Cryptography in Context | S. Dirk Anderson
This session will delve into a brief history of cryptography from early ciphers, through the introduction of computation, culminating in modern asymmetric encryption techniques. The focus will be on understanding how cryptography developed over time driven by (or in many cases driving) technology, to arrive where it is now and how blockchain technology is a natural progression. This session is intended for beginners and/or non-computer professionals. During the session Dirk willl help you to work through how cryptography works conceptually, not entirely without math, but concentrating more on how the math is applied (while allowing computers to do the heavy lifting for us). A computer, tablet, or phone with web access will be needed to access the tools that will be used to demonstrate and play with some of the cryptographic techniques discussed.
You will learn how cryptography developed, how cryptographic keys work, the difference between symmetric and asymmetric encryption, what elliptic curve cryptography means, how to use hashes, and how it all goes together in the blockchain world.
====
Dirk is an information security professional who has always been a cryptography geek. After over 20 years of traditional infosec, he recently made the leap (headfirst) into the blockchain and cryptocurrency world. Dirk is currently the head of Cyber Risk and Applied Cryptography for Salt Blockchain Technologies where he is excited to finally play with crypto every day. Dirk’s previous roles include Vice President of Enterprise Risk & Compliance at Coalfire, Managing Principal at Leviathan Security, and Chief Security Architect for ConQwest (now Towerwall). He writes (occasionally) and speaks (as often as people will let him) on security and crypto related topics.
Follow the CryptoCurrency Certification Consortium (C4) at:
https://cryptoconsortium.org/
https://twitter.com/LearnMoreWithC4
Follow the Blockchain Training Conference at:
https://blockchaintraining.org
Downloadable slides for this presentation can be found here: https://static.sched.com/hosted_files/btc2019/74/BTC2019_Crypto_in_Context_Final.pdf
Видео Cryptography in Context | S. Dirk Anderson канала CryptoCurrency Certification Consortium
You will learn how cryptography developed, how cryptographic keys work, the difference between symmetric and asymmetric encryption, what elliptic curve cryptography means, how to use hashes, and how it all goes together in the blockchain world.
====
Dirk is an information security professional who has always been a cryptography geek. After over 20 years of traditional infosec, he recently made the leap (headfirst) into the blockchain and cryptocurrency world. Dirk is currently the head of Cyber Risk and Applied Cryptography for Salt Blockchain Technologies where he is excited to finally play with crypto every day. Dirk’s previous roles include Vice President of Enterprise Risk & Compliance at Coalfire, Managing Principal at Leviathan Security, and Chief Security Architect for ConQwest (now Towerwall). He writes (occasionally) and speaks (as often as people will let him) on security and crypto related topics.
Follow the CryptoCurrency Certification Consortium (C4) at:
https://cryptoconsortium.org/
https://twitter.com/LearnMoreWithC4
Follow the Blockchain Training Conference at:
https://blockchaintraining.org
Downloadable slides for this presentation can be found here: https://static.sched.com/hosted_files/btc2019/74/BTC2019_Crypto_in_Context_Final.pdf
Видео Cryptography in Context | S. Dirk Anderson канала CryptoCurrency Certification Consortium
Показать
Комментарии отсутствуют
Информация о видео
13 января 2020 г. 19:45:00
01:45:34
Другие видео канала
![The Baseline Show :: Zero Knowledge Proofs w/ C4 :: Part 2](https://i.ytimg.com/vi/4kMGp-3rBOw/default.jpg)
![Scary Crypto Scams - CryptoCurrency Essentials Committee](https://i.ytimg.com/vi/GsCh52ckwNI/default.jpg)
![Being Your Own Bank - CBP Livestream](https://i.ytimg.com/vi/G9caG9FHxHw/default.jpg)
![CBP Exam Study Session and Committee Updates](https://i.ytimg.com/vi/1KHR-BJjK_w/default.jpg)
![Law & Regulatory Issues in Crypto | Veronica McGregor](https://i.ytimg.com/vi/J9EZVhJvMXo/default.jpg)
![Ethereum Client Diversity - Livestream](https://i.ytimg.com/vi/9t7zrqXv3HY/default.jpg)
![Earn Your Certified Bitcoin Professional Today](https://i.ytimg.com/vi/ZU0vgEJ_KQk/default.jpg)
![Scams Ahoy! | Anil Patel](https://i.ytimg.com/vi/dVgTBf7S9EA/default.jpg)
![Cryptocurrency Wallets 101](https://i.ytimg.com/vi/Z2XCVE_Qf20/default.jpg)
![CryptoCurrency Security Standard Explained](https://i.ytimg.com/vi/XSWPBQUtRQA/default.jpg)
![Countdown to Scarcity: The Bitcoin Halving](https://i.ytimg.com/vi/4JyNUxQsEBU/default.jpg)
![Bitcoin Mythbusters Part 2](https://i.ytimg.com/vi/_EiRhrDh9hc/default.jpg)
![EthDenver 2022 Follow-Up](https://i.ytimg.com/vi/_RQUyNEJyJo/default.jpg)
![What Makes Ethereum So Special?](https://i.ytimg.com/vi/8jfv0MVM-VU/default.jpg)
![Seedphrase Security: Safeguarding Your Crypto](https://i.ytimg.com/vi/xTl3xnmnmoo/default.jpg)
![Decentralizing Decentralization | Victoria Li](https://i.ytimg.com/vi/4IZB5tL7Pd8/default.jpg)
![Learn ETH slang with the Certified Ethereum Professional Committee!](https://i.ytimg.com/vi/ys6dWoYvDQk/default.jpg)
![How to Set Up a Cryptocurrency Wallet](https://i.ytimg.com/vi/rFjw9vsx2e4/default.jpg)
![Blockchain Education](https://i.ytimg.com/vi/-QDIcMn-VL4/default.jpg)
![Visualizing Proof of Work Algorithms with Microprocessors | Josh McIntyre](https://i.ytimg.com/vi/sdUuL4gVH1w/default.jpg)
![TERRIFYING HACKS and How They Could Have Been Prevented - CCSS Livestream](https://i.ytimg.com/vi/w0vnmHSXxDU/default.jpg)