Cryptographic hash functions are used to secure data by providing a unique identifier for a given input. They are also used in digital signatures, message authentication codes, and other forms of authentication. Non-cryptographic hash functions are used for indexing data and detecting errors, but can be vulnerable to attack.
UC Berkeley
Summer 2022
This course offers an introduction to computer security, including cryptography, operating system security, network security, and software security. It uses case studies from real-world systems. Prerequisites include experience working with large codebases and a basic understanding of modular arithmetic/set notation.
No concepts data
+ 40 more concepts