User:Sn KGS/Cryptographic algorithms
Jump to navigation
Jump to search
These diagrams have been created in the winter term 2020/2021 at Kiel University during a cryptography lecture for computing education students. Some of the following image were only used to illustrate specific examples and might not be suitable for Wikimedia Commons. I hope that this only applies to a minimal portion of the images.
Digital signatures
[edit]-
The algorithms involved in an asymmetric cryptographic signature process
-
An attacker on a digital signature algorithm
Message authentication codes
[edit]-
The algorithms involved in generating and validating message authentication codes.
-
An attacker on a MAC algorithm
-
A cascading algorithm to create message authentication codes
Symmetric encryption
[edit]This page or section is incomplete. |
Attackers
[edit]This page or section is incomplete. |
Asymmetric encryption
[edit]This page or section is incomplete. |
Attackers
[edit]This page or section is incomplete. |