Additional
Content
Check often for Updates to this Section
Entropy, the Shannon Bit and Perfect Secrecy
Data Security and Information Theory, An introduction to the basic concepts of encryption
Authentication - Part I, the Achille’s heel.
Authentication - Part II, Free lunches are very rare indeed
Authentication - Part III Passwords
Authentication - Part IV Password Protocols
Main