Fingerprinting with Hash Functions

  Рет қаралды 7,875

Aleksander Essex

Aleksander Essex

Күн бұрын

Information Security - Week 4
In this video: Cryptographic hash functions, random oracles, pre-image resistance, second pre-image resistance, collisions, collision resistance, birthday paradox, MD5 collisions, SHA-1, SHA-256, SHA-512
Undergraduate course on networking security and cryptography taught by Aleksander Essex, Ph.D., P.Eng., Associate professor of Software Engineering, Associate Chair (Graduate), Department of Electrical and Computer Engineering, Western University, Canada
Website:
essex.cc
Twitter:
/ aleksessex
Course topics include:
Confidentiality, authenticity, integrity, ciphers, plaintext, ciphertext, encryption, decryption, keys, key generation function, uniform random, semantic security, bits of security, brute force, Kerckhoff's principle, semantic security, ciphertext indistinguishability, IND-CPA, INC-CCA, block ciphers, message padding, PKCS 7, modes of operation, initialization vector, pseudo-random permutation, counter mode, cipher block chaining, electronic codebook mode, counter mode, CBC, ECB, CTR, Advanced Encryption Standard, AES, hash functions, random oracles, pre-image resistance, collision resistance, SHA-1, SHA-256, SHA3, SHA-513, MD5, message authentication codes, MACs, Galois counter mode, GCM, AEC-GCM, public-key cryptography, Diffie-Hellman, public-key agreement, Elliptic curve Diffie-Hellman, DHE, ECDHE, digital signatures, ECDSA, RSA signatures, PKCS v1.5, digital certificates, X.509, public-key infrastructure, PKI, certificate pinning, certificate revocation, CRL, trust store, Transport Layer Security, TLS, TLS 1.2, TLS 1.3, HTTP over TLS, HTTPS Secure Shell, SSH, ciphersuite, client hello, server hello, VPNs, TOR, 802.11, wifi encryption, client authentication, passwords, password hashing, password lengths, single sign-on, federated identity
----
Music: Arp Bounce - Geographer
Support by RFM - NCM: bit.ly/2xGHypM
Slide template: Slidesgo including Flaticons with infographics & images by Freepik

Пікірлер: 3
@aryaawesome1999
@aryaawesome1999 3 жыл бұрын
love the continuous shade at quantum computers
@accumulator4825
@accumulator4825 2 жыл бұрын
Awesome video, thank you very much. God bless 🌄🌿
@1UniverseGames
@1UniverseGames 3 жыл бұрын
Is it possible to do a video with the coding and explain it! Thanks 😊
Authenticating Data with Message Authentication Codes
21:56
Aleksander Essex
Рет қаралды 17 М.
Encrypting with Block Ciphers
21:42
Aleksander Essex
Рет қаралды 35 М.
50 YouTubers Fight For $1,000,000
41:27
MrBeast
Рет қаралды 212 МЛН
小宇宙竟然尿裤子!#小丑#家庭#搞笑
00:26
家庭搞笑日记
Рет қаралды 10 МЛН
No empty
00:35
Mamasoboliha
Рет қаралды 10 МЛН
Hashing: Why & How?
16:35
Gideon Samid
Рет қаралды 154 М.
Hashing, Hashing Algorithms, and Collisions - Cryptography - Practical TLS
11:42
Encryption Basics and Classical Ciphers
13:12
Aleksander Essex
Рет қаралды 8 М.
Semantic Security and the One-Time Pad
14:30
Aleksander Essex
Рет қаралды 7 М.
One Encryption Standard to Rule Them All! - Computerphile
9:11
Computerphile
Рет қаралды 427 М.
Modes of Operation - Computerphile
14:16
Computerphile
Рет қаралды 220 М.
Information Security Goals and Principles
12:40
Aleksander Essex
Рет қаралды 7 М.
How hash function work?
4:29
Sunny Classroom
Рет қаралды 176 М.
Kerberos Authentication Explained | A deep dive
16:52
Destination Certification
Рет қаралды 335 М.
iPhone 15 Pro Max vs IPhone Xs Max  troll face speed test
0:33
تجربة أغرب توصيلة شحن ضد القطع تماما
0:56
صدام العزي
Рет қаралды 63 МЛН
Частая ошибка геймеров? 😐 Dareu A710X
1:00
Вэйми
Рет қаралды 4,6 МЛН