Today, everyone has full access to bulletproof “military grade encryption” for free, even if they don’t realize it. But when used in concert with the massive storage capacities and processing speeds of our modern electronic devices, they serve as the bedrock atop which every provably secure system works, from password vaults to Virtual Private Networks (VPNs) to BitCoin and beyond. ![]() At their root, these functions, called cryptographic primitives, are not that much more complicated than simple addition or division. Detailed descriptionĮvery time you use a modern computer, you invoke numerous simple mathematical functions that make it possible to do things like logging in to Web sites safely or “locking” (encrypting) your secret documents behind passwords. You’ll literally see the differences between different encryption schemes and “cipher modes” and will be able to understand how today’s most complex algorithms and data security protocols are built up out of extremely straightforward mathematical functions like simple addition.Īttend the next workshop(s). ![]() This workshop shows you real-time examples of modern cryptography by breaking down the process of how computers protect messages from spies and eavesdroppers by scrambling messages, and clearly explains the confusing words that cryptographers and programmers use to talk about information security.
0 Comments
Leave a Reply. |