Master Public Key Cryptography & RSA: Clarify Misconceptions & Real-World Uses πŸ”

Explore common misconceptions about public-key encryption, understand how public-key cryptosystems work, and discover their practical applications in cybersecurity.

Master Public Key Cryptography & RSA: Clarify Misconceptions & Real-World Uses πŸ”
Hicham Elmongui
8.8K views β€’ Nov 28, 2020
Master Public Key Cryptography & RSA: Clarify Misconceptions & Real-World Uses πŸ”

About this video

* Misconceptions Concerning Public-Key Encryption (time: 0:26, slide(s):3)
* Public-Key Cryptosystems (time: 2:46, slide(s):5-7)
* Applications for Public-Key Cryptosystems (time: 14:28, slide(s):12-13)
* Requirements for Public-Key Cryptography (time: 16:11, slide(s):14-15)
* Public-Key Cryptanalysis (time: 19:23, slide(s):16)
* The RSA Algorithm (time: 22:42, slide(s):17-18)
- Algorithm Requirements (time: 25:41, slide(s):19)
- Example (time: 32:03, slide(s):22)
- Exponentation in Modular Arithmetic (time: 36:51, slide(s):24-27)
- Efficient Operation Using the Public-Key (time: 0:26, slide(s):28-29)
- Key Generation (time: 45:45, slide(s):30)
- Procedure for Picking a Prime Number (time: 47:27, slide(s):31)
* Security (time: 48:38, slide(s):32)
- Factoring Problem (time: 48:54, slide(s):33-34)
- Timing Attacks (time: 50:37, slide(s):35)
- Countermeasures (time: 52:15, slide(s):36)
- Fault-Based Attack (time: 54:06, slide(s):37)
- Chosen Chiphertext Attack (CCA) (time: 56:12, slide(s):38-39)
* Summary (time: 1:00:10, slide(s):40)

ANNOTATION BY: an SSP CCE 2021 alumnus who prefered to be anonymous!

--Computer and Network Security

Video Information

Views

8.8K

Duration

01:01:44

Published

Nov 28, 2020

User Reviews

3.8
(1)
Rate:

Related Trending Topics

LIVE TRENDS

Related trending topics. Click any trend to explore more videos.