⬆️ ⬇️

Did you read Rudyard Kipling’s novel "Kim"?

If you are interested in cryptography, we recommend that you read, at least the first twenty pages. There you can find such methods and phenomena as espionage, authentication, denial of service, impersonalization, data hiding, masquerading, role-based authentication (as well as ad-hoc authentication), eavesdropping and data integrity system. And reading further, you can also see the planning for protection against theft and cryptography with a change of keys.



You can read here (626k)



Overheard from here


')

Source: https://habr.com/ru/post/1046/



All Articles