Cryptography in Context cover art

Cryptography in Context

Cryptography in Context

Listen for free

View show details

About this listen

Cryptography serves as the scientific bedrock of confidentiality, authenticity, and integrity. Students will explore both symmetric and asymmetric encryption, comparing their respective strengths in performance and distribution. Hashing, digital signatures, and message authentication codes are introduced as complementary tools that secure modern transactions. Case studies highlight the lifecycle of algorithms, from the rise and fall of WEP and SHA-1 to the evolution from SSL to TLS, demonstrating that cryptography must be managed as a living system rather than a static solution.

The discussion also emphasizes pitfalls in implementation. Poor key management, outdated algorithms, and misconfigurations repeatedly undermine mathematically sound systems, showing that cryptography succeeds only when embedded in disciplined practices. The forward-looking dimension of post-quantum cryptography illustrates that even today’s strongest algorithms face eventual decline, requiring proactive planning. Learners finish this week with an appreciation for both the power and impermanence of cryptographic systems, and the responsibility to manage them as part of long-term resilience.
Produced by BareMetalCyber.com

No reviews yet
In the spirit of reconciliation, Audible acknowledges the Traditional Custodians of country throughout Australia and their connections to land, sea and community. We pay our respect to their elders past and present and extend that respect to all Aboriginal and Torres Strait Islander peoples today.