Artwork

Content provided by Debbie Reynolds. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Debbie Reynolds or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://ppacc.player.fm/legal.
Player FM - Podcast App
Go offline with the Player FM app!

The Data Diva E213 - Bill Buchanan and Debbie Reynolds

52:31
 
Share
 

Manage episode 453351868 series 2897113
Content provided by Debbie Reynolds. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Debbie Reynolds or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://ppacc.player.fm/legal.

Send us a text

Debbie Reynolds “The Data Diva” talks to Bill Buchanan, Professor of Applied Cryptography at Edinburgh Napier University (Scotland). Professor Buchanan begins by sharing his career journey, highlighting his transition from electrical engineering to becoming a prominent figure in cryptography and cybersecurity. The conversation covers key topics, including the distinction between symmetric key encryption and public key encryption, where Buchanan explains how these methods are used to secure communications. He also dives into the importance of digital signatures for verifying data authenticity and maintaining data integrity, emphasizing their role in making the internet more trustworthy. The discussion expands into advanced cryptographic techniques like hashing functions, zero-knowledge proofs, and homomorphic encryption, which allow encrypted data to be processed securely without decryption. Buchanan sheds light on the critical challenge of key management in preventing data breaches, especially in cloud environments, and introduces listeners to post-quantum cryptography, which aims to protect against the emerging threat of quantum computers. The episode also touches on artificial intelligence’s influence on cryptography, where AI’s ability to exploit side channels and reverse-engineer code presents new challenges. Buchanan addresses the ongoing debate surrounding government surveillance and backdoors in encryption, warning of the risks associated with weakening encryption standards. He concludes with his vision for the future of data privacy, advocating for a more citizen-focused approach that grants individuals greater control over their data, especially as AI and large tech companies continue to reshape the digital landscape. This episode offers a deep dive into the evolving world of cryptography, data privacy, and the future of security in a rapidly advancing technological era and his hope for Data Privacy in the future.

Support the show

  continue reading

234 episodes

Artwork
iconShare
 
Manage episode 453351868 series 2897113
Content provided by Debbie Reynolds. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Debbie Reynolds or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://ppacc.player.fm/legal.

Send us a text

Debbie Reynolds “The Data Diva” talks to Bill Buchanan, Professor of Applied Cryptography at Edinburgh Napier University (Scotland). Professor Buchanan begins by sharing his career journey, highlighting his transition from electrical engineering to becoming a prominent figure in cryptography and cybersecurity. The conversation covers key topics, including the distinction between symmetric key encryption and public key encryption, where Buchanan explains how these methods are used to secure communications. He also dives into the importance of digital signatures for verifying data authenticity and maintaining data integrity, emphasizing their role in making the internet more trustworthy. The discussion expands into advanced cryptographic techniques like hashing functions, zero-knowledge proofs, and homomorphic encryption, which allow encrypted data to be processed securely without decryption. Buchanan sheds light on the critical challenge of key management in preventing data breaches, especially in cloud environments, and introduces listeners to post-quantum cryptography, which aims to protect against the emerging threat of quantum computers. The episode also touches on artificial intelligence’s influence on cryptography, where AI’s ability to exploit side channels and reverse-engineer code presents new challenges. Buchanan addresses the ongoing debate surrounding government surveillance and backdoors in encryption, warning of the risks associated with weakening encryption standards. He concludes with his vision for the future of data privacy, advocating for a more citizen-focused approach that grants individuals greater control over their data, especially as AI and large tech companies continue to reshape the digital landscape. This episode offers a deep dive into the evolving world of cryptography, data privacy, and the future of security in a rapidly advancing technological era and his hope for Data Privacy in the future.

Support the show

  continue reading

234 episodes

All episodes

×
 
Loading …

Welcome to Player FM!

Player FM is scanning the web for high-quality podcasts for you to enjoy right now. It's the best podcast app and works on Android, iPhone, and the web. Signup to sync subscriptions across devices.

 

Quick Reference Guide

Listen to this show while you explore
Play