Understanding secure connectivity in embedded systems and IoT devices

メール

How symmetric and asymmetric encryption and digital signatures work

説明

2019年 12月 30日
This video provides a ‘system-level’ view of how symmetric and asymmetric encryption work. It briefly discusses the main asymmetric cryptosystems – RSA and ECC – as well as explaining some core concepts such as entity and message authentication. It also discusses specific use cases of asymmetric encryption such as entity authentication, key exchange and digital signatures. Digital signatures also include some discussion of the role of secure hashing. There is no attempt to explain the mathematics used in encryption.

追加情報

arrow-topclosedeletedownloadmenusearchsortingArrowszoom-inzoom-out arrow-downarrow-uparrowCircle-leftarrowCircle-rightblockDiagramcalculatorcalendarchatBubble-doublechatBubble-personchatBubble-singlecheckmark-circlechevron-downchevron-leftchevron-rightchevron-upchipclipboardclose-circlecrossReferencedashdocument-genericdocument-pdfAcrobatdocument-webevaluationModuleglobehistoryClockinfo-circlelistlockmailmyTIonlineDataSheetpersonphonequestion-circlereferenceDesignshoppingCartstartoolsvideoswarningwiki