Course Description
For two devices to communicate securely they must have a common key. Explore how keys can be shared and how communications can be encrypted and verified using digital signatures.
Learning Objectives
0
For two devices to communicate securely they must have a common key. Explore how keys can be shared and how communications can be encrypted and verified using digital signatures.
0