Artwork

Content provided by Jason Edwards and Dr Jason Edwards. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Jason Edwards and Dr Jason Edwards or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://ppacc.player.fm/legal.
Player FM - Podcast App
Go offline with the Player FM app!

Cryptography in Context

31:51
 
Share
 

Manage episode 507410964 series 3641336
Content provided by Jason Edwards and Dr Jason Edwards. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Jason Edwards and Dr Jason Edwards or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://ppacc.player.fm/legal.

Cryptography serves as the scientific bedrock of confidentiality, authenticity, and integrity. Students will explore both symmetric and asymmetric encryption, comparing their respective strengths in performance and distribution. Hashing, digital signatures, and message authentication codes are introduced as complementary tools that secure modern transactions. Case studies highlight the lifecycle of algorithms, from the rise and fall of WEP and SHA-1 to the evolution from SSL to TLS, demonstrating that cryptography must be managed as a living system rather than a static solution.

The discussion also emphasizes pitfalls in implementation. Poor key management, outdated algorithms, and misconfigurations repeatedly undermine mathematically sound systems, showing that cryptography succeeds only when embedded in disciplined practices. The forward-looking dimension of post-quantum cryptography illustrates that even today’s strongest algorithms face eventual decline, requiring proactive planning. Learners finish this week with an appreciation for both the power and impermanence of cryptographic systems, and the responsibility to manage them as part of long-term resilience.
Produced by BareMetalCyber.com

  continue reading

60 episodes

Artwork
iconShare
 
Manage episode 507410964 series 3641336
Content provided by Jason Edwards and Dr Jason Edwards. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Jason Edwards and Dr Jason Edwards or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://ppacc.player.fm/legal.

Cryptography serves as the scientific bedrock of confidentiality, authenticity, and integrity. Students will explore both symmetric and asymmetric encryption, comparing their respective strengths in performance and distribution. Hashing, digital signatures, and message authentication codes are introduced as complementary tools that secure modern transactions. Case studies highlight the lifecycle of algorithms, from the rise and fall of WEP and SHA-1 to the evolution from SSL to TLS, demonstrating that cryptography must be managed as a living system rather than a static solution.

The discussion also emphasizes pitfalls in implementation. Poor key management, outdated algorithms, and misconfigurations repeatedly undermine mathematically sound systems, showing that cryptography succeeds only when embedded in disciplined practices. The forward-looking dimension of post-quantum cryptography illustrates that even today’s strongest algorithms face eventual decline, requiring proactive planning. Learners finish this week with an appreciation for both the power and impermanence of cryptographic systems, and the responsibility to manage them as part of long-term resilience.
Produced by BareMetalCyber.com

  continue reading

60 episodes

All episodes

×
 
Loading …

Welcome to Player FM!

Player FM is scanning the web for high-quality podcasts for you to enjoy right now. It's the best podcast app and works on Android, iPhone, and the web. Signup to sync subscriptions across devices.

 

Quick Reference Guide

Copyright 2025 | Privacy Policy | Terms of Service | | Copyright
Listen to this show while you explore
Play