A Tour Through the Magical Wonderful World of Crypto Land
Offered By: YouTube
Course Description
Overview
Embark on a 40-minute journey through the fascinating realm of cryptography in this BSides Philly 2016 conference talk. Explore key concepts such as asymmetric cryptography, computational and decision Diffie-Hellman protocols, and magical mapping. Delve into symmetric encryption, understanding Feistel networks and the significance of three rounds. Examine various encryption algorithms, ciphers, and the importance of padding in cryptographic processes. Gain valuable insights into the intricate world of crypto land, enhancing your understanding of essential security principles and techniques.
Syllabus
Intro
Asymmetric Cryptography
Computational DiffieHellman
Decision DiffieHellman
Magical Mapping
Symmetric
Feistel Network
Why 3 rounds
Encryption
Cypher
Algorithms
Padding
Related Courses
Asymmetric Cryptography and Key ManagementUniversity of Colorado System via Coursera Криптографические методы защиты информации
National Research Nuclear University MEPhI via edX Applied Cryptography
University of Colorado System via Coursera Securing Data with Asymmetric Cryptography
Pluralsight CompTIA Security+ (SY0-601) Cert Prep: 3 Cryptography Design and Implementation
LinkedIn Learning