Basic concepts of cryptography as built-in functions in Wolfram Language. See symmetric (private-key) and asymmetric (public-key) encryption examples and when one is preferred over the other. Recorded two-part livecoding series.
Summary
In this recorded, two-part livecoding series, Christopher Wolfram discusses some basic concepts of cryptography and shows how they are implemented as built-in functions in Wolfram Language. Encryption examples are given using both symmetric (private-key) and asymmetric (public-key) cryptography. You'll learn how symmetric and asymmetric keys differ from each other and the contexts in which one is preferred over the other. The use of different ciphers and hash code types is shown, with discussion of password and digital signature encryption use cases.
Featured Products & Technologies: Wolfram Language
Summary
In this recorded, two-part livecoding series, Christopher Wolfram discusses some basic concepts of cryptography and shows how they are implemented as built-in functions in Wolfram Language. Encryption examples are given using both symmetric (private-key) and asymmetric (public-key) cryptography. You'll learn how symmetric and asymmetric keys differ from each other and the contexts in which one is preferred over the other. The use of different ciphers and hash code types is shown, with discussion of password and digital signature encryption use cases.
Featured Products & Technologies: Wolfram Language