Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Public Key Encryption and New Methods of Crypto

The Cyber Academy via YouTube

Overview

Explore cutting-edge cryptography techniques in this 35-minute lecture from The Cyber Academy. Delve into public key encryption, RSA, discrete logarithms, and the Chinese remainder theorem. Learn about advanced concepts like homomorphic cryptography, cloud-based encryption, and quantum-robust methods. Discover lattice cryptography, differential privacy, and zero-knowledge proofs. Examine the evolution of encryption algorithms, including obsolete methods and Google's prototype. Gain insights into proof of identity and signature schemes, essential for modern cybersecurity.

Syllabus

Intro
MIT
Evil Numbers
Prime Numbers
Remove
RSA Encryption
Discrete logarithms
I broke the internet
Chinese remainder theorem
Homomorphic cryptography
Mathematical calculations
Cloudbased encryption
Quantum Robust Methods
Lattice Cryptography
Unbalanced Algorithm
Differential Privacy
Commerce Stiff Encryption
Zero Knowledge
Obsolete
Quantum Robust
Google Prototype
Proof of Identity
Signature Schemes
Public Key Encryption

Taught by

The Cyber Academy

Reviews

Start your review of Public Key Encryption and New Methods of Crypto

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.