os211

Top 10 List of Week 02

  1. Public Key Cryptography
    A very gentle introduction to public-private key cryptography from Computerphile. You’ll get the coolness and the basic concept about symmetric-asymmetric encryption works.

  2. Hashing Algorithms and Security
    Back again with the Computerphile and our favorite content creator, Tom Scott explaining the basics of hashing algorithm (like md5 and SHA) in a friendly way.

  3. SHA: Secure Hashing Algorithm
    We’ll using SHA256 encyption starting from this week. Why we don’t learn the basics?.

  4. Prime Numbers & RSA Encryption Algorithm
    RSA are using a large prime numbers, isn’t it interesting to know more about RSA?.

  5. Comparison of Symmetric and Asymmetric Cryptography with Existing Vulnerabilities and Countermeasures
    A short article about the sym and asym cryptography along with performance analysis and it’s vulnerabilities.

  6. What are Digital Signatures?
    Besides Udacity, here is a quick Youtube video about Digital Signature and it’s relation to public key.

  7. Belajar Memakai GNU Privacy Guard (GnuPG/GPG)
    This is just a simple and should be easy to understadn GnuPG tutorial in Indonesian :D.

  8. periksadata.com
    Data breaches could be a threat to our password, data, or even our identity. Teguh Aprianto a.k.a. @secgron and his fellow colleague create an Indonesian data breaches checker whether our data have been compromised using our email.

  9. TED Talk:In the war for information, will quantum computers defeat cryptographers?
    Cryptography and encryption is a vital subject in this war of information. This talk will give a broaden view of what’s coming.

  10. Shor’s Algorithm Explained
    Did we think our 256bit encryption is secure enough? Well, minutephysics tell us about an algorithm that can destroy even a 256bit encryption (well, we need a quantum computer for that too).