YoVDO

Public Key Methods

Offered By: Bill Buchanan OBE via YouTube

Tags

Public Key Cryptography Courses Cybersecurity Courses Python Courses RSA Conference Courses Key Management Courses

Course Description

Overview

Explore the fundamentals of public key cryptography in this comprehensive 1 hour 21 minute lecture. Delve into the origins of public key methods, their current challenges, and the emergence of post-quantum cryptography. Learn about the three main public key methods: RSA, ECC, and ElGamal. Gain practical insights into RSA's functionality, Python implementation, and the management of public keys. Discover the use of keyrings and GPG (GNU Privacy Guard) for secure communication. Access additional resources on RSA, ECC, and ElGamal through provided links to enhance your understanding of these critical cryptographic techniques.

Syllabus

Intro
Overview
Outline
Next week
Who created Public Key Methods
Public Key Methods under threat
Post Quantum Cryptography
Public Key Cryptography
Public Key Basics
Three Methods
RSA
How it works
Python
Public Keys
Keyring
gpg


Taught by

Bill Buchanan OBE

Related Courses

Computer Security
Stanford University via Coursera
Cryptography II
Stanford University via Coursera
Malicious Software and its Underground Economy: Two Sides to Every Story
University of London International Programmes via Coursera
Building an Information Risk Management Toolkit
University of Washington via Coursera
Introduction to Cybersecurity
National Cybersecurity Institute at Excelsior College via Canvas Network