Introduction to Hybrid Cryptography in Real-World Applications
An overview of how hybrid cryptography combines hash functions, symmetric, and public-key cryptography to ensure data integrity, confidentiality, and authentication in protocols such as HTTPS, TLS, and SSH.
🔥 Related Trending Topics
LIVE TRENDSThis video may be related to current global trending topics. Click any trend to explore more videos about what's hot right now!
THIS VIDEO IS TRENDING!
This video is currently trending in Saudi Arabia under the topic 'new zealand national cricket team vs west indies cricket team match scorecard'.
About this video
Real-world applications like HTTPS, TLS and SSH combine hash functions and symmetric and public-key cryptography for data integrity, confidentiality, authentication and non-repudiation. See an example in Wolfram Language. The next lesson will show you how to scale these hybrid systems for larger applications.
In the full course, you will learn how and when to use hash functions and symmetric and asymmetric ciphers, as well as the basics of information security through instruction on the fundamentals and real-life applications of each concept.
#wolfram #cryptography #learning #course #informationsecurity #steganography #encryption
Video Information
Views
536
Total views since publication
Likes
3
User likes and reactions
Duration
7:47
Video length
Published
Dec 13, 2023
Release date
Quality
hd
Video definition
Captions
Available
Subtitles enabled