title

description

  • practice and study of techniques for securing communication and data in the presence of adversaries
  • 2 types of cryptosystems