{"guid":"import-76a88a1e7144ed0e8b","title":"Einführung in kryptographische Methoden","subtitle":null,"slug":"041_Einfuehrung_in_Kryptographische_Methoden","link":"http://www.ccc.de/congress/2004/fahrplan/event/41.en.html","description":"Kryptographie ist z. Zt. das wohl einzige Mittel um zuverlässig die Privatsphäre zu schätzen oder die Integrität von Daten sicherzustellen. Kryptographische Methoden sind außerdem auch hervorragende Mittel um Rechnersysteme vor Manipulation und Einbruch zu schützen bzw. diesen nachzuweisen. Dieser Vortrag soll eine Einführung in grundlegende Methoden bieten und richtet sich an absolute Einsteiger und setzt keine weiteren Kenntnisse voraus.\n","original_language":"eng","persons":[],"tags":["21c3"," Hacking"],"view_count":16,"promoted":false,"date":"2004-01-01T01:00:00.000+01:00","release_date":"2008-01-05T01:00:00.000+01:00","updated_at":"2019-09-29T01:18:54.094+02:00","length":3458,"duration":3458,"thumb_url":"https://static.media.ccc.de/media/congress/2004/041 Einfuehrung in Kryptographische Methoden.jpg","poster_url":"https://static.media.ccc.de/media/congress/2004/041 Einfuehrung in Kryptographische Methoden_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2004/import-76a88a1e7144ed0e8b-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2004/import-76a88a1e7144ed0e8b-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/041_Einfuehrung_in_Kryptographische_Methoden","url":"https://api.media.ccc.de/public/events/import-76a88a1e7144ed0e8b","conference_title":"21C3: The Usual Suspects","conference_url":"https://api.media.ccc.de/public/conferences/21c3","related":[{"event_id":811,"event_guid":"import-57ec6bf04e9a6b0c37","weight":3},{"event_id":814,"event_guid":"import-52afc66c4fe5654a0d","weight":3},{"event_id":834,"event_guid":"import-a5e037ae18a0585a58","weight":4},{"event_id":837,"event_guid":"import-36a3b6a2ff3909dcad","weight":2},{"event_id":844,"event_guid":"import-243f70505a86f78f5f","weight":2},{"event_id":848,"event_guid":"import-fc07a90fda73c4c1af","weight":2},{"event_id":854,"event_guid":"import-61f9360e56315a6d0d","weight":2},{"event_id":879,"event_guid":"import-7d27a5ec4fcd8ee9be","weight":2},{"event_id":893,"event_guid":"import-e848aa3a18f08fcdfa","weight":2},{"event_id":902,"event_guid":"import-0bb1b23fdd210c6531","weight":3}],"recordings":[{"size":69,"length":3458,"mime_type":"audio/mpeg","language":"eng","filename":"041 Einfuehrung in Kryptographische Methoden.mp3","state":"downloaded","folder":"audio","high_quality":true,"width":496,"height":368,"updated_at":"2014-05-10T15:26:33.868+02:00","recording_url":"https://cdn.media.ccc.de/congress/2004/audio/041 Einfuehrung in Kryptographische Methoden.mp3","url":"https://api.media.ccc.de/public/recordings/1488","event_url":"https://api.media.ccc.de/public/events/import-76a88a1e7144ed0e8b","conference_url":"https://api.media.ccc.de/public/conferences/21c3"},{"size":69,"length":3458,"mime_type":"video/mp4","language":"eng","filename":"041 Einfuehrung in Kryptographische Methoden.mp4","state":"downloaded","folder":"video","high_quality":true,"width":496,"height":368,"updated_at":"2016-01-27T11:03:14.494+01:00","recording_url":"https://cdn.media.ccc.de/congress/2004/video/041 Einfuehrung in Kryptographische Methoden.mp4","url":"https://api.media.ccc.de/public/recordings/1487","event_url":"https://api.media.ccc.de/public/events/import-76a88a1e7144ed0e8b","conference_url":"https://api.media.ccc.de/public/conferences/21c3"}]}