250 likes | 543 Views
Saad Haj Bakry, PhD, CEng, FIEE. 2. Information ProcessingError / Volume ControlSteganographyHash FunctionSymmetric (Private Key) Encryption Asymmetric (Public Key) EncryptionCryptanalysis. Objectives / Contents. Principles of Information Security. Saad Haj Bakry, PhD, CEng, FIEE. 3. Informat
E N D
1. Saad Haj Bakry, PhD, CEng, FIEE 1 Principles of Information Security Saad Haj Bakry, PhD, CEng, FIEE