Upon successful completion of this unit, you will be able to:

  • identify characteristics of a computationally secure system;
  • explain the difference between a block cipher and a stream cipher;
  • solve problems involving substitution ciphers;
  • solve problems involving transposition ciphers; and
  • describe the concept of perfect secrecy.