By the end of this video lecture, you should be able to:
Summarize the principles of cryptography
Describe symmetric and asymmetric encryption algorithms
Explain public key infrastructure (PKI)
Describe possible attacks on cryptosystems
Compare hashing algorithms and how they ensure data integrity