Maximum Privacy with End-to-End Encryption

Secure Communications Using Encryption: Let’s Meet Alice & Bob

Your browser needs to be JavaScript capable to view this video

Try reloading this page, or reviewing your browser settings

In Part 3, we explain how we use cryptographic techniques like encryption, hashing and strong passwords to keep digital data secure in transit. We use the example of sending an email from Alice to Bob, and keeping the data safe from a man in the middle.

Keywords

  • Security
  • Privacy
  • Encryption
  • Hashing
  • Cryptography
  • AES
  • SHA
  • password
  • man in the middle
  • public key crypto
  • man in the middle

About this video

Author(s)
Carey Parker
First online
10 April 2021
DOI
https://doi.org/10.1007/978-1-4842-7034-9_3
Online ISBN
978-1-4842-7034-9
Publisher
Apress
Copyright information
© Carey Parker 2021