filmov
tv
Cryptography | Cryptography Use-Cases | Data Security | Encryption | Decryption
![preview_player](https://i.ytimg.com/vi/WINmCbdcY_0/sddefault.jpg)
Показать описание
*Cryptography Use-Cases | Public Key Cryptography | Hash Functions | Symmetric Key Cryptography*
In any network communication topology, sending and receiving data is regular practice. Sending data over network channels are always prone to hacking threats. A plane data sent over network communication channels can be hacked and security of the data can be compromised. So sending data without proper security measures is a potential risk for data security.
Cryptography is a practice to send data over communication channels securely. For secure data data transmission, source data is encrypted using efficient algorithms and encrypted data is sent over communication channels.
In this TechTalk, we will discuss about different cryptography use cases. We will learn about typical transmission topology and how data security can be achieved in typical transmission topology. We will discuss different commonly available algorithms to provide data security and integrity and practical usage of them.
Note - In this tech talk, many times encoding/decoding term is used for encryption/decryption.
#cryptography #datasecurity #encryption #decryption #encoding #decoding #dataprivacy #dataintegrity #publickey
Chapters -
0:00 - Introduction
0:25 - Agenda
0:45 - Typical Data Transmission Topology
1:24 - Cryptographic Security Use-Cases
5:06 - Cryptography Algorithms
8:27 - Public Key Cryptography
9:49 - Public Key Cryptography - Encoding/Decoding workflow
13:25 - Cryptographic Hash Functions
17:10 - Cryptographic Hash Functions Practical Usage - Password Hashing
24:54 - Symmetric Key Cryptography
26:38 - Closing Note
In any network communication topology, sending and receiving data is regular practice. Sending data over network channels are always prone to hacking threats. A plane data sent over network communication channels can be hacked and security of the data can be compromised. So sending data without proper security measures is a potential risk for data security.
Cryptography is a practice to send data over communication channels securely. For secure data data transmission, source data is encrypted using efficient algorithms and encrypted data is sent over communication channels.
In this TechTalk, we will discuss about different cryptography use cases. We will learn about typical transmission topology and how data security can be achieved in typical transmission topology. We will discuss different commonly available algorithms to provide data security and integrity and practical usage of them.
Note - In this tech talk, many times encoding/decoding term is used for encryption/decryption.
#cryptography #datasecurity #encryption #decryption #encoding #decoding #dataprivacy #dataintegrity #publickey
Chapters -
0:00 - Introduction
0:25 - Agenda
0:45 - Typical Data Transmission Topology
1:24 - Cryptographic Security Use-Cases
5:06 - Cryptography Algorithms
8:27 - Public Key Cryptography
9:49 - Public Key Cryptography - Encoding/Decoding workflow
13:25 - Cryptographic Hash Functions
17:10 - Cryptographic Hash Functions Practical Usage - Password Hashing
24:54 - Symmetric Key Cryptography
26:38 - Closing Note