Public Key Methods
Offered By: Bill Buchanan OBE via YouTube
Course Description
Overview
Explore the fundamentals of public key cryptography in this comprehensive 1 hour 21 minute lecture. Delve into the origins of public key methods, their current challenges, and the emergence of post-quantum cryptography. Learn about the three main public key methods: RSA, ECC, and ElGamal. Gain practical insights into RSA's functionality, Python implementation, and the management of public keys. Discover the use of keyrings and GPG (GNU Privacy Guard) for secure communication. Access additional resources on RSA, ECC, and ElGamal through provided links to enhance your understanding of these critical cryptographic techniques.
Syllabus
Intro
Overview
Outline
Next week
Who created Public Key Methods
Public Key Methods under threat
Post Quantum Cryptography
Public Key Cryptography
Public Key Basics
Three Methods
RSA
How it works
Python
Public Keys
Keyring
gpg
Taught by
Bill Buchanan OBE
Related Courses
Asymmetric Cryptography and Key ManagementUniversity of Colorado System via Coursera Introduction to Applied Cryptography
University of Colorado System via Coursera Applied Cryptography
University of Colorado System via Coursera Designing for Advanced Security within AWS
Pluralsight Creating Security Baselines in Microsoft Azure
Pluralsight