Completed
How the enigma machine works.
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Keeping Secrets - Cryptography in a Connected World
Automatically move to the next video in the Classroom when playback concludes
- 1 Cryptography In A Connected World
- 2 Josh Zepps Introduction
- 3 Participant Introductions
- 4 What is the history of Cryptography?
- 5 What's the difference between Cryptography and Encryption?
- 6 How the enigma machine works.
- 7 You’re Only as Secure as Your Weakest Link
- 8 Public key and private key encryption example.
- 9 What is the distinction between hacking and cryptanalysis?
- 10 The NSA and what they are looking for?
- 11 How do we establish cyber security?
- 12 How do systems get broken into?
- 13 How do you break a code?
- 14 Public key and the key distribution problem.
- 15 Codes will need to be tough due to mathematicians getting better.
- 16 The cloud and how we protect it.
- 17 In a world that is increasingly networked, How do we protect ourselves?
- 18 Online voting ... When and how?