how can cryptographic technologies address the business needs of the military?
Col. Ekson has given you the responsibility of preparing a report on the implementation of e commerce and secure communication technologies to address the military’s stated business needs. Your report should include the following:
- how these cryptographic techniques and algorithms can be used
- how to choose pseudo random keys that suffice for cryptographic applications
- how to crack the code or key of an adversary who is using these technologies
Your answer should be no more than a page long.