End-to-End Encryption - Behind the Scenes
Offered By: Strange Loop Conference via YouTube
Course Description
Overview
Explore the intricacies of end-to-end encryption in this 40-minute conference talk from Strange Loop. Delve into the inner workings of secure messaging protocols, understanding the threats they defend against and how cryptographic operations are combined to implement these defenses. Learn about forward secrecy, key exchange mechanisms, and methods to ensure secure communication with the intended recipient. Discover the potential applications of end-to-end encryption beyond instant messaging, such as creating secure versions of collaborative tools like Google Docs. Gain insights into topics including HTTPS, RSA, PGP, Diffie-Hellman key exchange, rolling forward keys, prekeys, authentication methods, and message authentication codes through a comprehensive exploration of cryptographic concepts and live demonstrations.
Syllabus
Introduction
Background
True Data
HTTPS
RSA
PGP
Live demo
Loss of private key
Selfheal keys
DiffieHellman
Rolling forward keys
Prekeys
Math
Authentication
Message authentication codes
Message sending
Recap
Taught by
Strange Loop Conference
Tags
Related Courses
A Better Story for Kubernetes SecretsStrange Loop Conference via YouTube A Box of Chaos - The Generative Artist's Toolkit
Strange Loop Conference via YouTube A Commerce-centric Approach to Queuing Fairly at High Throughput
Strange Loop Conference via YouTube A Distributed File System for Secure P2P Applications
Strange Loop Conference via YouTube A Frontend Server, Front to Back
Strange Loop Conference via YouTube