Cryptography Session 1
Networking Fundamentals Session 2
1 of 4

The core problem considered by Cryptography

Interesting Terminologies: Common placeholders used in cryptography are Alice (usually the sender), Bob (usually the recipient), Eve (eavesdropper: MITM who can only listen
but not modify), Mallory (malicious: MITM who can listen and modify data). see https://en.wikipedia.org/wiki/Alice_and_Bob

© 2024 National Cybersecurity R&D Laboratory (NCL)