Lecture

Trust Establishment: Cryptography and Security

In course
DEMO: aute sint
Laborum fugiat ea voluptate ex pariatur ex duis eiusmod. Id do nostrud ut consequat ea velit duis occaecat est commodo occaecat nisi. Pariatur qui officia eiusmod aliqua anim quis dolore. Cillum consectetur quis voluptate consequat nostrud excepteur occaecat qui est mollit.
Login to see this section
Description

This lecture covers the establishment of trust in the context of cryptography and security, focusing on topics such as setting up secure channels, trusted third parties, and trust management. It delves into the challenges of certificate verification, the PKI model, and the chain of trust in real-life scenarios. The instructor discusses various approaches to trust infrastructure, including Kerberos, PKI, identity-based encryption, and certificateless encryption. The lecture also explores the vulnerabilities in the current PKI landscape and the efforts to enhance security through improved PKI schemes. Additionally, it addresses the importance of human factors, trust management, and the need for diverse cryptographic models.

Instructor
est ut mollit
Officia nulla Lorem excepteur ullamco minim ullamco eu mollit culpa ullamco ut officia quis. Ipsum ea veniam aute Lorem aliqua et amet esse. Labore esse sint deserunt nisi cillum. Fugiat ad quis ad consequat labore aliqua ad reprehenderit ipsum deserunt Lorem voluptate. Culpa ex anim laboris qui reprehenderit Lorem amet fugiat dolore. Elit consectetur veniam excepteur esse esse nulla consequat ut aute veniam non elit excepteur sit.
Login to see this section
About this result
This page is automatically generated and may contain information that is not correct, complete, up-to-date, or relevant to your search query. The same applies to every other page on this website. Please make sure to verify the information with EPFL's official sources.
Related lectures (98)
Cryptography Basics: Symmetric and Asymmetric Encryption
Introduces the fundamentals of cryptography, focusing on symmetric and asymmetric encryption, data integrity, authentication, and non-repudiation.
SSL Certificate Deployment for ENAC Web Hosting
Focuses on SSL certificate deployment for ENAC Web Hosting, covering certificate generation, debugging, and Ansible playbook management.
Legacy Web Hosting Services Tour
Covers a tour of legacy web hosting services and discussions on future services storage.
Conditional Access II
Covers conditional access, encryption, decryption, authentication, and advanced encryption standards, exploring identity-based encryption, biometrics, and attribute-based encryption.
Introduction to Cryptography: Fundamentals and Applications
Covers the fundamentals of cryptography, including symmetric encryption, digital signatures, and secure communication standards.
Show more

Graph Chatbot

Chat with Graph Search

Ask any question about EPFL courses, lectures, exercises, research, news, etc. or try the example questions below.

DISCLAIMER: The Graph Chatbot is not programmed to provide explicit or categorical answers to your questions. Rather, it transforms your questions into API requests that are distributed across the various IT services officially administered by EPFL. Its purpose is solely to collect and recommend relevant references to content that you can explore to help you answer your questions.