Crash Course Computer Science #33 Cryptography Q & A-Key

Crash Course Computer Science #33 Cryptography Q & A-Key
Crash Course Computer Science #33 Cryptography Q & A-Key
Crash Course Computer Science #33 Cryptography Q & A-Key
Crash Course Computer Science #33 Cryptography Q & A-Key
Crash Course Computer Science #33 Cryptography Q & A-Key
Crash Course Computer Science #33 Cryptography Q & A-Key
Resource Type
Product Rating
File Type

PDF (Acrobat) Document File

Be sure that you have an application to open this file type before downloading and/or purchasing.

282 KB|2 pages
Share
Product Description
Host Carrie Anne Philbin

Today we’re going to talk about how to keep information secret, and this isn’t a new goal. From as early as Julius Caesar’s Caesar cipher to Mary, Queen of Scots, encrypted messages to kill Queen Elizabeth in 1587, theres has long been a need to encrypt and decrypt private correspondence. This proved especially critical during World War II as Allan Turing and his team at Bletchley Park attempted to decrypt messages from Nazi Enigma machines, and this need has only grown as more and more information sensitive tasks are completed on our computers. So today, we’re going to walk you through some common encryption techniques such as the Advanced Encryption Standard (AES), Diffie-Hellman Key Exchange, and RSA which are employed to keep your information safe, private, and secure.

Note: In October of 2017, researchers released a viable hack against WPA2, known as KRACK Attack, which uses AES to ensure secure communication between computers and network routers. The problem isn't with AES, which is provably secure, but with the communication protocol between router and computer. In order to set up secure communication, the computer and router have to agree through what's called a "handshake". If this handshake is interrupted in just the right way, an attacker can cause the handshake to fault to an insecure state and reveal critical information which makes the connection insecure. As is often the case with these situations, the problem is with an implementation, not the secure algorithm itself. Our friends over at Computerphile have a great video on the topic: https://www.youtube.com/watch?v=mYtvj...

(Crash course Synopsis 12:32)



Fill in the blank questions with answer key
In-Class & Flipped Classroom Assignment
Total Pages
2 pages
Answer Key
Included
Teaching Duration
N/A
Report this Resource
Loading...
$3.00
Digital Download
More products from Video Notes and More
Product Thumbnail
$0.00
Product Thumbnail
$0.00
Product Thumbnail
$0.00
Product Thumbnail
$0.00
Product Thumbnail
$0.00
$3.00
Digital Download
Teachers Pay Teachers

Teachers Pay Teachers is an online marketplace where teachers buy and sell original educational materials.

Learn More

Keep in Touch!

Sign up