Introduction to Hybrid Cryptography in Real-World Applications

An overview of how hybrid cryptography combines hash functions, symmetric, and public-key cryptography to ensure data integrity, confidentiality, and authentication in protocols such as HTTPS, TLS, and SSH.

Wolfram U 536 views7:47

🔥 Related Trending Topics

LIVE TRENDS

This video may be related to current global trending topics. Click any trend to explore more videos about what's hot right now!

THIS VIDEO IS TRENDING!

This video is currently trending in Saudi Arabia under the topic 'new zealand national cricket team vs west indies cricket team match scorecard'.

About this video

Real-world applications like HTTPS, TLS and SSH combine hash functions and symmetric and public-key cryptography for data integrity, confidentiality, authentication and non-repudiation. See an example in Wolfram Language. The next lesson will show you how to scale these hybrid systems for larger applications. In the full course, you will learn how and when to use hash functions and symmetric and asymmetric ciphers, as well as the basics of information security through instruction on the fundamentals and real-life applications of each concept. #wolfram #cryptography #learning #course #informationsecurity #steganography #encryption

Video Information

Views
536

Total views since publication

Likes
3

User likes and reactions

Duration
7:47

Video length

Published
Dec 13, 2023

Release date

Quality
hd

Video definition

Captions
Available

Subtitles enabled