Encryption Basics and Classical Ciphers

  Рет қаралды 7,964

Aleksander Essex

Aleksander Essex

3 жыл бұрын

Information Security - Week 2a
In this video: Encryption basics, plaintext, ciphertext, classical ciphers (Caesar, Vigenère, and Enigma), brute-force attacks, bits of security
Undergraduate course on networking security and cryptography taught by Aleksander Essex, Ph.D., P.Eng., Associate professor of Software Engineering, Associate Chair (Graduate), Department of Electrical and Computer Engineering, Western University, Canada
Website:
essex.cc
Twitter:
/ aleksessex
Course topics include:
Confidentiality, authenticity, integrity, ciphers, plaintext, ciphertext, encryption, decryption, keys, key generation function, uniform random, semantic security, bits of security, brute force, Kerckhoff's principle, semantic security, ciphertext indistinguishability, IND-CPA, INC-CCA, block ciphers, message padding, PKCS 7, modes of operation, initialization vector, pseudo-random permutation, counter mode, cipher block chaining, electronic codebook mode, counter mode, CBC, ECB, CTR, Advanced Encryption Standard, AES, hash functions, random oracles, pre-image resistance, collision resistance, SHA-1, SHA-256, SHA3, SHA-513, MD5, message authentication codes, MACs, Galois counter mode, GCM, AEC-GCM, public-key cryptography, Diffie-Hellman, public-key agreement, Elliptic curve Diffie-Hellman, DHE, ECDHE, digital signatures, ECDSA, RSA signatures, PKCS v1.5, digital certificates, X.509, public-key infrastructure, PKI, certificate pinning, certificate revocation, CRL, trust store, Transport Layer Security, TLS, TLS 1.2, TLS 1.3, HTTP over TLS, HTTPS Secure Shell, SSH, ciphersuite, client hello, server hello, VPNs, TOR, 802.11, wifi encryption, client authentication, passwords, password hashing, password lengths, single sign-on, federated identity
----
Music: Arp Bounce - Geographer
Support by RFM - NCM: bit.ly/2xGHypM
Slide template: Slidesgo including Flaticons with infographics & images by Freepik

Пікірлер: 5
@aaronli1240
@aaronli1240 3 жыл бұрын
Man this is lit
@midyaazad7215
@midyaazad7215 3 жыл бұрын
amazing explanation.
@nutsandbolts13
@nutsandbolts13 3 жыл бұрын
Thanku for sharing knowledge to us.....do more videos sir...
@kennethaidoo361
@kennethaidoo361 Жыл бұрын
Kenneth was here :)
@tsunningwah3471
@tsunningwah3471 5 ай бұрын
Semantic Security and the One-Time Pad
14:30
Aleksander Essex
Рет қаралды 7 М.
Encrypting with Block Ciphers
21:42
Aleksander Essex
Рет қаралды 35 М.
Best Toilet Gadgets and #Hacks you must try!!💩💩
00:49
Poly Holy Yow
Рет қаралды 21 МЛН
Идеально повторил? Хотите вторую часть?
00:13
⚡️КАН АНДРЕЙ⚡️
Рет қаралды 5 МЛН
路飞太过分了,自己游泳。#海贼王#路飞
00:28
路飞与唐舞桐
Рет қаралды 36 МЛН
Information Security Goals and Principles
12:40
Aleksander Essex
Рет қаралды 7 М.
Authenticating Data with Message Authentication Codes
21:56
Aleksander Essex
Рет қаралды 17 М.
Hashing vs Encryption Differences
19:38
Programming w/ Professor Sluiter
Рет қаралды 165 М.
AES: Advanced Encryption Standard - a Conceptual Review
16:12
Gideon Samid
Рет қаралды 138 М.
Fingerprinting with Hash Functions
18:31
Aleksander Essex
Рет қаралды 8 М.
Modes of Operation - Computerphile
14:16
Computerphile
Рет қаралды 220 М.
Secret Codes: A History of Cryptography (Part 1)
12:09
The Generalist Papers
Рет қаралды 75 М.
AES: How to Design Secure Encryption
15:37
Spanning Tree
Рет қаралды 155 М.
One Encryption Standard to Rule Them All! - Computerphile
9:11
Computerphile
Рет қаралды 427 М.
ноутбуки от 7.900 в тг laptopshoptop
0:14
Ноутбуковая лавка
Рет қаралды 3,4 МЛН
Как бесплатно замутить iphone 15 pro max
0:59
ЖЕЛЕЗНЫЙ КОРОЛЬ
Рет қаралды 8 МЛН