• Encryption vs. Cryptography
  • Symmetric ciphers
  • Monkey in the middle attacks
  • Enter: RSA
  • Asymmetric ciphers vs PK crypto
  • Using GPG
  • GPG lab