
Authors
Mykola Onai
Abstract
Introduction to privacy protection. General Data Protection Regulation. Privacy laws, regulations, and public policy. Foundational concepts of information security and privacy exploring information value. Classifications of threats to personal data. Digital footprint: definition, examples, and ways to reduce. Recommendation of privacy and security settings for software applications. Biometrics as data security. Technical aspects of information protection. Classification of cryptographic systems. Encryption key. Fields of application of cryptography. User identification. Password storage methods. Examples of simplest ciphers: are Caesar's Cipher and Generalized Caesar Cipher. Symmetric and asymmetric systems of cryptographic protection of information. Features of their use. Key exchange according to the Diffie-Hellman scheme and the RSA algorithm. The AES and its features (correct settings in applications). NIST competition. Requirements for the new algorithm. A system for checking the implementation of the algorithm for compliance with the standard. Digital Signature Standard (DSS) and El-Gamal scheme in digital signature mode.
license
Creative Commons BY-SA 4.0
Language
English
Year of publication
2024
price
FREE
Learning materiatls
other sources - mind map
created with support of
Co-funded by the European Union. The views and opinions expressed are those of the authors and do not necessarily reflect those of the European Union or the Czech National Agency for International Education and Research. Neither the European Union nor the grant provider is responsible for them.