Cryptography

Quantum Computing Security

What is Lattice-based cryptography?

This video is from Chalk Talk. Lattices are seemingly simple patterns of dots. But they are the basis for some seriously hard math problems. Created by Kelsey Houston-Edwards (www.kelseyhoustonedwards.com) Sponsored by Wire (www.wire.com)

Read More
Quantum Computing

The Secrets Of Quantum Computing

Join Tech Inquiry as they explore the astonishing breakthroughs that are set to transform the way we process information. From exponentially faster calculations to solving complex problems previously thought impossible, quantum computing holds the key to a technological revolution.

Read More
Developer Security

Generating Pseudo-Random Numbers in C – What You Need to Know

Low Level Learning explains why random numbers in C are not necessarily random. You’ve probably heard of rand( ). You’ve probably even used it in your code. But unfortunately, you’ve probably used it wrong. In this video, I talk about the glibc implementation of a random number generator, rand, why it’s bad, and what other […]

Read More
Quantum Computing Security

Understanding and Explaining Post-Quantum Crypto with Cartoons

Are you an IT security professional, but not a mathematician? This session will explain you how post-quantum cryptography works—with a 100 percent cartoon-based slide show.

Read More
Quantum Computing Security

How Dangerous are Quantum Computers?

A discussion of the potential benefits and dangers of quantum computing, security implications, and post-quantum cryptography.

Read More
Interesting Security

How did the Enigma Machine work?

This video uses 3D animation to go inside the legendary Enigma Machine, which encrypted German military secrets during World War II. Time stamps: 1:01-Encryption 2:42-Engima Machine 4:23-Simple Circuit Example 5:23-Inside the Machine 6:15-Rotors 8:51-Plugboard 10:08-Keyboard Mechanism 12:14-The Circuit 13:15-Circuit Recap 14:38-Rotor Mechanism 17:06-Machine Settings 18:14-Brilliant

Read More
AWS Security

AWS Cryptographic Computing

AWS Cryptography tools and services utilize a wide range of encryption and storage technologies that can help customers protect their data at rest and in transit. To address this need, AWS is developing new techniques for cryptographic computing, an emerging technology that allows computations to be performed on encrypted data, so that sensitive data is […]

Read More
Security

7 Cryptography Concepts EVERY Developer Should Know

Cryptography does not have to be scary. In this tutorial, get a hands-on look with Node.js to learn how common crypto concepts work, like hashing, encryption, signing, and more Time stamps: 00:00 What is Cryptography 00:52 Brief History of Cryptography 01:41 1. Hash 04:07 2. Salt 05:47 3. HMAC 06:35 4. Symmetric Encryption. 08:19 5. […]

Read More
Cryptocurrency Quantum Computing

Will Quantum Computers Break Bitcoin?

With its ability to run through prime number factorization in a heartbeat, will Quantum Computers Break Bitcoin? Content index: 00:00:00 INTRO 00:01:21 Introduction to quantum computers 00:01:56 The history of quantum computers 00:02:50 How does quantum mechanics apply to quantum computers? 00:03:36 Superpositioning? 00:04:06 What is so interesting about quantum computing? 00:05:27 Entanglement? 00:05:45 Quantum […]

Read More