Lecture

Trust Establishment: Cryptography and Security

In course
DEMO: ullamco in eu
Exercitation veniam pariatur enim mollit. Incididunt nisi consequat consequat sit enim officia aliqua aliqua. Sit tempor anim anim est consectetur. Exercitation duis sit ea commodo culpa.
Login to see this section
Description

This lecture covers the establishment of trust in the context of cryptography and security, focusing on topics such as setting up secure channels, trusted third parties, and trust management. It delves into the challenges of certificate verification, the PKI model, and the chain of trust in real-life scenarios. The instructor discusses various approaches to trust infrastructure, including Kerberos, PKI, identity-based encryption, and certificateless encryption. The lecture also explores the vulnerabilities in the current PKI landscape and the efforts to enhance security through improved PKI schemes. Additionally, it addresses the importance of human factors, trust management, and the need for diverse cryptographic models.

Instructor
laboris pariatur esse tempor
Pariatur nulla qui irure in amet irure. Fugiat commodo culpa amet enim ut consequat ut minim aute deserunt. Ullamco anim in excepteur cillum. Culpa fugiat non excepteur velit voluptate. Id eiusmod commodo deserunt commodo ex aliquip ad sit id quis sit commodo. Ea exercitation laborum officia laboris elit reprehenderit ad reprehenderit.
Login to see this section
About this result
This page is automatically generated and may contain information that is not correct, complete, up-to-date, or relevant to your search query. The same applies to every other page on this website. Please make sure to verify the information with EPFL's official sources.
Related lectures (98)
Cryptography Basics: Symmetric and Asymmetric Encryption
Introduces the fundamentals of cryptography, focusing on symmetric and asymmetric encryption, data integrity, authentication, and non-repudiation.
SSL Certificate Deployment for ENAC Web Hosting
Focuses on SSL certificate deployment for ENAC Web Hosting, covering certificate generation, debugging, and Ansible playbook management.
Legacy Web Hosting Services Tour
Covers a tour of legacy web hosting services and discussions on future services storage.
Conditional Access II
Covers conditional access, encryption, decryption, authentication, and advanced encryption standards, exploring identity-based encryption, biometrics, and attribute-based encryption.
Introduction to Cryptography: Fundamentals and Applications
Covers the fundamentals of cryptography, including symmetric encryption, digital signatures, and secure communication standards.
Show more