Главная
Study mode:
on
1
Introduction
2
What are Prime Numbers
3
What are Encryption Functions
4
Symmetric Encryption
5
Asymmetric Encryption
6
RSA History
7
RSA Implementation
8
Selecting the Value
9
Creating the Private Key
10
Encryption
11
Encryption Decryption
12
Can RSA be broken
13
Prime factorization
Description:
Explore the critical role of prime numbers in internet security through this 29-minute conference talk. Delve into the inner workings of encryption, covering both symmetric and asymmetric methods, and discover why prime numbers are so challenging to crack. Learn to encrypt and decrypt data using only the Ruby standard library, demystifying HTTPS through code, color theory, and minimal mathematics. Gain insights into topics such as RSA history, implementation, key creation, encryption/decryption processes, and the potential vulnerabilities of RSA. Presented by Sun-Li Beatteay, a software engineer at DigitalOcean, this talk offers a comprehensive look at how prime numbers keep our online data secure.

How Prime Numbers Keep the Internet Secure

Ruby Central
Add to list
0:00 / 0:00