Engineering Cryptosystems
1: Symmetric Encryption
2: Using Symmetric Encryption
3: Public-Key Protocols
4: Cryptographic Future
Storing Passwords
End of Day 2
On to
3: Public-Key Protocols