Public Key Cryptography Computerphile
Spies used to meet in the park to exchange code words, now things have moved on - Robert Miles explains the principle of ... How do you verify that someone is who they say they are? Dr Mike Pound on digital signatures. Passkey pop up everywhere, Mike Pound explains what they are! Check out Brilliant's courses and start for free at ... Just what are elliptic curves and why use a graph shape in Kerberos is an authentication method - Dr Mike Pound explains how it works so neatly. EXTRA BITS: Kerberos Q&A ... Secure Hashing Algorithm (SHA1) explained. Dr Mike Pound explains how files are used to generate seemingly random hash ...
Build your own passkey system like Mike! -- Check out Brilliant for free at It's absolutely everywhere, but what is TLS and where did it come from? Dr Mike Pound explains the background behind this ... Connecting via SSH to a remote machine is second nature to some, but how does it work? Dr Steve Bagley. Dr Mike Pound on ...