Bloomberg
Katie Haun's Outlook on Crypto Winter
Emily Chang sits down with Haun Ventures CEO & Founder Katie Haun on the latest episode of Studio 1.0.
Bloomberg
Icahn on Cryptos: 'There Could Be Something to It'
May.26 -- Billionaire investor Carl Icahn, CEO of Icahn Capital, says he doesn't own any cryptocurrencies right now and a lot of meme stocks like AMC are "ridiculously priced." He speaks during an interview on "Bloomberg Markets: The...
Bloomberg
Apple Brings Up Code in Fight With FBI
Feb. 24 -- Apple is expected to present software code as free speech as part of the company’s battle with the FBI over a court order to unlock an iPhone belonging to a shooter involved in the San Bernardino, California terror attack....
PBS
Cyber Codes
Let's get the video out in the open. Viewers learn about some early instances of cryptography and then hone in on modern cyber codes. Specifically, the animated video describes the basics of how public key cryptography works.
Physics Girl
Quantum Cryptography Explained
Cryptography keeps your identifying information safe! An interesting lesson explains the history of encryption and decryption. The instructor begins with simple strategies and progresses to quantum cryptography to finish the well-rounded...
Code.org
The Internet: Encryption and Public Keys
We can partially thank Caesar that our e-mails are secure! Viewers learn how encryption and public key cryptography keep our communications safe over the Internet. The video also briefly covers the history of ciphers, such as the Caesar...
TED-Ed
Is DNA the Future of Data Storage?
When you think of secret messages and data storage, DNA doesn't normally come to mind. Viewers watch a video that explains how scientists use DNA to store information. It describes some recent advances in the area.
Domain of Science
The Map of Mathematics
How does all this math fit together? The resource creates a graphical view of the extent of mathematics. The map shows the pure and applied sides of studying mathematics and breaks them down into their many disciplines.
Crash Course
Cryptography: Crash Course Computer Science #33
Uncover key concepts in cryptography in the 33rd installment of a computer science series. An engaging video describes various encryption methods. It explains substitution ciphers, permutation ciphers, the Enigma machine, advanced...
Massachusetts Institute of Technology
Mit: Blossoms: Fabulous Building Cryptosystems
As part of this introduction to cryptography, students will build three devices and learn how to encrypt and decrypt messages. Video is accompanied by a teacher's guide, transcript, and other handouts, as well as links for learning more...
Massachusetts Institute of Technology
Mit: Blossoms: Building Cryptosystems
This video module presents an introduction to cryptography - the method of sending messages in such a way that only the intended recipients can understand them. In this very interactive lesson, students will build three different devices...
Massachusetts Institute of Technology
Mit: Blossoms: The Mathematics of Cryptography
This video lesson provides a more advanced approach to cryptography than the more experiential Sturtevant cryptography lesson also in the BLOSSOMS video library. Students will learn about the history of cryptography, and they will also...
Annenberg Foundation
Annenberg Learner: Mathematics Illuminated: The Primes
A detailed look at the importance of prime numbers, not only in math, but also in science and in the field of cryptography. [28:27]
Crash Course
Crash Course Computer Science #33: Cryptography
This episode discusses how to keep information secret using cryptography. From as early as Julius Caesar's Caesar cipher to Mary, Queen of Scots, encrypted messages to kill Queen Elizabeth in 1587; there has long been a need to encrypt...
Khan Academy
Khan Academy: Rsa Encryption: Step 1
This video explains why RSA, the public-key cryptosystem that is used for safe data transmission, is needed. This video lesson from Khan Academy is intended for students who are taking an introductory computer science course.
Other
Code.org: The Internet: Encryption & Public Keys
Mia Epner, who works on security for a US national intelligence agency, explains how cryptography allows for the secure transfer of data online. This educational video explains 256-bit encryption, public and private keys, SSL & TLS...
Khan Academy
Khan Academy: Journey Into Cryptography: Probability Space
How to understand & calculate probability visually.
Khan Academy
Khan Academy: The Enigma Encryption Machine (Case Study)
Encryption is explored with a focus on the Enigma.
Khan Academy
Khan Academy: Journey Into Cryptography: Perfect Secrecy
Claude Shannon's idea of perfect secrecy: no amount of computational power can help improve your ability to break the one-time pad.
Khan Academy
Khan Academy: Journey Into Cryptography: Pseudorandom Number Generators
Learn about random vs. pseudorandom number generators.
Khan Academy
Khan Academy: The Fundamental Theorem of Arithmetic
In this video lesson students explore the fundamental theorem of arithmetic. Student learn about prime and composite numbers.
Khan Academy
Khan Academy: Journey Into Cryptography: Polyalphabetic Cipher
Find out how does a codebreaker works?
Khan Academy
Khan Academy: Journey Into Cryptography: What Is Cryptography?
What is Cryptography? A story which takes us from Caesar to Claude Shannon.