Are you an EPFL student looking for a semester project?
Work with us on data science and visualisation projects, and deploy your project as an app on top of Graph Search.
This lecture covers the RSA encryption scheme, explaining how the receiver generates large prime numbers, sets up the encryption, and produces the public and private keys. It also delves into trapdoor one-way functions, detailing how Alice and Bob use these functions for secure communication. Additionally, the lecture explores the importance of hash functions in speeding up cryptographic processes and provides insights into possible attacks on RSA encryption. The instructor discusses the standards commonly used in cryptography, such as SHA, DSA, AES, and DES, highlighting their advantages over RSA in certain scenarios. A comprehensive example of how Apple implements various cryptographic standards for iMessage communication is also presented.