
#3 : Encrypting is not encoding
Échec de l'ajout au panier.
Échec de l'ajout à la liste d'envies.
Échec de la suppression de la liste d’envies.
Échec du suivi du balado
Ne plus suivre le balado a échoué
-
Narrateur(s):
-
Auteur(s):
À propos de cet audio
This episode will explain you the major topics about cryptography :
Hiding ≠ Protecting
Steganography conceals a message’s existence (wax tablets, watermarked films).
Coding just changes symbols (Morse, CD error-correction).
Cryptography actually locks the content.
Early & Perfect Ciphers
Caesar shift is weak; a one-time pad is unbreakable but impractical because the key must match the message length.
Kerckhoffs’ rule: everything about a system can be public—only the key must stay secret.
Enigma showed strong design (159 quadrillion settings) yet fell to Turing owing to predictable message parts.
Modern crypto
Symmetric keys are fast but need a safe key swap.
RSA (public/private keys) solves that, enabling HTTPS, digital signatures, and secure web traffic.
Hashes act as digital fingerprints; signing = encrypting a hash with the private key.
Future challenges
2048-bit RSA is safe now, but quantum computers could break it.
Post-quantum and homomorphic encryption aim to keep data secure—even while processed in the cloud.
Bottom line: robust math plus open scrutiny—not secrecy—keeps our digital world safe, but we must adapt as computing power grows.
Hosted by Ausha. See ausha.co/privacy-policy for more information.