Главная
Study mode:
on
1
Introduction
2
Background
3
True Data
4
HTTPS
5
RSA
6
PGP
7
Live demo
8
Loss of private key
9
Selfheal keys
10
DiffieHellman
11
Rolling forward keys
12
Prekeys
13
Math
14
Authentication
15
Message authentication codes
16
Message sending
17
Recap
Description:
Explore the intricacies of end-to-end encryption in this 40-minute conference talk from Strange Loop. Delve into the inner workings of secure messaging protocols, understanding the threats they defend against and how cryptographic operations are combined to implement these defenses. Learn about forward secrecy, key exchange mechanisms, and methods to ensure secure communication with the intended recipient. Discover the potential applications of end-to-end encryption beyond instant messaging, such as creating secure versions of collaborative tools like Google Docs. Gain insights into topics including HTTPS, RSA, PGP, Diffie-Hellman key exchange, rolling forward keys, prekeys, authentication methods, and message authentication codes through a comprehensive exploration of cryptographic concepts and live demonstrations.

End-to-End Encryption - Behind the Scenes

Strange Loop Conference
Add to list
0:00 / 0:00