{"guid":"4cdbb51b-59ac-418b-be8e-b40b9d7df872","title":"Cryptography demystified","subtitle":"An introduction without maths","slug":"36c3-10627-cryptography_demystified","link":"https://fahrplan.events.ccc.de/congress/2019/Fahrplan/events/10627.html","description":"This talk will explain the basic building blocks of cryptography in a manner that will (hopefully) be understandable by everyone. The talk will not require any understanding of maths or computer science.\nIn particular, the talk will explain encryption, what it is and what it does, what it is \u003cem\u003enot\u003c/em\u003e and what it \u003cem\u003edoesn't\u003c/em\u003e do, and what other tools cryptography can offer.\n\nThis talk will explain the basic building blocks of cryptography in a manner that will (hopefully) be understandable by everyone, in particular by a non-technical audience. The talk will not require any understanding of maths or computer science.\nThis talk will cover the following topics:\n\u003cul\u003e\n  \u003cli\u003eWhat is encryption and what does it do?\u003c/li\u003e\n  \u003cli\u003eWhat are the different kinds of encryption?\u003c/li\u003e\n  \u003cli\u003eWhat is authenticity? Are authenticity and encryption related?\u003c/li\u003e\n  \u003cli\u003eHow can authenticity be achieved?\u003c/li\u003e\n  \u003cli\u003eWhat are certificates for?\u003c/li\u003e\n  \u003cli\u003eWhat is TLS and what does it do?\u003c/li\u003e\n\u003c/ul\u003e\nWhile covering the above topcis, I will \u003cem\u003enot\u003c/em\u003e explain the technical details of common cryptographic schemes (like RSA, AES, HMAC and so on), in order to avoid keep this talk accessible to a broad audience.","original_language":"eng","persons":["oots"],"tags":["36c3","10627","2019","Security","Main"],"view_count":3385,"promoted":false,"date":"2019-12-29T14:10:00.000+01:00","release_date":"2019-12-29T01:00:00.000+01:00","updated_at":"2026-04-06T09:30:04.666+02:00","length":3204,"duration":3204,"thumb_url":"https://static.media.ccc.de/media/congress/2019/10627-hd.jpg","poster_url":"https://static.media.ccc.de/media/congress/2019/10627-hd_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2019/10627-hd.timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2019/10627-hd.thumbnails.vtt","frontend_link":"https://media.ccc.de/v/36c3-10627-cryptography_demystified","url":"https://api.media.ccc.de/public/events/4cdbb51b-59ac-418b-be8e-b40b9d7df872","conference_title":"36C3: Resource Exhaustion","conference_url":"https://api.media.ccc.de/public/conferences/36c3","related":[],"recordings":[{"size":null,"length":null,"mime_type":"application/x-subrip","language":"fin","filename":"36c3-10627-eng-deu-fra-Cryptography_demystified.fi.srt","state":"translated","folder":"","high_quality":true,"width":null,"height":null,"updated_at":"2023-09-02T02:19:04.597+02:00","recording_url":"https://cdn.media.ccc.de/congress/2019/36c3-10627-eng-deu-fra-Cryptography_demystified.fi.srt","url":"https://api.media.ccc.de/public/recordings/69663","event_url":"https://api.media.ccc.de/public/events/4cdbb51b-59ac-418b-be8e-b40b9d7df872","conference_url":"https://api.media.ccc.de/public/conferences/36c3"},{"size":null,"length":null,"mime_type":"application/x-subrip","language":"eng","filename":"36c3-10627-eng-deu-fra-Cryptography_demystified.en.srt","state":"complete","folder":"","high_quality":true,"width":null,"height":null,"updated_at":"2021-02-21T19:47:30.239+01:00","recording_url":"https://cdn.media.ccc.de/congress/2019/36c3-10627-eng-deu-fra-Cryptography_demystified.en.srt","url":"https://api.media.ccc.de/public/recordings/50362","event_url":"https://api.media.ccc.de/public/events/4cdbb51b-59ac-418b-be8e-b40b9d7df872","conference_url":"https://api.media.ccc.de/public/conferences/36c3"},{"size":578,"length":3204,"mime_type":"video/webm","language":"eng-deu-fra","filename":"36c3-10627-eng-deu-fra-Cryptography_demystified_webm-hd.webm","state":"new","folder":"webm-hd","high_quality":true,"width":1920,"height":1080,"updated_at":"2019-12-29T20:20:59.637+01:00","recording_url":"https://cdn.media.ccc.de/congress/2019/webm-hd/36c3-10627-eng-deu-fra-Cryptography_demystified_webm-hd.webm","url":"https://api.media.ccc.de/public/recordings/43273","event_url":"https://api.media.ccc.de/public/events/4cdbb51b-59ac-418b-be8e-b40b9d7df872","conference_url":"https://api.media.ccc.de/public/conferences/36c3"},{"size":29,"length":3186,"mime_type":"audio/opus","language":"eng","filename":"36c3-10627-eng-Cryptography_demystified_opus.opus","state":"new","folder":"opus","high_quality":false,"width":0,"height":0,"updated_at":"2019-12-29T20:19:53.006+01:00","recording_url":"https://cdn.media.ccc.de/congress/2019/opus/36c3-10627-eng-Cryptography_demystified_opus.opus","url":"https://api.media.ccc.de/public/recordings/43267","event_url":"https://api.media.ccc.de/public/events/4cdbb51b-59ac-418b-be8e-b40b9d7df872","conference_url":"https://api.media.ccc.de/public/conferences/36c3"},{"size":244,"length":3204,"mime_type":"video/webm","language":"eng-deu-fra","filename":"36c3-10627-eng-deu-fra-Cryptography_demystified_webm-sd.webm","state":"new","folder":"webm-sd","high_quality":false,"width":720,"height":576,"updated_at":"2019-12-29T20:02:54.042+01:00","recording_url":"https://cdn.media.ccc.de/congress/2019/webm-sd/36c3-10627-eng-deu-fra-Cryptography_demystified_webm-sd.webm","url":"https://api.media.ccc.de/public/recordings/43234","event_url":"https://api.media.ccc.de/public/events/4cdbb51b-59ac-418b-be8e-b40b9d7df872","conference_url":"https://api.media.ccc.de/public/conferences/36c3"},{"size":214,"length":3204,"mime_type":"video/mp4","language":"eng-deu-fra","filename":"36c3-10627-eng-deu-fra-Cryptography_demystified_sd.mp4","state":"new","folder":"h264-sd","high_quality":false,"width":720,"height":576,"updated_at":"2019-12-29T20:00:53.783+01:00","recording_url":"https://cdn.media.ccc.de/congress/2019/h264-sd/36c3-10627-eng-deu-fra-Cryptography_demystified_sd.mp4","url":"https://api.media.ccc.de/public/recordings/43232","event_url":"https://api.media.ccc.de/public/events/4cdbb51b-59ac-418b-be8e-b40b9d7df872","conference_url":"https://api.media.ccc.de/public/conferences/36c3"},{"size":48,"length":3186,"mime_type":"audio/mpeg","language":"eng","filename":"36c3-10627-eng-Cryptography_demystified_mp3.mp3","state":"new","folder":"mp3","high_quality":false,"width":0,"height":0,"updated_at":"2019-12-29T19:56:36.433+01:00","recording_url":"https://cdn.media.ccc.de/congress/2019/mp3/36c3-10627-eng-Cryptography_demystified_mp3.mp3","url":"https://api.media.ccc.de/public/recordings/43227","event_url":"https://api.media.ccc.de/public/events/4cdbb51b-59ac-418b-be8e-b40b9d7df872","conference_url":"https://api.media.ccc.de/public/conferences/36c3"},{"size":200,"length":3204,"mime_type":"video/mp4","language":"eng-deu-fra","filename":"36c3-10627-eng-deu-fra-Cryptography_demystified_hd-slides.mp4","state":"new","folder":"slides-h264-hd","high_quality":true,"width":1920,"height":1080,"updated_at":"2019-12-29T19:56:09.925+01:00","recording_url":"https://cdn.media.ccc.de/congress/2019/slides-h264-hd/36c3-10627-eng-deu-fra-Cryptography_demystified_hd-slides.mp4","url":"https://api.media.ccc.de/public/recordings/43225","event_url":"https://api.media.ccc.de/public/events/4cdbb51b-59ac-418b-be8e-b40b9d7df872","conference_url":"https://api.media.ccc.de/public/conferences/36c3"},{"size":474,"length":3204,"mime_type":"video/mp4","language":"eng-deu-fra","filename":"36c3-10627-eng-deu-fra-Cryptography_demystified_hd.mp4","state":"new","folder":"h264-hd","high_quality":true,"width":1920,"height":1080,"updated_at":"2019-12-29T19:37:48.985+01:00","recording_url":"https://cdn.media.ccc.de/congress/2019/h264-hd/36c3-10627-eng-deu-fra-Cryptography_demystified_hd.mp4","url":"https://api.media.ccc.de/public/recordings/43168","event_url":"https://api.media.ccc.de/public/events/4cdbb51b-59ac-418b-be8e-b40b9d7df872","conference_url":"https://api.media.ccc.de/public/conferences/36c3"},{"size":324,"length":3204,"mime_type":"video/mp4","language":"fra","filename":"36c3-10627-fra-Cryptography_demystified.mp4","state":"new","folder":"h264-hd","high_quality":true,"width":1920,"height":1080,"updated_at":"2019-12-29T19:37:06.216+01:00","recording_url":"https://cdn.media.ccc.de/congress/2019/h264-hd/36c3-10627-fra-Cryptography_demystified.mp4","url":"https://api.media.ccc.de/public/recordings/43166","event_url":"https://api.media.ccc.de/public/events/4cdbb51b-59ac-418b-be8e-b40b9d7df872","conference_url":"https://api.media.ccc.de/public/conferences/36c3"},{"size":324,"length":3204,"mime_type":"video/mp4","language":"deu","filename":"36c3-10627-deu-Cryptography_demystified.mp4","state":"new","folder":"h264-hd","high_quality":true,"width":1920,"height":1080,"updated_at":"2019-12-29T19:36:33.869+01:00","recording_url":"https://cdn.media.ccc.de/congress/2019/h264-hd/36c3-10627-deu-Cryptography_demystified.mp4","url":"https://api.media.ccc.de/public/recordings/43164","event_url":"https://api.media.ccc.de/public/events/4cdbb51b-59ac-418b-be8e-b40b9d7df872","conference_url":"https://api.media.ccc.de/public/conferences/36c3"},{"size":324,"length":3204,"mime_type":"video/mp4","language":"eng","filename":"36c3-10627-eng-Cryptography_demystified.mp4","state":"new","folder":"h264-hd","high_quality":true,"width":1920,"height":1080,"updated_at":"2019-12-29T19:35:57.852+01:00","recording_url":"https://cdn.media.ccc.de/congress/2019/h264-hd/36c3-10627-eng-Cryptography_demystified.mp4","url":"https://api.media.ccc.de/public/recordings/43162","event_url":"https://api.media.ccc.de/public/events/4cdbb51b-59ac-418b-be8e-b40b9d7df872","conference_url":"https://api.media.ccc.de/public/conferences/36c3"}]}