Overview
Explore cutting-edge cryptography techniques in this 35-minute lecture from The Cyber Academy. Delve into public key encryption, RSA, discrete logarithms, and the Chinese remainder theorem. Learn about advanced concepts like homomorphic cryptography, cloud-based encryption, and quantum-robust methods. Discover lattice cryptography, differential privacy, and zero-knowledge proofs. Examine the evolution of encryption algorithms, including obsolete methods and Google's prototype. Gain insights into proof of identity and signature schemes, essential for modern cybersecurity.
Syllabus
Intro
MIT
Evil Numbers
Prime Numbers
Remove
RSA Encryption
Discrete logarithms
I broke the internet
Chinese remainder theorem
Homomorphic cryptography
Mathematical calculations
Cloudbased encryption
Quantum Robust Methods
Lattice Cryptography
Unbalanced Algorithm
Differential Privacy
Commerce Stiff Encryption
Zero Knowledge
Obsolete
Quantum Robust
Google Prototype
Proof of Identity
Signature Schemes
Public Key Encryption
Taught by
The Cyber Academy