## Reading
- [[Serious cryptography#Chapter 1]], [[Serious cryptography#Chapter 2]], [[Serious cryptography#Chapter 6]]
## 10.1 [[confidentiality]]
- [[asymmetric|public-key encryption]], [[symmetric|symmetric encryption]]
- it's good (much of this was covered in CYM040)
- quick review of [[security service]]
- oh, a nice way of thinking about the relationship between [[non-repudiation]], [[authenticity]], and [[integrity]]. Specifically, [[non-repudiation]] implies [[authenticity]] which itself implies [[integrity]], but the inverse is not true
- [[confidentiality]] is completely separate
## 10.2 [[integrity]], [[authentication]], [[non-repudiation]]
- [[cryptographic hash function]]!
- [[MAC]]!
- This section is where we're assigned [[Serious cryptography#Chapter 6]] and it goes deep, deep into secure hashes
## 10.3 Why [[cryptography]] fails
## 10.4 [[cryptography]] in practice
-