When you give a web site that claims to be www.amazon.com your credit card number, how do you know that
There is probably a small padlock, which you trust. But what is actually happening "under the hood"? At the end of this course you will know this and also will have detailed understanding of most fundamental cryptographically-based mechanisms used in currently deployed systems, with focus on those used on the Web. You will also understand, and know how to use, some of the freely available, open-source packages for securing information on your personal computer and email exchanges with others.