
# Hash Functions
|
||||
|
||||
Hash functions create fixed-size outputs from variable-size inputs.
|
||||
SHA-256 and MD5 are commonly used hash functions in cryptography.
|
||||
|
5
IS/Lab/Lab8_ProMax/PKSE/documents/doc5.md
Normal file
5
IS/Lab/Lab8_ProMax/PKSE/documents/doc5.md
Normal file
|
@ -0,0 +1,5 @@
|
|||
# Digital Signatures
|
||||
|
||||
Digital signatures provide authentication and non-repudiation.
|
||||
They use asymmetric encryption to verify the sender's identity.
|
||||
|
5
IS/Lab/Lab8_ProMax/PKSE/documents/doc6.md
Normal file
5
IS/Lab/Lab8_ProMax/PKSE/documents/doc6.md
Normal file
|
@ -0,0 +1,5 @@
|
|||
# Paillier Cryptosystem
|
||||
|
||||
Paillier is a probabilistic asymmetric algorithm for public key cryptography.
|
||||
It provides homomorphic encryption properties for secure computation.
|
||||
|
5
IS/Lab/Lab8_ProMax/PKSE/documents/doc7.md
Normal file
5
IS/Lab/Lab8_ProMax/PKSE/documents/doc7.md
Normal file
|
@ -0,0 +1,5 @@
|
|||
# Public Key Infrastructure
|
||||
|
||||
PKI manages digital certificates and public-key encryption.
|
||||
It provides a framework for secure communication over networks.
|
||||
|
5
IS/Lab/Lab8_ProMax/PKSE/documents/doc8.md
Normal file
5
IS/Lab/Lab8_ProMax/PKSE/documents/doc8.md
Normal file
|
@ -0,0 +1,5 @@
|
|||
# Cryptographic Protocols
|
||||
|
||||
Protocols like TLS and SSL ensure secure communication.
|
||||
They combine encryption, authentication, and data integrity.
|
||||
|
5
IS/Lab/Lab8_ProMax/PKSE/documents/doc9.md
Normal file
5
IS/Lab/Lab8_ProMax/PKSE/documents/doc9.md
Normal file
|
@ -0,0 +1,5 @@
|
|||
# Quantum Cryptography
|
||||
|
||||
Quantum cryptography uses quantum mechanics for secure communication.
|
||||
It provides theoretically unbreakable encryption using quantum key distribution.
|
||||
|
Loading…
Add table
Add a link
Reference in a new issue