Information Security Goals and Principles

  Рет қаралды 6,703

Aleksander Essex

Aleksander Essex

Күн бұрын

Information Security - Week 1
In this video: Confidentiality, integrity, authenticity, Kerkhoff's Principle, Alice & Bob, the man-in-the-middle, brute force search, bits of security
Undergraduate course on networking security and cryptography taught by Aleksander Essex, Ph.D., P.Eng., Associate professor of Software Engineering, Associate Chair (Graduate), Department of Electrical and Computer Engineering, Western University, Canada
Website:
essex.cc
Twitter:
/ aleksessex
Course topics include:
Confidentiality, authenticity, integrity, ciphers, plaintext, ciphertext, encryption, decryption, keys, key generation function, uniform random, semantic security, bits of security, brute force, Kerckhoff's principle, semantic security, ciphertext indistinguishability, IND-CPA, INC-CCA, block ciphers, message padding, PKCS 7, modes of operation, initialization vector, pseudo-random permutation, counter mode, cipher block chaining, electronic codebook mode, counter mode, CBC, ECB, CTR, Advanced Encryption Standard, AES, hash functions, random oracles, pre-image resistance, collision resistance, SHA-1, SHA-256, SHA3, SHA-513, MD5, message authentication codes, MACs, Galois counter mode, GCM, AEC-GCM, public-key cryptography, Diffie-Hellman, public-key agreement, Elliptic curve Diffie-Hellman, DHE, ECDHE, digital signatures, ECDSA, RSA signatures, PKCS v1.5, digital certificates, X.509, public-key infrastructure, PKI, certificate pinning, certificate revocation, CRL, trust store, Transport Layer Security, TLS, TLS 1.2, TLS 1.3, HTTP over TLS, HTTPS Secure Shell, SSH, ciphersuite, client hello, server hello, VPNs, TOR, 802.11, wifi encryption, client authentication, passwords, password hashing, password lengths, single sign-on, federated identity
----
Music: Arp Bounce - Geographer
Support by RFM - NCM: bit.ly/2xGHypM
Slide template: Slidesgo including Flaticons with infographics & images by Freepik

Пікірлер: 5
@caydengineer
@caydengineer 2 жыл бұрын
Looking forward to it Prof. Essex
@bennettvanberlo3822
@bennettvanberlo3822 2 жыл бұрын
Excited to take this class! Thanks Dr. Essex!
@lordknepper4544
@lordknepper4544 2 жыл бұрын
same
@magueritemichima6818
@magueritemichima6818 2 жыл бұрын
very nice video and helpfull
Encryption Basics and Classical Ciphers
13:12
Aleksander Essex
Рет қаралды 8 М.
Encrypting with Block Ciphers
21:42
Aleksander Essex
Рет қаралды 35 М.
Best KFC Homemade For My Son #cooking #shorts
00:58
BANKII
Рет қаралды 69 МЛН
A teacher captured the cutest moment at the nursery #shorts
00:33
Fabiosa Stories
Рет қаралды 52 МЛН
Little girl's dream of a giant teddy bear is about to come true #shorts
00:32
Authenticating Data with Message Authentication Codes
21:56
Aleksander Essex
Рет қаралды 17 М.
Kerberos Authentication Explained | A deep dive
16:52
Destination Certification
Рет қаралды 335 М.
Fingerprinting with Hash Functions
18:31
Aleksander Essex
Рет қаралды 8 М.
Cybersecurity Architecture: Who Are You? Identity and Access Management
31:15
Information Security Analyst Interview Questions with Answer Examples
6:10
TLS Handshake Explained - Computerphile
16:59
Computerphile
Рет қаралды 552 М.
Semantic Security and the One-Time Pad
14:30
Aleksander Essex
Рет қаралды 7 М.
Modes of Operation - Computerphile
14:16
Computerphile
Рет қаралды 220 М.
My iPhone 15 pro max 😱🫣😂
0:21
Nadir Show
Рет қаралды 1,4 МЛН