Completion requirements
Upon successful completion of this unit, you will be able to:
- identify characteristics of a computationally secure system;
- explain the difference between a block cipher and a stream cipher;
- solve problems involving substitution ciphers;
- solve problems involving transposition ciphers; and
- describe the concept of perfect secrecy.