Listen "Cryptography"
Episode Synopsis
Cryptography is a method of protecting information and communication through the use of code so only those for whom the information is intended can read and process it. Cryptography is used for many things from online banking to GitHub commits. Today we’ll dive into the basics of cryptography. Let’s get started!
Show Notes
[0:25] Our experience with cryptography
[03:08] What is cryptography?
[04:21] Four objectives of cryptography
[09:44] Types of cryptography
[23:34] Historical Cryptography
[30:54] How to learn cryptography
[32:34] Shoutouts
We got this note about RSA private/public keys from a listener:
"The point of having public and private keys is that the public key can only encrypt a message, and only the private key can decrypt the message. So the public key is safe for anyone to have, since you can’t use it to read anyone else’s message. The private key needs to stay private so only you can read messages encrypted by the public key"
Thanks for the clarification, Brad!
Resources
Coursera course - https://www.coursera.org/learn/crypto#syllabus
Crash course - https://www.youtube.com/watch?v=jhXCTbFnK8o
Khan academy - https://www.khanacademy.org/computing/computer-science/cryptography
Passport JS - http://www.passportjs.org/
OAuth - https://oauth.net/2/
Episode with Tailor Tolliver on security - https://www.ladybug.dev/episodes/web-security?rq=security
The Code Book by Simon Singh - https://www.amazon.com/Code-Book-Science-Secrecy-Cryptography/dp/0385495323
Carcassonne - https://boardgamegeek.com/boardgame/822/carcassonne
Auth0 - https://auth0.com/
Amazon Cognito - https://aws.amazon.com/cognito/
Transcript
https://github.com/ladybug-podcast/ladybug-website/blob/master/transcripts/67-cryptography.md
Show Notes
[0:25] Our experience with cryptography
[03:08] What is cryptography?
[04:21] Four objectives of cryptography
[09:44] Types of cryptography
[23:34] Historical Cryptography
[30:54] How to learn cryptography
[32:34] Shoutouts
We got this note about RSA private/public keys from a listener:
"The point of having public and private keys is that the public key can only encrypt a message, and only the private key can decrypt the message. So the public key is safe for anyone to have, since you can’t use it to read anyone else’s message. The private key needs to stay private so only you can read messages encrypted by the public key"
Thanks for the clarification, Brad!
Resources
Coursera course - https://www.coursera.org/learn/crypto#syllabus
Crash course - https://www.youtube.com/watch?v=jhXCTbFnK8o
Khan academy - https://www.khanacademy.org/computing/computer-science/cryptography
Passport JS - http://www.passportjs.org/
OAuth - https://oauth.net/2/
Episode with Tailor Tolliver on security - https://www.ladybug.dev/episodes/web-security?rq=security
The Code Book by Simon Singh - https://www.amazon.com/Code-Book-Science-Secrecy-Cryptography/dp/0385495323
Carcassonne - https://boardgamegeek.com/boardgame/822/carcassonne
Auth0 - https://auth0.com/
Amazon Cognito - https://aws.amazon.com/cognito/
Transcript
https://github.com/ladybug-podcast/ladybug-website/blob/master/transcripts/67-cryptography.md
More episodes of the podcast Ladybug Podcast
The Hard Parts Of Engineering Management
03/11/2025
Interviewing And Hiring Engineers
13/10/2025
Managing A Remote Team Of Engineers
06/10/2025
Project Management As An Engineering Manager
22/09/2025
Your First 90 Days As An Engineering Manager
15/09/2025
ZARZA We are Zarza, the prestigious firm behind major projects in information technology.