Lecture

Cryptography: Tools and Techniques

Description

This lecture covers the fundamentals of cryptography, including shared-algorithm, symmetric-key, and public-key cryptography, cryptographic hash functions, and key infrastructure. The instructor explains interactive key exchange protocols like Diffie-Hellman, elliptic curve cryptography, and the Elliptic Curve Digital Signature Algorithm (ECDSA). The lecture also delves into secret sharing techniques and the importance of randomness in decentralized systems. Practical applications of cryptography, such as secure data transmission and digital signatures, are discussed in detail.

This video is available exclusively on Mediaspace for a restricted audience. Please log in to MediaSpace to access it if you have the necessary permissions.

Watch on Mediaspace
About this result
This page is automatically generated and may contain information that is not correct, complete, up-to-date, or relevant to your search query. The same applies to every other page on this website. Please make sure to verify the information with EPFL's official sources.
Related lectures (149)
Distributed Randomness: Drand
Explores distributed randomness using Drand, covering cryptographic tools, key exchange, elliptic curve cryptography, and practical applications in blockchain systems.
Cryptography Basics: Symmetric and Asymmetric Encryption
Introduces the fundamentals of cryptography, focusing on symmetric and asymmetric encryption, data integrity, authentication, and non-repudiation.
Quantum Random Number Generation
Explores quantum random number generation, discussing the challenges and implementations of generating good randomness using quantum devices.
Public-Key Cryptography: Key Exchange and Signatures
Explores public-key cryptography, key exchange, and digital signatures, discussing practical applications and security mechanisms.
Conditional Access II
Covers conditional access, encryption, decryption, authentication, and advanced encryption standards, exploring identity-based encryption, biometrics, and attribute-based encryption.
Show more