Classical ciphers

Arnold Cipher

The Arnold Cipher was a book cipher used by John André and Benedict Arnold during the negotiations that led to Arnold's failed attempt to surrender West Point to the British in 1780. (Wikipedia).

Arnold Cipher
Video thumbnail

Symmetric Key Cryptography: The Keyword Cipher

This is the second in a series about cryptography; an extremely important aspect of computer science and cyber security. It covers a substitution cipher called the keyword cipher, also known as the Vigenère cipher. It explains how a keyword, or key phrase, can be used to effectively gene

From playlist Cryptography

Video thumbnail

Symmetric Key Cryptography: The Caesar Cipher

This is the first in a series about cryptography; an extremely important aspect of computer science and cyber security. It introduces symmetric key cryptography with a well known substitution cipher, namely the Caesar Cipher. It includes a few examples you can try for yourself using diff

From playlist Cryptography

Video thumbnail

Cryptograph: Substitution Cipher (Caesar Cipher)

This lesson explains how to encrypt and decrypt a message using a Caeser cipher. Site: http://mathispower4u.com

From playlist Cryptography

Video thumbnail

Block Ciphers and Data Encryption Standard (DES): Part 2

Fundamental concepts of Block Cipher Design Principles are discussed. Differential cryptanalysis and linear cryptanalysis are explained.

From playlist Network Security

Video thumbnail

UFOs and the Occult | The Story of George Hunt Williamson

UFOs and the occult may seem like strange bedfellows, but they share an overlap of believers and practitioners. Self-proclaimed spiritual medium and alien contactee George Hunt Williamson even formed a career—and a cult—out of it. Brace yourself; it's gonna be a weird ride. This video is

From playlist Science

Video thumbnail

Block Ciphers and Data Encryption Standard (DES) - Part 1

Fundamental concepts of Block Cipher Design Principles are discussed. DES is presented. Differential and linear cryptanalysis are explained . Block Cipher Principles Data Encryption Standard (DES) Differential and Linear Cryptanalysis Block Cipher Design Principles

From playlist Network Security

Video thumbnail

Cryptography (part 1 of 3)

An informal introduction to cryptography. Part of a larger series teaching programming at http://codeschool.org

From playlist Cryptography

Video thumbnail

Block Cipher Operation (BCO): Part 1

Fundamental concepts of Block Cipher Operation are discussed. Various extensions of DES are presented. Encryption modes for long messages are explained. Double DES, Triple DES, DES-X Encryption Modes for long messages: Electronic Code Book (ECB) Cipher Block Chaining (CBC) Cipher Feedback

From playlist Cryptography, Security

Video thumbnail

DEFCON 15: Faster PwninG Assured: New adventures with FPGAs

Speaker: David Hulton I've been giving talks on how FPGAs are cool for the past couple of years at Defcon, so what's different this year? Well, I'll be releasing a couple of new tools. BTCrack is a Bluetooth PIN cracker that will allow you to crack 8-digit Bluetooth PINs on an FPGA or 5-

From playlist DEFCON 15

Video thumbnail

The Computer and Turing: Crash Course History of Science #36

Computers and computing have changed a lot over the History of Science but ESPECIALLY over the last 100 years. In this episode of Crash Course History of Science, we have a look at that history around World War Two and how that conflict forced changes in computing. *** Crash Course is

From playlist Back to School - Expanded

Video thumbnail

Why Geniuses were Confused about Negative Numbers ?

Mathematicians of the past used to struggle a lot with negative numbers. We discuss why in this video. The idea was adopted from Martin Gardner's book "Penrose tiles to trapdoor ciphers", chapter 11. Patreon: https://www.patreon.com/MetaMaths Source code for animations: https://github.c

From playlist Math history and stories

Video thumbnail

Floer Theories and Reeb Dynamics for Contact Manifolds - Jo Nelson

Members' Colloquium Topic: Floer Theories and Reeb Dynamics for Contact Manifolds Speaker: Jo Nelson Affiliation: Rice University, Member, School of Mathematics Date: February 13, 2023 Contact topology is the study of certain geometric structures on odd dimensional smooth manifolds. A co

From playlist Mathematics

Video thumbnail

USS England's Twelve Days

In a period of twelve days in May 1944, the Buckley-class destroyer escort USS England set a record unparalleled in the annals of antisubmarine warfare. It is history that deserves to be remembered. Get your free trial of MagellanTV here: https://try.magellantv.com/historyguy/. It's an ex

From playlist US History

Video thumbnail

Week 3: Monday - CS50 2009 - Harvard University

Linear search. Binary search. Asymptotic notation. Recursion. Pseudorandomness. Bubble sort. Selection sort. Insertion sort. Merge sort. Debugging.

From playlist CS50 Lectures 2009

Video thumbnail

Mirror symmetry for chain type polynomials - Umut Varolgunes

IAS/PU-Montreal-Paris-Tel-Aviv Symplectic Geometry Topic: Mirror symmetry for chain type polynomials Speaker: Umut Varolgunes Affiliation: Stanford University Date: October 16, 2020 For more video please visit http://video.ias.edu

From playlist Mathematics

Video thumbnail

Ambushed by Mechanoids - Rimworld Ice Sheet Tribal Ep. 49 [Rimworld 1.0 Ice Sheet Challenge]

In this episode of our Rimworld Ice Sheet Tribal Challenge, we continue to collect materials for the space ship, fend off a Mechanoid raid and get ambushed while we attempt to grab a pile of advanced components. ► Full Playlist: https://goo.gl/q3Cx7t We return to the Ice Sheet in Rimworld

From playlist Pete Completes: Rimworld Ice Sheet Tribal Challenge - Starting with nothing [Rimworld Randy Random Extreme/Merciless]

Video thumbnail

Davide Fermi - Domenico Monaco - Badreddine Benhellal - Léo Morin

* Magnetic perturbations of Aharonov-Bohm and 2-body anyonic Hamiltonians - Davide Fermi * (De)localized Wannier functions for quantum Hall systems - Domenico Monaco * Quantum Con inement induced by Dirac operators with anomalous magnetic - Badreddine Benhellal * Spectral Asymptotics for

From playlist Mathematics of Condensed Matter and Beyond (February 22-25, 2021)

Video thumbnail

RSA

From playlist Week 2 2015 Shorts

Related pages

Invisible ink | Book cipher