Skip to content
Best Place To BuildBest Place To Build

Prof. Shweta Agrawal, CSE | "Real-life cryptography is cooler than Imitation Game-the movie"| Ep.13

Ever wondered why even supercomputers can't crack certain codes? Or why the most secure algorithms are inspired by art? This episode unravels these mysteries as Professor Agrawal takes us through: - The hidden beauty of mathematical secrets - Why modern cryptography is cooler than Hollywood depicts - Her journey of merging art with theoretical computer science - Building CyStar and redefining cybersecurity in India Discover why calling computer science "coding" is as absurd as calling surgery "knife science," and explore the delicate dance between structure and randomness that keeps our digital world secure. A profound discussion about quantum-resistant algorithms, the power of Atma Shraddha, and much more. Plus, discover how medical research can use private genomic data without compromising privacy, why RSA encryption was a life-changing moment, and how the war effort transformed modern cryptography. An unmissable episode for anyone interested in mathematics, computer science, cybersecurity, or the future of digital privacy. Chapters: 00:00:00 Introduction 00:01:35 What is Cryptography? 00:02:24 History of Cryptography 00:04:20 Caesar Cipher and Hard Problems 00:05:09 Real-World Applications of Cryptography 00:07:07 Eavesdroppers and Attackers 00:08:01 Defining "Hard" Problems 00:09:24 Algorithms in Cryptography 00:10:11 Public Key Encryption- RSA 00:12:44 P vs NP 00:17:18 Shweta's Research Interests 00:17:57 Computing on Encrypted Data 00:18:53 Examples of Computing on Encrypted Data 00:19:55 The Fine Line Between Structure and Randomness 00:20:30 Analogy for Encrypted Computation 00:24:00 Functional Encryption 00:25:13 Functional Encryption and Quantum Security 00:25:41 Attribute-Based Cryptography 00:26:49 Lattice-Based Cryptography 00:28:10 Hard Problems in Engineering vs. Computer Science 00:29:59 Subfields of Computer Science 00:34:31 Why Study Computer Science? 00:37:56 Pressures on Computer Science Students 00:39:42 India's Position in Cryptography 00:41:38 CyStar Center 00:42:28 CyStar as a Cybersecurity Focused Center 00:46:40 Women in STEM 00:49:02 Performance of Women in STEM 00:51:35 Shweta's Personal Journey 00:55:38 Decision to Return to India 00:57:43 Atma Shraddha (Self-Belief) 01:03:23 Art and Cryptography 01:05:00 Conclusion References Prof. Shweta: https://www.cse.iitm.ac.in/~shwetaag/ CyStar: https://cystar.iitm.ac.in/ To know more about what makes IIT Madras- the Best Place to Build- go on to https://www.bestplacetobuild.com/

Shweta AgrawalguestUnknown Hosthost
Feb 14, 20251h 5mWatch on YouTube ↗

CHAPTERS

  1. Meet Prof. Shweta Agrawal at IIT Madras: why “real-life cryptography” matters

    The host introduces Prof. Shweta Agrawal (CSE, IIT Madras) and frames the episode as a practical, curiosity-driven tour of cryptography beyond pop-culture references like The Imitation Game. The conversation sets expectations: cryptography is not just war-time codebreaking, but a foundational technology shaping everyday digital trust.

  2. Cryptography in one sentence: secrecy, privacy, and trust goals

    Shweta defines cryptography as the art of keeping secrets, then expands it to multiple goals beyond confidentiality—like authentication and proving identity. The chapter clarifies that cryptography is about enabling secure interaction under adversarial conditions.

  3. From Caesar cipher to modern crypto: lessons from Enigma and provable security

    A historical arc connects ancient ciphers to WWII-era cryptanalysis and the modern emphasis on mathematical guarantees. Shweta explains the key shift: rather than relying on “smart people built a hard code,” modern cryptography aims to reduce attacks to solving well-studied hard problems.

  4. Why everyday people and businesses need cryptography

    Cryptography is grounded in everyday scenarios: protecting online payments from eavesdroppers and enabling collaboration without revealing sensitive data. The discussion introduces secure computation ideas such as multiparty computation for joint decisions (e.g., mergers) while preserving privacy.

  5. Attackers, eavesdroppers, and threat models as algorithms

    Shweta reframes adversaries as algorithms rather than people, emphasizing formal threat models. The chapter distinguishes passive listening (eavesdropping) from active attackers who can modify communications, highlighting why cryptographic definitions must anticipate many attack types.

  6. What makes a problem “hard”: efficiency, polynomial time, and security parameters

    Hardness is defined in computational terms: no efficient (polynomial-time) probabilistic algorithm should solve the underlying problem within any reasonable timeframe. The conversation links this to practical security choices—tuning parameters based on how long data must remain secure.

  7. Algorithms and RSA public-key encryption: falling in love with crypto

    The host probes what an algorithm is, then the discussion pivots to cryptographic algorithms like RSA and AES, with RSA explored in depth. Shweta explains public-key encryption: anyone can encrypt with a public key, but only the holder of the secret key can decrypt—making key management central.

  8. P vs NP, and why quantum computing changes the rules (including breaking RSA)

    Shweta introduces P vs NP as a foundational open problem and relates it to cryptography’s need for problems that resist efficient solving. The chapter then explains how quantum algorithms can make classically hard problems easy—RSA being the headline example—forcing the field to plan for post-quantum security now.

  9. Research focus: computing on encrypted data and the structure–randomness tightrope

    Shweta describes her theoretical cryptography work, especially the challenge of meaningful computation on encrypted data—motivated by ML and sensitive datasets (e.g., genomic research). She explains the conceptual paradox: ciphertext must look like random noise to attackers, yet contain hidden structure enabling computation and correct decryption.

  10. Functional encryption: authorization to compute (and only compute) approved functions

    The episode formalizes the earlier idea as functional encryption: encryption stays general-purpose, while decryption keys encode which function outputs are learnable. Shweta highlights a stronger notion of control—keys that open results only if the computation was authorized and done correctly—and connects this to quantum-resilient constructions.

  11. Attribute-based encryption and lattice-based cryptography: practical access control and post-quantum foundations

    Shweta explains attribute-based cryptography as a special case: keys carry attributes, and policies determine access (e.g., faculty/staff can decrypt, students cannot). She then contrasts this with lattice-based cryptography, which is about building schemes from lattice hard problems—valuable both for post-quantum security and for enabling new, more powerful cryptographic capabilities.

  12. What computer science really is: computing, complexity, systems, and ML (not just coding)

    Shweta challenges the common misconception that computer science equals programming, using Dijkstra’s quote about “knife science.” She maps major CS subfields—theory/complexity, systems, and machine learning—emphasizing that programming is a tool, not the definition of the discipline.

  13. Career choices, student pressure, and India’s cryptography rise (plus CyStar’s cybersecurity mission)

    The conversation turns to why one should study CS and how students often choose based on status or pay rather than fit—creating intense pressure. Shweta then describes India’s progress in public-key cryptography over the past decade and introduces CyStar, a cybersecurity center uniting theory, applied security, and real-world modeling/outreach.

  14. Women in STEM, Shweta’s personal journey back to India, Atma Shraddha, and art–cryptography parallels

    Shweta discusses the “leaky pipeline” for women in STEM—strong performance early, thinning representation in leadership—and the subtle biases that persist. She shares her exploratory path into cryptography, her intentional decision to return to India to give back, and the need for national self-belief (Atma Shraddha). The episode closes by linking cryptography to abstract expressionism: both balance structure and randomness in pursuit of beauty.

Get more out of YouTube videos.

High quality summaries for YouTube videos. Accurate transcripts to search & find moments. Powered by ChatGPT & Claude AI.

Add to Chrome