Crypto 101: Real-World Deployments


I’ll present some case studies of how the fundamental cryptographic primitives are used to secure large-scale applications. An emphasis will be placed on the challenges with managing a very large number of secret keys and public keys.


YouTube Lectures

V2: Public-key infrastructures (PKI) [Feb 19]

V3: Transport Layer Security (TLS 1.3) [Mar 3]

V4: Bluetooth security [Mar 12]

V5: AWS key management [Mar 24]

V6: The Signal protocol [Apr 2]


Additional Material

Lecture slides

  • V2: Public-key infrastructures (PKI)
  • V3: Transport Layer Security (TLS 1.3)
  • V4: Bluetooth security
  • V5: AWS key management
  • V6: The Signal protocol