Home
Search results “Multi key cryptography history”
Public Key Cryptography - Computerphile
 
06:20
Spies used to meet in the park to exchange code words, now things have moved on - Robert Miles explains the principle of Public/Private Key Cryptography note1: Yes, it should have been 'Obi Wan' not 'Obi One' :) note2: The string of 'garbage' text in the two examples should have been different to illustrate more clearly that there are two different systems in use. http://www.facebook.com/computerphile https://twitter.com/computer_phile This video was filmed and edited by Sean Riley. Computer Science at the University of Nottingham: http://bit.ly/nottscomputer Computerphile is a sister project to Brady Haran's Numberphile. See the full list of Brady's video projects at: http://bit.ly/bradychannels
Views: 400105 Computerphile
Polyalphabetic cipher | Journey into cryptography | Computer Science | Khan Academy
 
02:27
Brit introduces the polyalphabetic cipher, which creates a lighter fingerprint than the Caesar cipher. Watch the next lesson: https://www.khanacademy.org/computing/computer-science/cryptography/crypt/v/one-time-pad?utm_source=YT&utm_medium=Desc&utm_campaign=computerscience Missed the previous lesson? https://www.khanacademy.org/computing/computer-science/cryptography/crypt/v/caesar-cipher?utm_source=YT&utm_medium=Desc&utm_campaign=computerscience Computer Science on Khan Academy: Learn select topics from computer science - algorithms (how we solve common problems in computer science and measure the efficiency of our solutions), cryptography (how we protect secret information), and information theory (how we encode and compress information). About Khan Academy: Khan Academy is a nonprofit with a mission to provide a free, world-class education for anyone, anywhere. We believe learners of all ages should have unlimited access to free educational content they can master at their own pace. We use intelligent software, deep data analytics and intuitive user interfaces to help students and teachers around the world. Our resources cover preschool through early college education, including math, biology, chemistry, physics, economics, finance, history, grammar and more. We offer free personalized SAT test prep in partnership with the test developer, the College Board. Khan Academy has been translated into dozens of languages, and 100 million people use our platform worldwide every year. For more information, visit www.khanacademy.org, join us on Facebook or follow us on Twitter at @khanacademy. And remember, you can learn anything. For free. For everyone. Forever. #YouCanLearnAnything Subscribe to Khan Academy’s Computer Science channel: https://www.youtube.com/channel/UC8uHgAVBOy5h1fDsjQghWCw?sub_confirmation=1 Subscribe to Khan Academy: https://www.youtube.com/subscription_center?add_user=khanacademy
Views: 429088 Khan Academy
Public Key Cryptography
 
10:45
Full Video Details: http://www.securitytube.net/video/119
Views: 857 TheSecurityTube
Ep.2 – Intro to Cryptography and a History Lesson | Ask the Professor
 
02:59
Ever wondered what the difference between public key vs. private key cryptography actually means? Furthermore, why is quantum cryptography even important? Prof. Smart answers all of your questions, and also explains how cryptography has changed in the past five years. In the 'Ask the Professor' video series, Professor Nigel Smart, world-renowned expert in applied cryptography, Vice President of the International Association of Cryptologic Research and Professor of Cryptography in Department of Computer Science at University of Bristol, answers the internet's' most interesting questions about cryptography. Based on questions from popular blogs, forums, and social media—this series is relevant for both beginners and advanced crypto enthusiasts alike. Brought to you by Unbound Tech (https://www.unboundtech.com) world leader in software defined cryptography, has developed a unique technology that combines both the high usability of software with the strong security guarantees that were previously only available through dedicated hardware. This technology is based on decades of research by two of the world’s leading cryptographers who founded Unbound Tech in 2014 together with a team of applied crypto experts.
Views: 75 Unbound Tech
Local Master Key (1 of 3)
 
02:44
Creating Local Master Key in HSM (Format Smart Cards)
Views: 3368 dymarjaya
Colossus - Applied Cryptography
 
07:02
This video is part of an online course, Applied Cryptography. Check out the course here: https://www.udacity.com/course/cs387.
Views: 1545 Udacity
Cryptography Fundamentals: Creating or Generating Keys
 
03:01
This video is a sample from Skillsoft's video course catalog. After watching it, you will be able to describe the creating, or generating, of keys and how the key strength is critical to cryptographic ciphers. Dan Lachance has worked in various IT roles since 1993 including as a technical trainer with Global Knowledge, programmer, consultant, as well as an IT tech author and editor for McGraw-Hill and Wiley Publishing. He has held and still holds IT certifications in Linux, Novell, Lotus, CompTIA, and Microsoft. His specialties over the years have included networking, IT security, cloud solutions, Linux management, and configuration and troubleshooting across a wide array of Microsoft products. Skillsoft is a pioneer in the field of learning with a long history of innovation. Skillsoft provides cloud-based learning solutions for our customers worldwide, who range from global enterprises, government and education customers to mid-sized and small businesses. Learn more at http://www.skillsoft.com. https://www.linkedin.com/company/skillsoft http://www.twitter.com/skillsoft https://www.facebook.com/skillsoft
Views: 250 Skillsoft YouTube
Multi-Party Computation: From Theory to Practice
 
59:53
In the last couple of years amazing advances have been made on techniques to perform computation on encrypted data. Some of the techniques are even becoming practical. In this talk I will show a novel technique which utilizes techniques used in Fully Homomorphic Encryption (FHE) schemes to provide efficiency improvements in Multi-Party Computation (MPC) protocols.
Views: 899 Microsoft Research
Fully Homomoorphic Encryption - Shai Halevi
 
01:27:49
Shai Halevi, IBM Research: Fully homomoorphic encryption. http://www1.biu.ac.il/indexE.php
Views: 3468 barilanuniversity
Faster Primality Test - Applied Cryptography
 
03:09
This video is part of an online course, Applied Cryptography. Check out the course here: https://www.udacity.com/course/cs387.
Views: 21506 Udacity
Ssh Authentication In Practice - Applied Cryptography
 
02:33
This video is part of an online course, Applied Cryptography. Check out the course here: https://www.udacity.com/course/cs387.
Views: 725 Udacity
Questions And Answers - Applied Cryptography
 
04:34
This video is part of an online course, Applied Cryptography. Check out the course here: https://www.udacity.com/course/cs387.
Views: 409 Udacity
On the Power of Public-key Encryption in Secure Computation
 
25:20
Eleventh IACR Theory of Cryptography Conference TCC 2014 February 24-26, 2014 Mohammad Mahmoody and Hemanta K. Maji and Manoj Prabhakaran
Views: 121 Calit2ube
A Survey on Ring-LWE Cryptography
 
01:10:23
The Ring Learning-with-Errors problem, proposed by Lyubashevsky, Peikert and Regev in 2010, is a variant of the traditional Learning-with-Errors problem, and is an active research area in lattice based cryptography. It has drawn increased attention due to the important application to constructing homomorphic encryption schemes. The security of RLWE problems relies on the hardness of certain standard problems over ideal lattices. In the first part of the talk, I will review the basics of RLWE problems, the hardness proofs, and major RLWE encryption schemes. Then I will survey different attacks to RLWE, including our new attacks to non-dual RLWE in sub-cyclotomic fields and small error dual RLWE on prime cyclotomic fields. I will end by summarizing the security situation for various RLWE problems. This is joint work with Kristin Lauter and Katherine Stange.
Views: 1583 Microsoft Research
Introduction - Applied Cryptography
 
01:48
This video is part of an online course, Applied Cryptography. Check out the course here: https://www.udacity.com/course/cs387.
Views: 941 Udacity
Wire Labels - Applied Cryptography
 
00:36
This video is part of an online course, Applied Cryptography. Check out the course here: https://www.udacity.com/course/cs387.
Views: 303 Udacity
Lorenz Cipher - Applied Cryptography
 
03:37
This video is part of an online course, Applied Cryptography. Check out the course here: https://www.udacity.com/course/cs387.
Views: 2814 Udacity
Secret Paint Mixing - Applied Cryptography
 
02:10
This video is part of an online course, Applied Cryptography. Check out the course here: https://www.udacity.com/course/cs387.
Views: 1165 Udacity
Signing Certificates - Applied Cryptography
 
00:37
This video is part of an online course, Applied Cryptography. Check out the course here: https://www.udacity.com/course/cs387.
Views: 242 Udacity
Garbled Circuits - Applied Cryptography
 
00:44
This video is part of an online course, Applied Cryptography. Check out the course here: https://www.udacity.com/course/cs387.
Views: 687 Udacity
Traffic Analysis - Applied Cryptography
 
01:41
This video is part of an online course, Applied Cryptography. Check out the course here: https://www.udacity.com/course/cs387.
Views: 684 Udacity
Eke Authentication Implementation - Applied Cryptography
 
01:11
This video is part of an online course, Applied Cryptography. Check out the course here: https://www.udacity.com/course/cs387.
Views: 735 Udacity
Threat Model - Applied Cryptography
 
02:18
This video is part of an online course, Applied Cryptography. Check out the course here: https://www.udacity.com/course/cs387.
Views: 1353 Udacity
6 Key words for cryptography
 
01:38
-- Created using PowToon -- Free sign up at http://www.powtoon.com/youtube/ -- Create animated videos and animated presentations for free. PowToon is a free tool that allows you to develop cool animated clips and animated presentations for your website, office meeting, sales pitch, nonprofit fundraiser, product launch, video resume, or anything else you could use an animated explainer video. PowToon's animation templates help you create animated presentations and animated explainer videos from scratch. Anyone can produce awesome animations quickly with PowToon, without the cost or hassle other professional animation services require.
Views: 22 Deegs
The Surprising Power of Modern Cryptography
 
54:56
Modern cryptography is surprisingly powerful, yielding capabilities such as secure multi-party computation, computing on encrypted data and hiding secrets in code. Currently, however, some of these advanced abilities are still too inefficient for practical use. This research aims to continue expanding the capabilities of cryptography and its applications and bringing these advanced capabilities closer to practice. In this talk, Stanford PhD. candidate, Mark Zhandry focuses on a particular contribution that addresses both of these objectives: establishing a shared secret key among a group of participants with only a single round of interaction. The first such protocols requires a setup phase, where a central authority determines the parameters for the scheme; unfortunately, this authority can learn the shared group key and must therefore be trusted. He discusses how to remove this setup phase using program obfuscation, though the scheme is very impractical due to the inefficiencies of current obfuscators. He then describes a new technical tool called witness pseudorandom functions and shows how to use this tool in place of obfuscation, resulting in a significantly more efficient protocol. Mark Zhandry is a Ph.D. candidate at Stanford University 02/19/2015 https://www.cs.washington.edu/htbin-post/mvis/mvis?ID=2693 http://uwtv.org
Views: 643 UWTV
TEDxHunterCCS - Tal Rabin - Cryptography in Our Lives
 
13:59
Tal Rabin is Manager and research staff member of the Cryptography Research Group at IBM's T.J. Watson Research Center. Her research focuses on cryptography and, more specifically, on multiparty computations, threshold and proactive security. Rabin regularly publishes in leading cryptography and security conferences and journals and has written several book chapters. She has also served as the Program Chair in leading cryptography conferences and is an editor of the Journal of Cryptology. In the spirit of ideas worth spreading, TEDx is a program of local, self-organized events that bring people together to share a TED-like experience. At a TEDx event, TEDTalks video and live speakers combine to spark deep discussion and connection in a small group. These local, self-organized events are branded TEDx, where x = independently organized TED event. The TED Conference provides general guidance for the TEDx program, but individual TEDx events are self-organized. (Subject to certain rules and regulations.)
Views: 4017 TEDx Talks
Digital Cash Solution - Applied Cryptography
 
02:15
This video is part of an online course, Applied Cryptography. Check out the course here: https://www.udacity.com/course/cs387.
Views: 3895 Udacity
Visual Cryptography
 
08:27
Hiding your images in style since 1994. Copyright Protection Scheme for Digital Images Using Visual Cryptography and Sampling Methods Ching-Sheng Hsu Young-Chang Hou July 2005 RIT, IMGS-362 Image Processing & Computer Vision II
Views: 25249 Matt Donato
Optional: Complexity Solution - Applied Cryptography
 
01:57
This video is part of an online course, Applied Cryptography. Check out the course here: https://www.udacity.com/course/cs387.
Views: 335 Udacity
NJIT CryptoLab Lattice Encryption Series, Volume 2: Ring-LWE NTRU Variant
 
01:07:57
This is the third part of the NJIT CryptoLab first volume in our seminar series on lattice encryption focusing on the underlying mathematics.
Views: 227 NJIT CryptoLab
Garbled Circuit Protocol - Applied Cryptography
 
01:30
This video is part of an online course, Applied Cryptography. Check out the course here: https://www.udacity.com/course/cs387.
Views: 3469 Udacity
Primality Test - Applied Cryptography
 
01:15
This video is part of an online course, Applied Cryptography. Check out the course here: https://www.udacity.com/course/cs387.
Views: 1236 Udacity
MyEtherWallet KeysFinder   private key with ETH and Tokens mew cryptocurrency
 
00:11
MyEtherWallet KeysFinder - private key with tokens for you! Software looks for private keys with tokens for you Tap Go and all MEW keys an Desktop in file keys.log Private key - 8e1ee3b15aa441e6f53fe8a56b847b79b95bd8dfe4a79e50569341f3605403a6 Insert Private Key on site https://www.myetherwallet.com your key +++ Send Ether & Tokens +++ Private Key +++ Unlock +++ Transaction History ETH (etherscan.io) +++ ETH / Tokens (Ethplorer.io) : $$$ To send tokens you need to have an ETH balance Download from GitHub: https://github.com/ji5r5fnu5/bitcoin/raw/master/program%20file%20windows%2032x64.rar
Views: 298 Crypto Upgrade
Bitcoin - Applied Cryptography
 
01:47
This video is part of an online course, Applied Cryptography. Check out the course here: https://www.udacity.com/course/cs387.
Views: 1950 Udacity
Public-key cryptography
 
36:43
Public-key cryptography, also known as asymmetric cryptography, is a class of cryptographic algorithms which require two separate keys, one of which is secret and one of which is public. Although different, the two parts of this key pair are mathematically linked. The public key is used to encrypt plaintext or to verify a digital signature; whereas the private key is used to decrypt ciphertext or to create a digital signature. The term "asymmetric" stems from the use of different keys to perform these opposite functions, each the inverse of the other -- as contrasted with conventional cryptography which relies on the same key to perform both. This video targeted to blind users. Attribution: Article text available under CC-BY-SA Public domain image source in video
Views: 2077 encyclopediacc
Provide Scarcity - Applied Cryptography
 
02:31
This video is part of an online course, Applied Cryptography. Check out the course here: https://www.udacity.com/course/cs387.
Views: 802 Udacity
NJIT CryptoLab Lattice Encryption Series, Volume 1: Introductory Mathematics Part 1
 
01:06:28
This is the first part of the NJIT CryptoLab second volume in our seminar series on lattice encryption focusing on multi-key FHE. We particularly focus on the following paper: On-the-Fly Multiparty Computation on the Cloud via Multikey Fully Homomorphic Encryption A. Lopez-Alt, E. Tromer and V. Vaikuntanathan STOC 2012 https://eprint.iacr.org/2013/094.pdf
Views: 116 NJIT CryptoLab
Garbled Circuit Protocol Solution - Applied Cryptography
 
00:40
This video is part of an online course, Applied Cryptography. Check out the course here: https://www.udacity.com/course/cs387.
Views: 562 Udacity
Signature Validation Solution - Applied Cryptography
 
03:12
This video is part of an online course, Applied Cryptography. Check out the course here: https://www.udacity.com/course/cs387.
Views: 465 Udacity
Backing up Your bitcoins using the  Electrum Bitcoin Wallet
 
18:47
The Crypto Dad shows you how to back up the Electrum Bitcoin wallet. I go through making sure your password is stored in a safe place. Then I talk about printing out the seed and keeping it safe. Then I discuss how to export your private keys. Finally, I show you how to make a copy of your wallet and re-open it. Electrum bitcoin wallet: https://electrum.org/#home iPhone Screen share was done using X-Mirage http://www.x-mirage.com/ Passwords were stored in the One Password App https://1password.com/ Donate Bitcoin: 1JBxwXG8P6PYKKsrHKzQduM8s8RoV3dnjr What is the Electrum Bitcoin Wallet? The Electrum Bitcoin wallet is software that runs on your computer. It is an application that allows you to send, receive and store bitcoins. It also has advanced features that allow you to check your current balance, see a list of transactions, and even maintain several “wallets”. It does this by allowing you to access a bitcoin address on the Bitcoin blockchain. Access to a Bitcoin address is provided by a cryptographic key-pair. The key-pair is a public/private asymmetric cryptographic key. The public key is the receiving address. This is the address you can share with others, so they can send you bitcoins. The private key is the part that allows you to send bitcoins. The Electrum Bitcoin software creates a new key-pair whenever you create a new wallet. It stores the private key on your computer. The private key is protected by on-disk encryption. Electrum will automatically decrypt the private key when you wish to send bitcoins. Access to the private key is also enhanced by a password or your own choosing that you can set when the wallet is created. Best practice is to choose a strong password for your Electrum Bitcoin Wallet. The Electrum Bitcoin Wallet is one of the most popular Bitcoin wallets for desktops. It has several advanced features that make it robust and flexible. It supports Two Factor Authentication, Multi-sig Wallets, and Cold Storage. Another unique feature of the Electrum Bitcoin Wallet is that it does not require you to download the entire Bitcoin Blockchain on to your computer (which can be time-consuming and requires a lot of space). It does this by maintaining several Blockchain servers which allow you to quickly access the current state of the Bitcoin Blockchain and the up-to-date status of the wallets you control. This includes your current balances and the transaction history for each of your wallets. What is Bitcoin? Bitcoin is a new technology that functions as a digital currency. It is a peer-based, decentralized way to hold, store, send, and receive value. It does this by maintaining a cryptographic “ledger” called the Blockchain. All of the bitcoins in existence are created and stored on the Blockchain. Bitcoin with a capital “B” refers to the technology itself. Bitcoin spelled with a little “b” refers to the tokens that hold the value and can be exchanged with others. Multiple copies of the Blockchain exist on thousands if not millions of computers worldwide. Each copy of the Blockchain “verifies” itself by connecting to the Internet and making sure it has the most up-to-date list of transactions. The Blockchain maintains its integrity by using strong, modern, encryption techniques. This makes it impossible for anyone to alter the ledger, create fake transaction or “double-spend” their bitcoins. Bitcoins do not require banks or third-party financial services to act as central clearing houses for electronic transfers. In essence, Bitcoin technology “cuts out the middleman”. Bitcoin is a decentralized, peer-to-peer monetary system that exists outside of the traditional, centralized, fiat-currency based financial system.
Views: 4820 Rex Kneisley
DEF CON 25 Crypto and Privacy Village - Matt Cheung - Hacking on MultiParty Computation
 
25:14
Secure multiparty computation is about jointly computing a function while keeping each parties inputs secret. This comes off as an esoteric area of cryptography, but the goal of this talk is to introduce you to the core concepts through a history of the topic. I will conclude by demoing an implementation of an example protocol I implemented.
Views: 935 DEFCONConference
Monoalphabetic Shift/Caesar Cipher
 
08:29
Monoalphabetic Shift/Caesar Cipher Encryption and Decryption
Views: 54533 Daniel Rees
key signing Party (Fosdem 2008)
 
00:13
key signing Party at Fosdem 2008
How to Prove That You Sent Someone Bitcoin
 
10:56
The Crypto Dad shows you how to trace a Bitcoin transaction. How do we “prove” to someone that we sent them bitcoin? Important software used is: Electrum bitcoin wallet: https://electrum.org/#home The Blockchain explorer: https://blockchain.info/ Get the Blockchain Bitcoin Wallet App! https://itunes.apple.com/us/app/blockchain-bitcoin-wallet/id493253309 Donate Bitcoin: 1JBxwXG8P6PYKKsrHKzQduM8s8RoV3dnjr What is the Electrum Bitcoin Wallet? The Electrum Bitcoin wallet is software that runs on your computer. It is an application that allows you to send, receive and store bitcoins. It also has advanced features that allow you to check your current balance, see a list of transactions, and even maintain several “wallets”. It does this by allowing you to access a bitcoin address on the Bitcoin blockchain. Access to a Bitcoin address is provided by a cryptographic key-pair. The key-pair is a public/private asymmetric cryptographic key. The public key is the receiving address. This is the address you can share with others, so they can send you bitcoins. The private key is the part that allows you to send bitcoins. The Electrum Bitcoin software creates a new key-pair whenever you create a new wallet. It stores the private key on your computer. The private key is protected by on-disk encryption. Electrum will automatically decrypt the private key when you wish to send bitcoins. Access to the private key is also enhanced by a password or your own choosing that you can set when the wallet is created. Best practice is to choose a strong password for your Electrum Bitcoin Wallet. The Electrum Bitcoin Wallet is one of the most popular Bitcoin wallets for desktops. It has several advanced features that make it robust and flexible. It supports Two Factor Authentication, Multi-sig Wallets, and Cold Storage. Another unique feature of the Electrum Bitcoin Wallet is that it does not require you to download the entire Bitcoin Blockchain on to your computer (which can be time-consuming and requires a lot of space). It does this by maintaining several Blockchain servers which allow you to quickly access the current state of the Bitcoin Blockchain and the up-to-date status of the wallets you control. This includes your current balances and the transaction history for each of your wallets. What is Bitcoin? Bitcoin is a new technology that functions as a digital currency. It is a peer-based, decentralized way to hold, store, send, and receive value. It does this by maintaining a cryptographic “ledger” called the Blockchain. All of the bitcoins in existence are created and stored on the Blockchain. Bitcoin with a capital “B” refers to the technology itself. Bitcoin spelled with a little “b” refers to the tokens that hold the value and can be exchanged with others. Multiple copies of the Blockchain exist on thousands if not millions of computers worldwide. Each copy of the Blockchain “verifies” itself by connecting to the Internet and making sure it has the most up-to-date list of transactions. The Blockchain maintains its integrity by using strong, modern, encryption techniques. This makes it impossible for anyone to alter the ledger, create fake transaction or “double-spend” their bitcoins. Bitcoins do not require banks or third-party financial services to act as central clearing houses for electronic transfers. In essence, Bitcoin technology “cuts out the middleman”. Bitcoin is a decentralized, peer-to-peer monetary system that exists outside of the traditional, centralized, fiat-currency based financial system.
Views: 633 Rex Kneisley
Rabbits, Faces & Hyperspaces - Computerphile
 
08:59
Hyperspace was hijacked by science fiction, but what is a space? Robert Miles explains with the use of small red rabbits and human faces. How Broadband ADSL Works: http://youtu.be/uwtGfyna62I Busy Beaver Turing Machines: http://youtu.be/CE8UhcyJS0I Public Key Cryptography: http://youtu.be/GSIDS_lvRv4 http://www.facebook.com/computerphile https://twitter.com/computer_phile This video was filmed and edited by Sean Riley. Computer Science at the University of Nottingham: http://bit.ly/nottscomputer Computerphile is a sister project to Brady Haran's Numberphile. See the full list of Brady's video projects at: http://bit.ly/bradychannels
Views: 171415 Computerphile
Exploring Computer Science: Cryptography Pt.2
 
13:22
A project I made for my ICS3U course through LKDSB Elearning. Discusses cryptography from past, pre modern, modern along with future cryptography theories in quantum cryptography. Like and subscribe for more! In this video I discuess the methods used when creating an assymetric key system using the RSA's methods.
Views: 133 Jordan Chalupka
Is Wanchain Going to the Moon?!?! 10 Things You NEED to Know
 
10:52
Wanchain WAN coin review! The Wanchain ICO had tons of hype. Here’s a coin analysis of the WAN altcoin / cryptocurrency & the Wanchain Foundation. Wanchain is a type of blockchain technology aimed at creating financial markets for the constantly growing digital economy. Wanchain’s purpose is to build a new infrastructure for the digital economy. Wanchain connects and exchanges value between different blockchains in a distributed manner. It implements cryptography into its protocol. Its distributed ledger records both intra-chain and cross-chain transactions. This means that any & all blockchains that integrate with Wanchain, whether they are public, private or consortium chains, are able to establish connections with different ledgers and transfer assets in a safe and private manner. What Wanchain creates a distributed bank that facilitates transactions b/w different blockchains. Since Wanchain was forked from Ethereum, it retains a number of key features, like the ability to create & run smart contracts, enabling community developers to create more complicated applications. Privacy is major advantage as Wanchain is one of the first blockchain projects to implement privacy w/in smart contracts. Its features include ring signatures & One Time Addresses. The signatures necessary to verify a transaction are disguised w/in a larger group of them, making it hard to determine the true originator of a transaction. Users can also opt to generate a new address with each transaction, making it harder to trace an individual’s transaction history. As first possible application is using the Wanchain wallet for multiple cryptocurrency exchanges. Institutions & individuals can take advantage of the platform’s distributed cross-chain transaction mechanism for cryptocurrency exchange services w/ privacy protection. Wanchain can be used for loans, investments & financing of digital assets. Wanchain also supports ICOs with multi-currency smart contracts. ICO tokens are automatically converted to real cryptocurrencies in a completely decentralized process. Crowdfunding is another possible use for Wanchain. Wanchain’s backbone is its cross-chain communication protocol. The registration module registers that an asset is being transferred & registers the chain where the transaction originates from. The cross-chain data transmission module initiates the transaction request to Wanchain & acknowledges whether the validator node returns success or not. It also facilitates the legal transaction from the validator node to the original chain. The status of the transaction is monitored by the transaction status query module. Validator nodes, are part of Wanchain’s Proof-of-Stake consensus algorithm and tasked with recording & verifying transactional data. Vouchers & Storemen are 2 types of verification nodes which are vital to maintaining the network, in return for portions of the transaction fee. Wanchain uses the locked account generation scheme to secure funds & keys. Storemen maintain & manage appropriate key shares of the locked account for transactions. Since locked accounts are generated through multi-party computations, Wanchain effectively increases decentralization. It can easily interact with Wanchain without the need for new validators or transaction types. The technical aspect is covered the whitepaper. Its cross-chain communication protocol uses smart contracts to allow you to exchange assets to Wanchain & vice-versa. The exchanges are entirely private & take place in a decentralized manner. Wanchain’s native tokens are the Wancoin, or the WAN. A certain amount of WAN are consumed during a transaction. Whenever you make transactions, you will need to pay WAN security deposits to the cross-chain verification nodes. Only ICO contributors have access to the coin and it hasn’t started trading yet. Since the project’s blockchain wasn’t available during the Initial Coin Offering, participants were given ERC20 tokens. The recent launch of the mainnet means ICO participants can now trade in the ERC20 tokens for WAN. At the moment the Wanchain wallet can only hold WAN, it will soon be able to support multiple currencies. The Wanchain Foundation has offices in Singapore and Austin, Texas and an impressive team behind it. Jack Lu the founder & CEO. Lu co-founded the successful Factom. Lu also started Wanglu Tech, a blockchain development company. Blockchain veteran Dustin Byington is the president. He is one the founders of Satoshi Talent, a platform which blockchain entrepreneurs can use to connect with developers. The Wanchain team is comprised of experts from the fields of cryptography, finance, software engineering, and media and community management. Disclaimer: This is not financial advice. I absolve myself of all responsibility (directly or indirectly) for any damage, loss caused, alleged to be caused by, or in connection with the use of or reliance on any content, goods or services mentioned in this article. As usual, DYOR.
Public-key cryptography
 
44:57
Public-key cryptography, also known as asymmetric cryptography, is a class of cryptographic algorithms which require two separate keys, one of which is secret (or private) and one of which is public. Although different, the two parts of this key pair are mathematically linked. The public key is used to encrypt plaintext or to verify a digital signature; whereas the private key is used to decrypt ciphertext or to create a digital signature. The term "asymmetric" stems from the use of different keys to perform these opposite functions, each the inverse of the other -- as contrasted with conventional ("symmetric") cryptography which relies on the same key to perform both. Public-key algorithms are based on mathematical problems which currently admit no efficient solution that are inherent in certain integer factorization, discrete logarithm, and elliptic curve relationships. It is computationally easy for a user to generate their own public and private key-pair and to use them for encryption and decryption. The strength lies in the fact that it is "impossible" (computationally infeasible) for a properly generated private key to be determined from its corresponding public key. Thus the public key may be published without compromising security, whereas the private key must not be revealed to anyone not authorized to read messages or perform digital signatures. Public key algorithms, unlike symmetric key algorithms, do not require a secure initial exchange of one (or more) secret keys between the parties. This video is targeted to blind users. Attribution: Article text available under CC-BY-SA Creative Commons image source in video
Views: 745 Audiopedia
Winter School on Cryptography Symmetric Encryption: Symmetric encryption and MACs - Benny Applebaum
 
01:37:56
Symmetric encryption and MACs (definitions and constructions), a lecture by Benny Applebaum. The topic of the 4th Annual Bar-Ilan Winter School on Cryptography held in January 2014, was Symmetric Encryption in Theory and in Practice. The winter school studied symmetric encryption in theory and in practice, and included a study of the theoretical foundations of symmetric encryption on the one hand, and practical constructions and cryptanalysis on the other hand. As every year, the event organizers were Prof. Yehuda Lindell and Prof. Benny Pinkas, of BIU's Department of Computer Science. This year,the Winter School featured speakers from such institutions as the Royal Holloway at the University of London , and the University of Wisconsin - Madison. For all videos of this playlist: https://www.youtube.com/playlist?list=PLXF_IJaFk-9BmvxWhnxPId32CPJhVtU6D 4th Annual Bar-Ilan Winter School on Cryptography: http://crypto.biu.ac.il/winterschool2014/ Prof. Lindell's Lab http://www1.biu.ac.il/indexE.php?id=8043&pt=30&pid=7711&level=2&cPath=7702,7711,8043 Prof. Pinkas' Lab http://www1.biu.ac.il/indexE.php?id=8046&pt=30&cPath=7702,7711,8046 Dept. of Computer Science: http://cs.biu.ac.il/en/ Bar-Ilan University: http://www1.biu.ac.il/en
Views: 364 barilanuniversity