
Asymmetric Encryption with Eli Holderness
RunAs Radio
Decoding Encryption: Symmetric and Asymmetric Methods
This chapter explores the intricacies of encryption, focusing on symmetric and asymmetric techniques, and the significance of shared secrets for secure communication. It highlights the role of public and private keys, discusses key encapsulation, and introduces concepts like RSA and elliptic curve cryptography, along with their vulnerabilities to quantum computing. Additionally, the chapter addresses ongoing efforts in post-quantum cryptography to bolster security against potential quantum threats.
00:00
Transcript
Play full episode
Remember Everything You Learn from Podcasts
Save insights instantly, chat with episodes, and build lasting knowledge - all powered by AI.