Содержание
- 2. Cryptography - data protection method Derbyshev Lev RI-270007
- 3. Caesar cipher
- 4. Enigma Encryption Machine This is what the Enigma machine looks like. With its help, German soldiers
- 5. Information Problems As the amount of data increases, the following problems appear: Data leakage Data substitution
- 6. Personal data. Who is interested in this? A lot of people search like information. Its use
- 7. One-way encryption This is an example of how to calculate a unique hash sum. Check the
- 8. Two-way encryption This type of encryption can be decrypted by knowing the master key. It is
- 10. Скачать презентацию