Overview
Syllabus
Cryptography In A Connected World
Josh Zepps Introduction
Participant Introductions
What is the history of Cryptography?
What's the difference between Cryptography and Encryption?
How the enigma machine works.
You’re Only as Secure as Your Weakest Link
Public key and private key encryption example.
What is the distinction between hacking and cryptanalysis?
The NSA and what they are looking for?
How do we establish cyber security?
How do systems get broken into?
How do you break a code?
Public key and the key distribution problem.
Codes will need to be tough due to mathematicians getting better.
The cloud and how we protect it.
In a world that is increasingly networked, How do we protect ourselves?
Online voting ... When and how?
Taught by
World Science Festival