Introduction to Hybrid Cryptography in Real-World Applications
An overview of how hybrid cryptography combines hash functions, symmetric, and public-key cryptography to ensure data integrity, confidentiality, and authentication in protocols such as HTTPS, TLS, and SSH.

Wolfram U
536 views β’ Dec 13, 2023

About this video
Real-world applications like HTTPS, TLS and SSH combine hash functions and symmetric and public-key cryptography for data integrity, confidentiality, authentication and non-repudiation. See an example in Wolfram Language. The next lesson will show you how to scale these hybrid systems for larger applications.
In the full course, you will learn how and when to use hash functions and symmetric and asymmetric ciphers, as well as the basics of information security through instruction on the fundamentals and real-life applications of each concept.
#wolfram #cryptography #learning #course #informationsecurity #steganography #encryption
In the full course, you will learn how and when to use hash functions and symmetric and asymmetric ciphers, as well as the basics of information security through instruction on the fundamentals and real-life applications of each concept.
#wolfram #cryptography #learning #course #informationsecurity #steganography #encryption
Video Information
Views
536
Likes
3
Duration
7:47
Published
Dec 13, 2023
Related Trending Topics
LIVE TRENDSRelated trending topics. Click any trend to explore more videos.