![](https://i0.wp.com/cryptography101.ca/wp-content/uploads/2024/05/deployments-2.png?resize=580%2C582&ssl=1)
I’ll present some case studies of how the fundamental cryptographic primitives are used to secure large-scale applications. An emphasis will be placed on the challenges with managing a very large number of secret keys and public keys.
Began on February 2025….
YouTube Lectures
V0: Welcome note
V1: Overview
V2: Public-key infrastructures (PKI) [Feb 19]
V3: Transport Layer Security (TLS 1.3) [Mar 3]
V4: Bluetooth security [Mar 12]
V5: AWS key management [Mar 24]
V6: The Signal protocol [Apr 2]
Additional Material
Lecture slides
- V1: Overview
- V2: Public-key infrastructures (PKI)
- V3: Transport Layer Security (TLS 1.3)
- V4: Bluetooth security
- V5: AWS key management
- V6: The Signal protocol