We're sorry but this page doesn't work properly without JavaScript enabled. Please enable it to continue.
Feedback

Cryptography demystified

00:00

Formal Metadata

Title
Cryptography demystified
Subtitle
An introduction without maths
Title of Series
Number of Parts
Author
License
CC Attribution 4.0 International:
You are free to use, adapt and copy, distribute and transmit the work or content in adapted or unchanged form for any legal purpose as long as the work is attributed to the author in the manner specified by the author or licensor.
Identifiers
Publisher
Release Date
Language

Content Metadata

Subject Area
Genre
Abstract
This talk will explain the basic building blocks of cryptography in a manner that will (hopefully) be understandable by everyone. The talk will not require any understanding of maths or computer science. In particular, the talk will explain encryption, what it is and what it does, what it is not and what it doesn't do, and what other tools cryptography can offer. This talk will explain the basic building blocks of cryptography in a manner that will (hopefully) be understandable by everyone, in particular by a non-technical audience. The talk will not require any understanding of maths or computer science. This talk will cover the following topics: What is encryption and what does it do? What are the different kinds of encryption? What is authenticity? Are authenticity and encryption related? How can authenticity be achieved? What are certificates for? What is TLS and what does it do? While covering the above topcis, I will not explain the technical details of common cryptographic schemes (like RSA, AES, HMAC and so on), in order to avoid keep this talk accessible to a broad audience.
Keywords
MathematicsCryptographyFilm editingField (computer science)Medical imagingMereologyEncryptionDirection (geometry)AreaComputer animationJSONLecture/Conference
CryptographyTheoryMeta elementCryptographyMedical imagingMathematicsComputer scienceEncryptionResultantLecture/ConferenceComputer animation
EncryptionAuthenticationChecklistSemiconductor memorySoftware bugNumber theoryInheritance (object-oriented programming)Computer programmingCryptographyCuboidPlanningComputer-assisted translationChecklistEncryptionSeries (mathematics)AuthenticationPublic key certificateLecture/ConferenceComputer animation
Computer virusEncryptionAuthenticationEncryptionPublic key certificatePoint (geometry)Message passingCryptographyCASE <Informatik>1 (number)Lecture/ConferenceComputer animation
EncryptionComputer virusMessage passingContent (media)EncryptionProcedural programmingPoint (geometry)Cartesian coordinate systemCryptographyDeciphermentProcess (computing)Descriptive statisticsLecture/ConferenceComputer animation
EncryptionComputer virusInformation securityEncryptionProcess (computing)Medical imagingCryptographyMessage passingNumbering schemeMultiplication signKey (cryptography)Procedural programmingPublic-key cryptographyComputerOperator (mathematics)NeuroinformatikAsymmetrySymmetric-key algorithmOrder (biology)CuboidMathematicsWordComputer scienceConnected spaceTerm (mathematics)Descriptive statisticsLecture/ConferenceComputer animation
EncryptionEncryptionKey (cryptography)Public-key cryptographyConnected spaceWindows RegistryMessage passingDescriptive statisticsComputer animationLecture/Conference
EncryptionComputer virusTelecommunicationMetadataEncryptionPublic-key cryptographyConnected spaceCryptographyNumbering schemeKey (cryptography)Message passingTelecommunicationPrice indexDescriptive statisticsElectronic mailing listContent (media)FrictionPoint (geometry)Computer animation
Message passingBlock (periodic table)MathematicsTelecommunicationKey (cryptography)MetadataEncryptionEncryptionMessage passingMetadataMathematicsProcess (computing)Key (cryptography)Intercept theoremLecture/ConferenceComputer animation
EncryptionAuthenticationChecklistWebsiteMereologyEncryptionAuthenticationChecklistMessage passingPublic-key cryptographyMathematicsNumberInformationSelf-organizationTerm (mathematics)Lecture/ConferenceComputer animation
AuthenticationMessage passingNumberAuthenticationKey (cryptography)Formal verificationLecture/ConferenceComputer animation
AuthenticationMessage passingAuthenticationPublic-key cryptographyKey (cryptography)Formal verificationNeuroinformatikTerm (mathematics)Electronic signatureNumberComputerLecture/ConferenceComputer animationProgram flowchart
AuthenticationFormal verificationMathematicsElectronic signatureCASE <Informatik>NumberKey (cryptography)Validity (statistics)AuthenticationMessage passingTerm (mathematics)Exception handlingFormal verificationLecture/ConferenceComputer animationProgram flowchart
AuthenticationDistribution (mathematics)ChecklistLatent heatException handlingAuthenticationElectronic signatureCodeMessage passingAssociative propertyPublic key certificateNumberAuthorizationPublic-key cryptographyElectronic mailing listProcess (computing)Key (cryptography)Distribution (mathematics)AreaSlide ruleFormal verificationSelf-organizationGame theorySheaf (mathematics)Latent heatMathematicsTerm (mathematics)Lecture/ConferenceComputer animation
Key (cryptography)Public key certificateDistribution (mathematics)Public-key cryptographyAuthorizationCASE <Informatik>Single-precision floating-point formatUsabilityComputer animationLecture/Conference
Key (cryptography)Latent heatPublic key certificateAuthorizationIdentity managementCASE <Informatik>Self-organizationReal numberPower (physics)UsabilityKey (cryptography)Numbering schemeDistribution (mathematics)Computer animation
Key (cryptography)Latent heatAuthorizationPublic key certificatePublic-key cryptographyKey (cryptography)Power (physics)CryptographyIncidence algebraNumberCASE <Informatik>Lecture/ConferenceComputer animation
EncryptionAuthenticationChecklistComputer virusGoogolPublic key certificateAuthorizationComa BerenicesDomain nameMessage passingCASE <Informatik>Key (cryptography)AuthenticationCombinational logicInformation securityNumbering schemeDescriptive statisticsSymmetric-key algorithmMathematicsFormal verificationEncryptionNeuroinformatikSystem callProcedural programmingProcess (computing)QuicksortMultiplication signPublic-key cryptographyCodeBuildingLecture/ConferenceEngineering drawing
EncryptionSymmetric-key algorithmNumbering schemeKey (cryptography)Metric systemSymmetric matrixMessage passingPublic-key cryptographyDescriptive statisticsCryptographyLecture/Conference
EncryptionTransportschichtHybrid computerSymmetric matrixAuthenticationPublic key certificateMessage passingEncryptionCommunications protocolCombinational logicMaxima and minimaConnected spaceSymmetric matrixElectronic signatureHybrid computerPublic key certificateMessage passingInformation securityAuthenticationCryptographyTransport Layer SecuritySymmetric-key algorithmComputer animation
SoftwareMessage passingConnected spaceTransport Layer SecuritySource codeLecture/Conference
TransportschichtEncryptionHybrid computerSymmetric matrixPublic key certificateAuthenticationMessage passingSign (mathematics)Hyperbolic functionEmailServer (computing)EmailConnected spaceCuboidMessage passingCartesian coordinate systemNeuroinformatikComputer animation
EncryptionSign (mathematics)Hyperbolic functionMessage passingContent (media)AuthenticationMessage passingConnected spaceEmailAuthenticationServer (computing)Public-key cryptographyEncryptionCryptographySoftwareContent (media)Key (cryptography)Multiplication signElectronic mailing listFormal verificationPublic key certificateDistribution (mathematics)Process (computing)Right angle2 (number)Interrupt <Informatik>CuboidMathematicsMetreDescriptive statisticsCASE <Informatik>Interior (topology)Lecture/ConferenceComputer animation
EncryptionAuthenticationOpen setCommunications protocolMessage passingAddress spaceSlide ruleEmailLecture/Conference
TwitterCryptographyFeedbackOpen setEmailAddress spaceCryptographyMereologyMessage passingPolygon meshMultiplication signDescriptive statisticsComputer animationLecture/Conference
EncryptionNumbering schemeNumberCryptographyMathematicsBitMessage passingMultiplication signDescriptive statisticsFigurate numberChainLecture/Conference
EncryptionMetadataLengthMessage passingIdentity managementGraphics tabletBound stateIdeal (ethics)InternetworkingEmailLecture/Conference
AdditionEncryptionInternetworkingScaling (geometry)CoprocessorSymmetric-key algorithmTerm (mathematics)Food energySummierbarkeit2 (number)Digital electronicsCryptographyBlock (periodic table)Process (computing)NeuroinformatikNumberLecture/Conference
Message passingMultiplication signOrder (biology)Heat transferNatural numberLecture/Conference
EncryptionCryptographyAnalytic setProcess (computing)Elliptic curveSlide ruleEncryptionCurveDescriptive statisticsNeuroinformatikCuboidMathematicsLimit (category theory)Procedural programmingPower (physics)Complex (psychology)Lecture/ConferenceComputer animation
Process (computing)Limit (category theory)Power (physics)Complex (psychology)EncryptionNumbering scheme1 (number)Vulnerability (computing)NeuroinformatikMoment (mathematics)Information securityState of matterAuthenticationPublic key certificateAuthorizationLecture/Conference
Public key certificateAuthorizationAuthenticationPower (physics)Computer fileState of matterData loggerGoogolSystem callLecture/Conference
AuthenticationInternetworkingKey (cryptography)Peer-to-peerCASE <Informatik>EmailData storage deviceCentralizer and normalizerPublic key certificateEndliche ModelltheorieGraph (mathematics)AuthorizationPublic-key cryptographyLecture/Conference
EmailTransport Layer SecurityConnected spaceEncryptionServer (computing)BuildingEmoticonRoundness (object)Lecture/Conference
Boom (sailing)Lecture/ConferenceComputer animation
Transcript: Englisch(auto-generated)