Cryptography in Computer Networks: Securing Data with PKI & Symmetric Keys π
Discover how networks use cryptography to ensure security, including public key infrastructure (PKI) and symmetric key methods, in this episode of Kurose & Ross's Computer Networks series.

Epic Networks Lab
8.6K views β’ Apr 20, 2021

About this video
Answering the question: "How do networks use cryptography to achieve security?" This video includes public key cryptography (PKI) as well as symmetric key cryptography.
Based on Computer Networking: A Top-Down Approach 8th edition, Chapter 8, Section 2.
Slides are copyright 1996-2020 J.F. Kurose, K.W. Ross All Rights Reserved., and freely available here: https://gaia.cs.umass.edu/kurose_ross/ppt.htm
Background music: https://www.epidemicsound.com/referral/tuicuy/
Based on Computer Networking: A Top-Down Approach 8th edition, Chapter 8, Section 2.
Slides are copyright 1996-2020 J.F. Kurose, K.W. Ross All Rights Reserved., and freely available here: https://gaia.cs.umass.edu/kurose_ross/ppt.htm
Background music: https://www.epidemicsound.com/referral/tuicuy/
Video Information
Views
8.6K
Likes
128
Duration
18:35
Published
Apr 20, 2021
User Reviews
4.5
(1) Related Trending Topics
LIVE TRENDSRelated trending topics. Click any trend to explore more videos.