Class Central is learner-supported. When you buy through links on our site, we may earn an affiliate commission.

YouTube

Designing, Implementing, Attacking, and Defending Symmetric Crypto

TheIACR via YouTube

Overview

Dive into the world of symmetric cryptography in this comprehensive 50-minute lecture. Explore the intricate processes of designing, implementing, attacking, and defending symmetric cryptographic systems. Gain valuable insights into the fundamental principles and practical applications of this crucial aspect of information security. Learn about various encryption algorithms, key management techniques, and potential vulnerabilities in symmetric cryptosystems. Discover effective strategies for protecting sensitive data and defending against cryptographic attacks. Whether you're a cybersecurity professional, cryptography enthusiast, or aspiring information security expert, this lecture offers a deep dive into the essential concepts and real-world challenges of symmetric cryptography.

Syllabus

s-26: Designing, Implementing, Attacking, and Defending Symmetric Crypto

Taught by

TheIACR

Reviews

Start your review of Designing, Implementing, Attacking, and Defending Symmetric Crypto

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.