Chinese Remainders & RSAExplores the Chinese Remainders Theorem, RSA public-key cryptosystem, bijective properties, and key generation for encryption and decryption.
Symmetric Encryption SchemesExplores symmetric encryption schemes, including block and stream ciphers, their vulnerabilities, and the importance of key lengths.