Home
Search results “Cryptographic protocol theory of knowledge”
Zero Knowledge Proofs - Computerphile
 
09:39
How do you prove something without giving away all your data? Zero Knowledge Proofs could hold the answer. Alberto Sonnino, Research Student at UCL explains. EXTRA BITS: https://youtu.be/RK_pNQ3QCKA Computing Limits: https://youtu.be/jv2H9fp9dT8 UCL Link: http://bit.ly/C_UCL-people https://www.facebook.com/computerphile https://twitter.com/computer_phile This video was filmed and edited by Sean Riley. Computer Science at the University of Nottingham: https://bit.ly/nottscomputer Computerphile is a sister project to Brady Haran's Numberphile. More at http://www.bradyharan.com
Views: 111396 Computerphile
The Cryptographic Protocol - what are the techniques of cryptography?
 
03:31
Want to learn more about Cryptocurrency and the Cryptographic Protocols? Watch the video below to see how simple & effective, Bitcoin trading can really be https://goo.gl/q8kdDV .... A protocol is a set of rules. It describes the proper protocol for certain actions and behaviors. David Johnston, the Governor General of Canada, broke protocol when he touched Queen Elizabeth II on the steps of Canada House on Trafalgar Square in London. The Queen was 91 years old at the time and the Governor General touched her arm to protect her from falling on the steps. It is protocol to not touch a member of Britain’s royal family. methods. Specific topics include: 1. Overview of communications channels used in power systems. 2. Review of cryptographic protocols and how they work. 3. How cryptography can impact monitoring, control, and protection communications. 4. Differences between substation communications systems and corporate The confidentiality and integrity protections offered by cryptographic protocols such as SSL/TLS can protect communications from malicious eavesdropping and tampering. Authenticity protections provide assurance that users are actually communicating with the systems as intended. For example, are you sending your Often cryptographic algorithms and protocols are necessary to keep a system secure, particularly when communicating through an untrusted network such as the Internet. Where possible, use cryptographic techniques to authenticate information and keep the information private (but don't assume that simple encryption SUMMARY. This project will focus on research in cryptology at an advanced international level. Project topics will be analysis and construction of symmetric and asymmetric cryptographic algorithms and protocols. In particular we will use our knowledge involving deep techniques from coding theory on cryptological. What is a cryptographic protocol? A cryptographic protocol is a protocol executed by several distant agents through a network where the messages or part of the messages are produced using cryptographic functions (encryption, hashing, etc.). Cryptographic protocols are used for various purpose between the agents:. May 7, 2006 - This is regarded as offensive because of the malicious payload normally embedded in the virus, and because of the use of anti-anti-virus techniques For instance, on networks some layer 2 protocols are based on crypto (WEP, WPA/TKIP, and others), as are some upper layer protocols (IPSec, SSH, SSL, primitives such as commutative encryption. We give a list of some relevant al- gebraic properties of cryptographic operators, and for each of them, we provide examples of protocols or attacks using these properties. We also give an overview of the existing methods in formal approaches for analyzing cryptographic proto-. Using cryptographic techniques, it may be possible to allow intermediate results in a distributed algorithm to be certified independently of who provides them, reducing themes of complexity theory, e.g., interactive provability, average vs. worst-case complexity, and the inherent communication costs of multiparty protocols. Web is an electronic protocol which allows people to communicate mail, information, and commerce through a digital medium. This new method of information exchange has caused a tremendous need for information security. A thorough understanding of cryptography and encryption will help people develop better ways to etc. The analysis techniques discussed in this survey assume per- fect cryptography. This means that cryptographic primitives are considered as black boxes satisfying certain properties, as described in section 2.1. below. This assumption by it- self does not ensure security of the protocols. Even if all cryptographic primitives The Cryptographic Protocol what are the techniques of cryptography types of cryptographic algorithms cryptography methods types of cryptography cryptography examples cryptography algorithms applications of cryptography cryptography basics cryptography computer science #TheCryptographicProtocolwhatarethetechniquesofcryptography #typesofcryptographicalgorithms #cryptographymethods #typesofcryptography #cryptographyexamples #cryptographyalgorithms #applicationsofcryptography #cryptographybasics #cryptographycomputerscience Visit our YouTube channel for more videos on Bitcoin and Cryptocurrency https://www.youtube.com/channel/UCTxqXgVxEGQUIFY_MdRz5ww Also watch: https://www.youtube.com/watch?v=kH6u_CsQddE https://www.youtube.com/watch?v=W4LlCYVP65A This presentation contains images that were used under a Creative Commons License. Click here to see the full list of images and attributions: https://app.contentsamurai.com/cc/107949
Views: 201 BitCoin XTreme
Garbled Circuit Protocol - Applied Cryptography
 
01:30
This video is part of an online course, Applied Cryptography. Check out the course here: https://www.udacity.com/course/cs387.
Views: 4100 Udacity
Side Channel Analysis of Cryptographic Implementations
 
48:21
Cryptography and Network Security by Prof. D. Mukhopadhyay, Department of Computer Science and Engineering, IIT Kharagpur. For more details on NPTEL visit http://nptel.iitm.ac.in
Views: 5774 nptelhrd
Encrypted Key Exchange - Applied Cryptography
 
02:55
This video is part of an online course, Applied Cryptography. Check out the course here: https://www.udacity.com/course/cs387.
Views: 3476 Udacity
The Fragility of Adversary Definitions in Cryptographic Protocols
 
01:17:40
Dr. Virgil Gligor, Professor of Electrical and Computer Engineering, Carnegie Mellon and Cylab, presents "On the Fragiliity of Adversary Definitions in Cryptographic Protocols" on November 6, 2008. Note: Original video was 320x240.
Views: 326 Rutgers University
Sigma Protocols and Zero  Knowledge
 
01:24:46
Winter School on Secure Computation and Efficiency. Sigma Protocols and Zero- Knowledge. Prof. Yehuda Lindell Department of Computer Science. Bar-Ilan University. Bar-Ilan: http://www1.biu.ac.il/indexE.php Why Bar-Ilan: http://www1.biu.ac.il/indexE.php?id=6382&pt=1&pid=30&level=2&cPath=6382 Department of Computer Science: http://www.cs.biu.ac.il/
Views: 4722 barilanuniversity
Cryptography Notation (number theory)
 
14:16
Notation (number theory) To get certificate subscribe: https://www.coursera.org/learn/crypto ======================== Playlist URL: https://www.youtube.com/playlist?list=PL2jykFOD1AWYosqucluZghEVjUkopdD1e ======================== About this course: Cryptography is an indispensable tool for protecting information in computer systems. In this course you will learn the inner workings of cryptographic systems and how to correctly use them in real-world applications. The course begins with a detailed discussion of how two parties who have a shared secret key can communicate securely when a powerful adversary eavesdrops and tampers with traffic. We will examine many deployed protocols and analyze mistakes in existing systems. The second half of the course discusses public-key techniques that let two parties generate a shared secret key.
Views: 1252 intrigano
The Simplest Oblivious Transfer Protocol
 
16:59
Claudio Orlandi, Aarhus University Securing Computation http://simons.berkeley.edu/talks/claudio-orlandi-2015-06-10
Views: 3158 Simons Institute
Cryptography Fermat and Euler (number theory)
 
18:05
Fermat and Euler To get certificate subscribe: https://www.coursera.org/learn/crypto ======================== Playlist URL: https://www.youtube.com/playlist?list=PL2jykFOD1AWYosqucluZghEVjUkopdD1e ======================== About this course: Cryptography is an indispensable tool for protecting information in computer systems. In this course you will learn the inner workings of cryptographic systems and how to correctly use them in real-world applications. The course begins with a detailed discussion of how two parties who have a shared secret key can communicate securely when a powerful adversary eavesdrops and tampers with traffic. We will examine many deployed protocols and analyze mistakes in existing systems. The second half of the course discusses public-key techniques that let two parties generate a shared secret key.
Views: 589 intrigano
Quantum Cryptography: From Theory to Practice
 
34:51
Eleni Diamanti, CNRS - Télécom ParisTech Quantum Games and Protocols http://simons.berkeley.edu/talks/eleni-diamanti-2014-02-28
Views: 1414 Simons Institute
Oblivious Transfer - Applied Cryptography
 
02:32
This video is part of an online course, Applied Cryptography. Check out the course here: https://www.udacity.com/course/cs387.
Views: 3879 Udacity
[Hindi] What is Cryptography ? | Kya hai cryptography ? | Explained in simple words
 
05:14
Hello Dosto Aaj hum baat karenge cryptography ke bare me ki ye kya hota hai aur iska itemaal kaise aur kaha hota hai. iska sambandh kisi bhi data ya message ko safely pohchane se hota hai aur uski security badhayi jati hai taaki bich me koi an-adhikarik tarike se usko access na kar paye. aasha karta hoo apko ye video pasand ayegi agar aapko ye video achhi lage to isse like kare aur apne dosto ke sath share kare aur abhi tak aapne mera channel subscribe nahi kia hai to jarur is channel ko subscribe kare. Subscribe to my channel for more videos like this and to support my efforts. Thanks and Love #TechnicalSagar LIKE | COMMENT | SHARE | SUBSCRIBE ---------------------------------------------------------------------------------- For all updates : SUBSCRIBE Us on Technical Sagar : www.youtube.com/technicalsagarindia LIKE us on Facebook https://www.facebook.com/technicalsagarindia Follow us on Twitter : http://www.twitter.com/iamasagar
Views: 88802 Technical Sagar
Lecture 8: Advanced Encryption Standard (AES) by Christof Paar
 
01:33:19
For slides, a problem set and more on learning cryptography, visit www.crypto-textbook.com. The AES book chapter for this video is also available at the web site (click Sample Chapter).
Constructive cryptography and information theory
 
47:47
Ueli Maurer, ETH Zurich Annual Workshop & Feder Family Award Ceremony Advanced Communications Center Tel Aviv University 22/2/16
Views: 582 TAUVOD
Multi-Party Computation: From Theory to Practice
 
54:29
Google Tech Talk 1/8/13 Presented by Nigel P. Smart ABSTRACT Multi-Party Computation (MPC) allows, in theory, a set of parties to compute any function on their secret input without revealing anything bar the output of the function. For many years this has been a restricted to a theoretical tool in cryptography. However, in the past five years amazing strides have been made in turning theory into practice. In this talk I will present the latest, practical, protocol called SPDZ (Speedz), which achieves much of its performance advantage from the use of Fully Homomorphic Encryption as a sub-procedure. No prior knowledge of MPC will be assumed. Speaker Info University of Bristol, U.K.
Views: 9213 GoogleTechTalks
IGCSE Computer Science Tutorial: 1.4 (c) – Security Protocols
 
05:59
Candidates should be able to: • Show understanding of the use of security protocols: SSL and TLS.
Views: 4693 Liam McQuay
6.875 (Cryptography) L11: Learning with Errors
 
01:17:28
MIT's Spring 2018 Cryptography & Cryptanalysis Class (6.875) Prof. Vinod Vaikuntanathan Learning with Errors, Public Key Encryption
Views: 231 Andrew Xia
Public Key Cryptography: RSA Encryption Algorithm
 
16:31
RSA Public Key Encryption Algorithm (cryptography). How & why it works. Introduces Euler's Theorem, Euler's Phi function, prime factorization, modular exponentiation & time complexity. Link to factoring graph: http://www.khanacademy.org/labs/explorations/time-complexity
Views: 544985 Art of the Problem
NETWORK SECURITY - FEISTEL STRUCTURE
 
12:22
FEISTEL STRUCTURE Most of the block ciphers follows the Feistel Structure. Plain text is processed in terms of blocks Plain text is divided into two equal halves Plain text is processed in number of rounds Sub Keys are generated for each round.
RSA Algorithm in Cryptography and Network security in Hindi.
 
11:57
Please Fill the form - https://docs.google.com/forms/d/1kOxvqvz1IvBMHJ3UeLecLDuK7ePKjHAvHaRcxduHKEE/edit ====================================================== Answer of your Questions Asked to me. (direct Link given below) Blogger Link - http://shalik-htd.blogspot.com/ ====================================================== Hey, friends, I upload the videos in this channel in Hindi for Engineering student of UPTU and other universities for computer science and IT (information technology) students. like share and subscribe my channel ====================================================== Install C Programming Solution Android app - https://play.google.com/store/apps/details?id=com.shalik.patel.cprogrammingsolution ====================================================== ====================================================== My Career Planning android app - https://play.google.com/store/apps/details?id=guide.mycareer.com.rec.mycareer ====================================================== ====================================================== My Android App for my College Library (An Official App Of College Library) - https://play.google.com/store/apps/details?id=jrv.library.rec.reclibrary ====================================================== How to use android application - https://www.youtube.com/watch?v=1hMZCvl-JxM ====================================================== Contact me on Facebook - https://www.facebook.com/HTD-hub-250593705388294/?ref=br_rs ====================================================== Follow me on twitter - https://twitter.com/PatelShalik ======================================================
Rotem Arnon-Friedman: Entropy accumulation in device-independent protocols
 
57:13
"Proving security of device-independent (DI) cryptographic protocols has been regarded a complex and tedious task. The main difficulty consists in analysing how the eavesdropper's uncertainty ``accumulates'' through many repetitions of a basic test, or ``entropy-generating'' block, on which the protocol is based. Previous satisfactory quantitative bounds were restricted to the case where the repetitions are independent, a strong and often unwarranted assumption. Our main contribution is a general information-theoretic result, the ``entropy accumulation theorem'', which shows that entropy accumulation occurs in quite general settings in which there is no independence assumption. Our theorem is relevant for applications: we give simple and modular security proofs for DI randomness generation and quantum key distribution. For both tasks we establish essentially optimal key rates and noise tolerance. As loophole-free Bell tests are finally being realised, our results considerably decrease the gap between theory and experiments, thereby marking an important step towards practical DI protocols and their implementation."
Views: 462 Microsoft Research
Lecture 23: Symmetric Key Establishment and Kerberos by Christof Paar
 
54:09
For slides, a problem set and more on learning cryptography, visit www.crypto-textbook.com
2016 - Ignat Korchagin - Enforcing Web security and privacy with zero-knowledge protocols
 
35:57
Zero-knowledge proofs are effective cryptographic primitives which may provide additional properties and guarantees to security systems and communication protocols. However, they are still being underused in modern world. Unfortunately, even with today’s strong cryptography solutions and increased user security awareness information leaks still happen. As the data on the Web becomes more valuable, attackers develop more sophisticated attacks often involving more than just technical assets, but also other techniques like social engineering. The talk presents possible ways of using zero-knowledge proofs to improve authentication and phishing prevention on the Web taking novel implementation of well known technique (socialist millionaires’ protocol) as an example. Also a comparison of socialist millionaires’ protocol vs PAKE protocol is provided.
Views: 243 BSides Manchester
Symmetric Key in Cryptography
 
06:14
Imp for UGC NET and GATE ------------------------------------------------------------------------------------------------- ► Subscribe to me on YouTube-https://www.youtube.com/gatesmashers ► Like Our page on Facebook - https://www.facebook.com/gatesmashers/ ► Link for Computer Networks Playlist- https://www.youtube.com/playlist?list=PLxCzCOWd7aiGFBD2-2joCpWOLUrDLvVV_ ► Link for Operating System Playlist- https://www.youtube.com/playlist?list=PLxCzCOWd7aiGz9donHRrE9I3Mwn6XdP8p ► Link for Database Management System Playlist- https://www.youtube.com/playlist?list=PLxCzCOWd7aiFAN6I8CuViBuCdJgiOkT2Y ► Link for Graph Theory Playlist- https://www.youtube.com/playlist?list=PLxCzCOWd7aiG0M5FqjyoqB20Edk0tyzVt ► Last Minutes Preparation for UGC NET and GATE Playlist- https://www.youtube.com/playlist?list=PLxCzCOWd7aiE4LQMkIhAe9amWX_SPNMiZ For any Query and Suggestions- [email protected] ------------------------------------------------------------------------------------------------- #symmetrickey #cryptography #networks #GATE #UGCNET #PSU
Views: 6156 Gate Smashers
Garbled Circuit Protocol Solution - Applied Cryptography
 
00:40
This video is part of an online course, Applied Cryptography. Check out the course here: https://www.udacity.com/course/cs387.
Views: 673 Udacity
22. Cryptography: Encryption
 
01:24:15
MIT 6.046J Design and Analysis of Algorithms, Spring 2015 View the complete course: http://ocw.mit.edu/6-046JS15 Instructor: Srinivas Devadas In this lecture, Professor Devadas continues with cryptography, introducing encryption methods. License: Creative Commons BY-NC-SA More information at http://ocw.mit.edu/terms More courses at http://ocw.mit.edu
Views: 16334 MIT OpenCourseWare
Crypto Primitives -- The Building Blocks of Modern Cryptography
 
16:00
Substitution, Transposition, Split and Concatenation, and Bitwise operation between two strings -- are the common primitives that combine into assembling the mainstay ciphersystems we use today. It's critical to understand what these primitives are.
Views: 2101 Gideon Samid
quantum cryptography
 
06:15
Introduction to the Quantum Cryptography lab
Views: 4871 Paul Francis
Key Exchange - Applied Cryptography
 
01:42
This video is part of an online course, Applied Cryptography. Check out the course here: https://www.udacity.com/course/cs387.
Views: 1338 Udacity
Cryptography Arithmetic algorithms (number theory)
 
12:35
Arithmetic algorithms To get certificate subscribe: https://www.coursera.org/learn/crypto ======================== Playlist URL: https://www.youtube.com/playlist?list=PL2jykFOD1AWYosqucluZghEVjUkopdD1e ======================== About this course: Cryptography is an indispensable tool for protecting information in computer systems. In this course you will learn the inner workings of cryptographic systems and how to correctly use them in real-world applications. The course begins with a detailed discussion of how two parties who have a shared secret key can communicate securely when a powerful adversary eavesdrops and tampers with traffic. We will examine many deployed protocols and analyze mistakes in existing systems. The second half of the course discusses public-key techniques that let two parties generate a shared secret key.
Views: 186 intrigano
The BB84 Protocol
 
08:06
A short video attempting to explain the Bennett & Brassard quantum cryptography protocol. I've omitted any mention of the particular details of quantum physics that would be involved in actual real-world implementations, such as particle polarization axes, spin, and so forth, instead replacing them with abstract "processes" and freakish mysterious "machines". The physical details (interesting though they are) are not needed to understand the basics of the protocol, and I'm no physicist, so I'd probably mess them up if I tried (assuming I haven't already!). Making these images has increased my affection for Microsoft PowerPoint, and putting them all into a video has hugely exacerbated my hatred for Windows Movie Maker. NOTE: An important missing piece of information: When Alice sends qubits to Bob, she chooses between process A and process B randomly for each qubit. NOTE 2: The following video explains BB84 as well, and gives more detail regarding the physics details: http://www.youtube.com/watch?v=7SMcf1MdOaQ NOTE 3: Here is another very interesting video about quantum cryptography. Any given real-world implementation, despite using the BB84 protocol, is bound to expose weaknesses that can be exploited. For example: http://www.youtube.com/watch?v=T0WnUlF2eAo
Views: 44306 Creature Mann
Cut and Choose - Applied Cryptography
 
03:27
This video is part of an online course, Applied Cryptography. Check out the course here: https://www.udacity.com/course/cs387.
Views: 480 Udacity
Ever wonder how Bitcoin (and other cryptocurrencies) actually work?
 
26:21
Bitcoin explained from the viewpoint of inventing your own cryptocurrency. Videos like these made possible by patreon: https://patreon.com/3blue1brown Protocol Labs: https://protocol.ai/ Interested in contributing? https://protocol.ai/join/ Special thanks to the following patrons: http://3b1b.co/btc-thanks Some people have asked if this channel accepts contributions in cryptocurrency form as an alternative to Patreon. As you might guess, the answer is yes :). Here are the relevant addresses: ETH: 0x88Fd7a2e9e0E616a5610B8BE5d5090DC6Bd55c25 BTC: 1DV4dhXEVhGELmDnRppADyMcyZgGHnCNJ BCH: qrr82t07zzq5uqgek422s8wwf953jj25c53lqctlnw LTC: LNPY2HEWv8igGckwKrYPbh9yD28XH3sm32 Supplement video: https://youtu.be/S9JGmA5_unY Music by Vincent Rubinetti: https://soundcloud.com/vincerubinetti/heartbeat Here are a few other resources I'd recommend: Original Bitcoin paper: https://bitcoin.org/bitcoin.pdf Block explorer: https://blockexplorer.com/ Blog post by Michael Nielsen: https://goo.gl/BW1RV3 (This is particularly good for understanding the details of what transactions look like, which is something this video did not cover) Video by CuriousInventor: https://youtu.be/Lx9zgZCMqXE Video by Anders Brownworth: https://youtu.be/_160oMzblY8 Ethereum white paper: https://goo.gl/XXZddT If you want to contribute translated subtitles or to help review those that have already been made by others and need approval, you can click the gear icon in the video and go to subtitles/cc, then "add subtitles/cc". I really appreciate those who do this, as it helps make the lessons accessible to more people. Music by Vince Rubinetti: https://vincerubinetti.bandcamp.com/album/the-music-of-3blue1brown ------------------ 3blue1brown is a channel about animating math, in all senses of the word animate. And you know the drill with YouTube, if you want to stay posted on new videos, subscribe, and click the bell to receive notifications (if you're into that). If you are new to this channel and want to see more, a good place to start is this playlist: http://3b1b.co/recommended Various social media stuffs: Website: https://www.3blue1brown.com Twitter: https://twitter.com/3Blue1Brown Patreon: https://patreon.com/3blue1brown Facebook: https://www.facebook.com/3blue1brown Reddit: https://www.reddit.com/r/3Blue1Brown
Views: 2369024 3Blue1Brown
Achieving Constant Round Leakage-Resilient Zero-Knowledge
 
14:23
Eleventh IACR Theory of Cryptography Conference TCC 2014 February 24-26, 2014 Omkant Pandey
Views: 114 Calit2ube
Power Crypto is based on some old dogs Math
 
11:02
The most powerful crypto protocols that run today is based on some old math originating with Fermat and then proven by Euler. Coprime - In number theory, two integers a and b are said to be relatively prime, mutually prime, or coprime if the only positive integer that evenly divides both of them is 1 - they have no common positive factors other than 1.
Views: 252 Rod M
How SSL works tutorial - with HTTPS example
 
11:09
How SSL works by leadingcoder. This is a full tutorial how to setup SSL that requires client certificate for reference: http://www.windowsecurity.com/articles/Client-Certificate-Authentication-IIS6.html .
Views: 1379915 tubewar
On the Growth of Cryptography
 
01:37:22
Ronald L. Rivest, Massachusetts Institute of Technology Historical Papers in Cryptography Seminar Series http://simons.berkeley.edu/crypto2015/historical-papers-seminar-series/Ron-Rivest-2015-06-03
Views: 1268 Simons Institute
Cryptography information theoretic security and the one time pad
 
18:34
Cryptography information theoretic security and the one time pad To get certificate subscribe: https://www.coursera.org/learn/crypto Playlist URL: https://www.youtube.com/playlist?list=PL2jykFOD1AWYosqucluZghEVjUkopdD1e About this course: Cryptography is an indispensable tool for protecting information in computer systems. In this course you will learn the inner workings of cryptographic systems and how to correctly use them in real-world applications. The course begins with a detailed discussion of how two parties who have a shared secret key can communicate securely when a powerful adversary eavesdrops and tampers with traffic. We will examine many deployed protocols and analyze mistakes in existing systems. The second half of the course discusses public-key techniques that let two parties generate a shared secret key.
Views: 402 intrigano
Proofs in Cryptography: Lecture 3 Reduction Proofs - What are they?
 
05:27
Proofs in Cryptography Lecture 3 Reduction Proofs - What are they? ALPTEKİN KÜPÇÜ Assistant Professor of Computer Science and Engineering Koç University http://crypto.ku.edu.tr
Views: 2258 KOLT KU
Xin Li - Almost Optimal Non-malleable Extractors and Privacy Amplification Protocols
 
19:30
Xin Li of Johns Hopkins University presents his talk "Almost Optimal Non-malleable Extractors and Privacy Amplification Protocols" at the DIMACS Workshop on Cryptography and its Interactions: Learning Theory, Coding Theory, and Data Structures. http://dimacs.rutgers.edu/Workshops/Interactions/program.html The workshop on was held from Monday, July 11, 2016 Wednesday, July 13, 2016 at the Computing Research & Education Building on Busch Campus of Rutgers University. For more information visit http://dimacs.rutgers.edu
Views: 146 Rutgers University
Cryptography and You: Lanar
 
05:32
Practical Code-making. Name: Lanar
Views: 3652 RaSeInt
2012-02-29 CERIAS - Cryptographic protocols in the era of cloud computing
 
58:41
Recorded: 02/29/2012 CERIAS Security Seminar at Purdue University Cryptographic protocols in the era of cloud computing Nishanth Chandran, Microsoft Research With the advent of cloud computing, our view of cryptographic protocols has changed dramatically. In this talk, I will give an overview of some of the newer challenges that we face in cloud cryptography and outline some of the techniques used to solve these problems. In particular, a few questions that I will address are:1) How can we store sensitive data in the cloud, in an encrypted manner, and yet allow controlled access to certain portions of this data?2) How can we ensure reliability of data across cloud servers that may be connected by only a low-degree communication network, even when some of the servers may become corrupted?3) How can users authenticate themselves to the cloud in a user-friendly way?This talk will assume no prior knowledge of cryptography and is based on works that appear at TCC 2012, ICALP 2010 and STOC 2010. Nishanth Chandran is a post-doctoral researcher in the Cryptography group at Microsoft Research, Redmond. His research interests are in the area of cryptography, security and distributed algorithms. Nishanth has published several papers in top theory and cryptography conferences such as STOC, FOCS, Crypto, Eurocrypt, TCC and so on. He received his PhD in Computer Science from UCLA in 2011, his Masters in Computer Science from UCLA in 2007, and his Bachelors in Computer Science and Engineering from Anna University, India in 2005. Nishanth received the Dissertation Year Fellowship from UCLA and the Chorafas International Award for exceptional achievements in research in 2010. He is also a professional Indian classical violinist. (Visit: www.cerias.purude.edu)
Views: 1255 ceriaspurdue
Asymmetric Key Cryptography  RSA
 
04:54
Asymmetric Key Cryptography RSA Watch more Videos at https://www.tutorialspoint.com/videotutorials/index.htm Lecture By: Mr. Arnab Chakraborty, Tutorials Point India Private Limited