Рет қаралды 4,820
Smart card security is sophisticated and complex. It's also evolving. The technical and mathematical depth of these technologies can be daunting, but we can still explore the basic concepts with simple examples. Even the most experienced cryptographic experts know Alice and Bob, and still use them to explain and develop solutions to today's smart card challenges.
This video explains key diversification (sometimes called PKI, Public Key Infrastructure, or Public Key Cryptography), public and private key pairs, symmetric and asymmetric encryption, the RSA and Diffie-Hellman algorithms, Elliptic Curve, and more.
For more learning resources, check out the Intro to Access Control playlist on this channel, or visit our website at www.allegion.com/us .
Attributions:
Photo of Ron Rivest used under the Creative Commons Attribution-Share Alike 4.0 International License creativecommons.org/licenses/...
Photos of Adi Shamir, Whitfield Diffie, and Martin Hellman used under the Creative Commons Attribution-Share Alike 3.0 Unported license creativecommons.org/licenses/...
Photo of Leonard Adleman used under Wikimedia Foundation free use terms