Home

Additional

Content

Check often for Updates to this Section

Entropy, the Shannon Bit and Perfect Secrecy

Data Security and Information Theory, An introduction to the basic concepts of encryption

Authentication - Part I, the Achille’s heel.

Authentication - Part II, Free lunches are very rare indeed

Authentication - Part III Passwords

Authentication - Part IV Password Protocols

Main