Jose Cardona - Modern, Functional Cryptography (Part 3) - λC 2018
This workshop proposal lays out a mathematics-heavy, developer introduction to modern cryptography in a functional programming context. I plan to cover the ...
🔥 Related Trending Topics
LIVE TRENDSThis video may be related to current global trending topics. Click any trend to explore more videos about what's hot right now!
THIS VIDEO IS TRENDING!
This video is currently trending in Pakistan under the topic 'f'.
About this video
This workshop proposal lays out a mathematics-heavy, developer introduction to modern cryptography in a functional programming context.
I plan to cover the following topics, often covered by university cryptography courses:
- A quick introduction to classical cryptography as a pathway to the goals and general properties of ciphers, as well as the common attack vectors used for basic cryptanalysis.
- Introduction to number theory and abstract algebra.
- Symmetric cryptography: Block and stream ciphers, modes of operation, key management.
- Asymmetric cryptography: The Diffie-Hellman problem, Elgamal PKCS, RSA, and code examples and implementations.
- Pseudorandom functions (PRF) and pseudorandom generators (PRGs)
- A section on combinatorics, probability, and information theory.
- Introduction to hashing, message authentication, and digital signatures. Applications with cryptocurrencies.
- Elliptic curve cryptography. Applications in ECDSA and ECEIS.
- Time-permitting: Lattice based crypto and advanced topics in cryptography.
Throughout the sections, we will develop a cryptographic library based on laws and formulated with typeclasses, each of which will play a part in developing a secure web application backend. Emphasis, in particular, will be placed on understanding cryptographic constructs both mathematically and from an application perspective. This includes common web application topics like deploying with TLS, tokens vs. cookies, JWTs explained, sessions, and common attacks. Even though we will begin from first principles, real-world emphasis will be put on using up-to-date cryptographic constructs, protocols, and avoiding outdated pitfalls, as well as what to look for in cryptographic libraries.
This workshop aims to empower developers not only to build your generic authenticated backend, but to go further into understanding the applications and uses of cryptographic protocols within a functional, lawful context. I aim to bring up cryptography and security from the afterthought that gets you Equifax'd, to a tangible tool in your developer and company arsenal.
Video Information
Views
30
Total views since publication
Duration
58:49
Video length
Published
Dec 20, 2018
Release date
Quality
hd
Video definition
About the Channel
Tags and Topics
This video is tagged with the following topics. Click any tag to explore more related content and discover similar videos:
Tags help categorize content and make it easier to find related videos. Browse our collection to discover more content in these categories.