Logo

Cryptography: Crash Course Computer Science

By Crash Course Computer ScienceFrom boclips.com
683.9K views
30.8K likes

Today we’re going to talk about how to keep information secret, and this isn’t a new goal. From as early as Julius Caesar’s Caesar cipher to Mary, Queen of Scots, encrypted messages to kill Queen Elizabeth in 1587, theres has long been a need to encrypt and decrypt private correspondence. This proved especially critical during World War II as Allan Turing and his team at Bletchley Park attempted to decrypt messages from Nazi Enigma machines, and this need has only grown as more and more information sensitive tasks are completed on our computers. So today, we’re going to walk you through some common encryption techniques such as the Advanced Encryption Standard (AES), Diffie-Hellman Key Exchange, and RSA which are employed to keep your information safe, private, and secure.

Tags

Explainer
Discovery
Application
Computer Science
Communication and Media Studies
Mathematics
Technology and Engineering
Advanced Secondary

Comments

Leave a Comment

Comments are loading... If you don't see any, be the first to comment!