What happens on your computer or phone when you enter your credit card info to make a purchase? This session will explore the fundamentals of modern symmetric and asymmetric cryptography including the SSL/TLS protocol, block ciphers, stream ciphers, key exchange, and of course, RSA. If time allows, we’ll then examine some modern applications such as crypto-currencies and blockchains as well as election technologies. No prior experience is assumed.
Security Strategy & Architecture Protecting Data & Applied Crypto
Share With Your Community