End-to-End Encryption - Behind the Scenes
Offered By: Strange Loop Conference via YouTube
Course Description
Overview
Explore the intricacies of end-to-end encryption in this 40-minute conference talk from Strange Loop. Delve into the inner workings of secure messaging protocols, understanding the threats they defend against and how cryptographic operations are combined to implement these defenses. Learn about forward secrecy, key exchange mechanisms, and methods to ensure secure communication with the intended recipient. Discover the potential applications of end-to-end encryption beyond instant messaging, such as creating secure versions of collaborative tools like Google Docs. Gain insights into topics including HTTPS, RSA, PGP, Diffie-Hellman key exchange, rolling forward keys, prekeys, authentication methods, and message authentication codes through a comprehensive exploration of cryptographic concepts and live demonstrations.
Syllabus
Introduction
Background
True Data
HTTPS
RSA
PGP
Live demo
Loss of private key
Selfheal keys
DiffieHellman
Rolling forward keys
Prekeys
Math
Authentication
Message authentication codes
Message sending
Recap
Taught by
Strange Loop Conference
Tags
Related Courses
Applied CryptographyUniversity of Virginia via Udacity Cryptography I
Stanford University via Coursera The Quantum Internet and Quantum Computers: How Will They Change the World?
Delft University of Technology via edX IoT Device Configuration and Communication: C Edition
Microsoft via edX The Ultimate Dark Web, Anonymity, Privacy & Security Course
Udemy