Cryptography: Crash Course Computer Science
Today we’re going to talk about how to keep information secret, and this isn’t a new goal. From as early as Julius Caesar’s Caesar cipher to Mary, Queen of Scots, encrypted messages to kill Queen Elizabeth in 1587, theres has long been a need to encrypt and decrypt private correspondence. This proved especially critical during World War II as Allan Turing and his team at Bletchley Park attempted to decrypt messages from Nazi Enigma machines, and this need has only grown as more and more information sensitive tasks are completed on our computers. So today, we’re going to walk you through some common encryption techniques such as the Advanced Encryption Standard (AES), Diffie-Hellman Key Exchange, and RSA which are employed to keep your information safe, private, and secure.
Tags
Comments
Leave a Comment
Comments are loading... If you don't see any, be the first to comment!
Related Videos

Crash Course Computer Science | Cryptography: Crash Course Computer Science #33 | PBS
Owner - Crash Course Computer Science - Powered By PBS
Representing Numbers and Letters with Binary: Crash Course Computer Science
Crash Course Computer Science

Crash Course Computer Science | Cybersecurity: Crash Course Computer Science #31 | PBS
Owner - Crash Course Computer Science - Powered By PBS
What You Need to Know About the Delta Variant
SciShow
Cybersecurity: Crash Course Computer Science
Crash Course Computer Science
What is Urban Planning? Crash Course Geography
Crash Course Geography
Files & File Systems: Crash Course Computer Science
Crash Course Computer Science
Sampling Methods and Bias with Surveys - Crash Course Statistics
Crash Course Statistics
You Know I’m All About that Bayes - Crash Course Statistics
Crash Course Statistics
Where Is The Center of The Universe?
PBS Space Time
