Cryptography

Quantum Computing Security

How Dangerous are Quantum Computers?

A discussion of the potential benefits and dangers of quantum computing, security implications, and post-quantum cryptography.

Read More
Interesting Security

How did the Enigma Machine work?

This video uses 3D animation to go inside the legendary Enigma Machine, which encrypted German military secrets during World War II. Time stamps: 1:01-Encryption 2:42-Engima Machine 4:23-Simple Circuit Example 5:23-Inside the Machine 6:15-Rotors 8:51-Plugboard 10:08-Keyboard Mechanism 12:14-The Circuit 13:15-Circuit Recap 14:38-Rotor Mechanism 17:06-Machine Settings 18:14-Brilliant

Read More
AWS Security

AWS Cryptographic Computing

AWS Cryptography tools and services utilize a wide range of encryption and storage technologies that can help customers protect their data at rest and in transit. To address this need, AWS is developing new techniques for cryptographic computing, an emerging technology that allows computations to be performed on encrypted data, so that sensitive data is […]

Read More
Security

7 Cryptography Concepts EVERY Developer Should Know

Cryptography does not have to be scary. In this tutorial, get a hands-on look with Node.js to learn how common crypto concepts work, like hashing, encryption, signing, and more Time stamps: 00:00 What is Cryptography 00:52 Brief History of Cryptography 01:41 1. Hash 04:07 2. Salt 05:47 3. HMAC 06:35 4. Symmetric Encryption. 08:19 5. […]

Read More
Cryptocurrency Quantum Computing

Will Quantum Computers Break Bitcoin?

With its ability to run through prime number factorization in a heartbeat, will Quantum Computers Break Bitcoin? Content index: 00:00:00 INTRO 00:01:21 Introduction to quantum computers 00:01:56 The history of quantum computers 00:02:50 How does quantum mechanics apply to quantum computers? 00:03:36 Superpositioning? 00:04:06 What is so interesting about quantum computing? 00:05:27 Entanglement? 00:05:45 Quantum […]

Read More
Quantum Computing Security

What is Quantum Cryptography?

In this video, Sabine Hossenfelder explains how public key cryptography works on the internet today, using RSA as example, what the risk is that quantum computers pose for internet security, what post-quantum cryptography is, how quantum key distribution works, and what quantum cryptography is. Video contents: 0:00 Intro 0:31 Public Key Cryptography 2:43 Risk posed […]

Read More
Quantum Computing

Quantum Computing: Untangling the Hype

Quantum technology has the potential to revolutionize whole fields of computing; from cryptography to molecular modelling. But how do quantum computers work? Subscribe for regular science videos: http://bit.ly/RiSubscRibe Join leading experts to untangle the quantum computing hype, at this event supported by the Embassy of the Kingdom of the Netherlands.

Read More
Cryptocurrency Quantum Computing

Will Quantum Computers Break Cryptography and CryptoCurrencies?

With Google just accidentally announcing “Quantum Supremacy”,  Naomi Brockwell chats with a quantum computing expert Eric Dennis about Google’s “Quantum Supremacy”. What does this mean for cryptocurrency? Could the cryptography of cryptocurrency be broken?

Read More
Home Automation Mathematics Security

The Mathematics of Cryptography

We use cryptography all the time, but do we really understand the mathematical underpinnings? Here’s a great primer on the topic.

Read More