Power BI Fundamentals - Create visualizations and dashboards from scratch
AI, Data Science & Cloud Certificates from Google, IBM & Meta
Overview
Google, IBM & Meta Certificates — All 10,000+ Courses at 40% Off
One annual plan covers every course and certificate on Coursera. 40% off for a limited time.
Get Full Access
Dive into the world of cryptography with this comprehensive 58-minute conference talk from Bloomcon 2017. Explore the fundamentals of symmetric and asymmetric cryptography, covering topics such as transposition ciphers, stream ciphers, initialization vectors, and block ciphers. Learn about the differences between ECB and CBC modes, and understand the importance of strong cryptography. Discover the intricacies of asymmetric hashes, password hashing, and storage techniques. Examine pseudorandom number generators and their potential vulnerabilities. Gain insights into the significance of cryptography in everyday digital security and understand why it should matter to you.
Syllabus
Intro
Who am I
Who deals with crypto
Symmetric cryptography
Strong cryptography
Symmetrical cryptography
transposition ciphers
sort
stream ciphers
initialization vectors
block ciphers
ECB vs CBC
Huxleys Penguin
symmetric crypto
asymmetric crypto
browser dues
asymmetric hashes
password hashing
password storage
Pseudorandom number generators
How do they fail
Backdoor
Why you should care