Key management

Key server (cryptographic)

In computer security, a key server is a computer that receives and then serves existing cryptographic keys to users or other programs. The users' programs can be running on the same network as the key server or on another networked computer. The keys distributed by the key server are almost always provided as part of a cryptographically protected public key certificates containing not only the key but also 'entity' information about the owner of the key. The certificate is usually in a standard format, such as the OpenPGP public key format, the X.509 certificate format, or the PKCS format. Further, the key is almost always a public key for use with an asymmetric key encryption algorithm. (Wikipedia).

Video thumbnail

Cryptographic Hash Functions: Part 1

Cryptographic Hash Functions Applications of Crypto Hash Functions Birthday Problem Secure Hash Algorithm (SHA)

From playlist Network Security

Video thumbnail

Cryptographic Hash Functions: Part 2

Cryptographic Hash Functions Applications of Crypto Hash Functions Birthday Problem Secure Hash Algorithm (SHA)

From playlist Network Security

Video thumbnail

SSH Authentication - Applied Cryptography

This video is part of an online course, Applied Cryptography. Check out the course here: https://www.udacity.com/course/cs387.

From playlist Applied Cryptography

Video thumbnail

Correctness And Security - Applied Cryptography

This video is part of an online course, Applied Cryptography. Check out the course here: https://www.udacity.com/course/cs387.

From playlist Applied Cryptography

Video thumbnail

Cryptography (part 1 of 3)

An informal introduction to cryptography. Part of a larger series teaching programming at http://codeschool.org

From playlist Cryptography

Video thumbnail

Stanford Seminar: Challenges in Secure Messaging

EE380: Computer Systems Colloquium Challenges in Secure Messaging Joseph Bonneau, Stanford University and EFF The post-Snowden era has seen a surge of interest in end-to-end encrypted communications as a technical safeguard against mass surveillance. This talk will survey the modern lan

From playlist Stanford EE380-Colloquium on Computer Systems - Seminar Series

Video thumbnail

How Companies Lie To You About End-to-End Encryption

This is a talk with realguyman, a privacy researcher and a contributor to privacyguides.org. https://github.com/orgs/privacyguides/people#member-realguyman Support independent research and analysis by joining my Patreon page: https://www.patreon.com/thehatedone Timestamps 00:00:00 Intro

From playlist Talks, interview and podcasts

Video thumbnail

Lec 22 | MIT 6.033 Computer System Engineering, Spring 2005

Authentication View the complete course at: http://ocw.mit.edu/6-033S05 License: Creative Commons BY-NC-SA More information at http://ocw.mit.edu/terms More courses at http://ocw.mit.edu

From playlist MIT 6.033 Computer System Engineering, Spring 2005

Video thumbnail

30C3: The Year in Crypto (EN)

For more information and to download the video visit: http://bit.ly/30C3_info Playlist 30C3: http://bit.ly/30c3_pl Speakers: Nadia Heninger | djb | Tanja Lange This was a busy year for crypto. TLS was broken. And then broken again. Discrete logs were computed. And then computed again.

From playlist 30C3

Video thumbnail

CCoE Webinar Series: Stronger Security for Password Authentication

Originally recorded August 28th, 2017 Passwords are an infamous bottleneck of information security: The users choose them badly and then forget them, and the servers store (at best!) a table of password hashes which, in the all-too-common event that the server is hacked, allows the attack

From playlist Center for Applied Cybersecurity Research (CACR)

Video thumbnail

DeepSec 2009: Key Management Death Match? Competing KM Standards Technical Deep Dive

Thanks to the DeepSec organisation for making these videos available and let me share the videos on YouTube. Speaker: Marc Massar Key management is a cornerstone of managing and deploying cryptographic devices. Marc Massar discusses the problems connected to key management and standards

From playlist DeepSec 2009

Video thumbnail

Stanford Webinar - Latest Developments in Cryptography with Dan Boneh

Learn more at https://online.stanford.edu/programs/stanford-advanced-cybersecurity-certificate?utm_source=youtube&utm_medium=social&utm_campaign=webinar In this webinar, you’ll learn the latest on all things “crypto” from Professor Dan Boneh, head of the Stanford’s applied cryptography gr

From playlist Stanford Webinars

Video thumbnail

Secure collaborative learning using the MC^2 platform I Healthcare NLP Summit 2021

Get your Free Spark NLP and Spark OCR Free Trial: https://www.johnsnowlabs.com/spark-nlp-try-free/ Register for NLP Summit 2021: https://www.nlpsummit.org/2021-events/​ Watch all Healthcare NLP Summit 2021 sessions: https://www.nlpsummit.org/​ Multiple organizations often wish to a

From playlist Healthcare NLP Summit 2021

Video thumbnail

ESXiArgs Ransomware Analysis with @fwosar

Join us as we reverse engineer the ESXiArgs ransomware used in wide spread attacks targeting unpatched VMware servers with CVE-2021-21974. Fabian (https://twitter.com/fwosar) joins us to do the heavy lifting! Tutorial that may assist with decrypting files that have been encrypted by E

From playlist Open Analysis Live!

Related pages

Public key certificate | Encryption | OpenPGP | Pretty Good Privacy | PKCS | Web of trust | Computer security | S/MIME | X.509 | Key (cryptography) | Chain of trust | Public key infrastructure