Are you an EPFL student looking for a semester project?
Work with us on data science and visualisation projects, and deploy your project as an app on top of Graph Search.
This lecture covers the setup of RSA encryption with the selection of prime numbers, calculation of public and private keys, and the process of sending encrypted messages. It also explains the concept of asymmetric encryption, defense against man-in-the-middle attacks, and signature defense protocols.