Quantum cryptography

BBM92 protocol

BBM92 is a quantum key distribution without Bell's theorem developed using polarized entangled photon pairs by Charles H. Bennett , Gilles Brassard and N. David Mermin in 1992. It is named after the trios surname as (Bennett, Brassard and Mermin, BBM92). It uses decoy state of multiple photon instead of single. The key differences in E91 protocol and B92 uses only two states instead of four states used by E91 protocol and BB84 It is used for non orthogonal quantum transmission 0 can be encrypted as 0 degree and 1 as 45 degree in diagonal basis BB92 protocol. There are no eavesdropping secure and hack proof for distance of 200-300 m. (Wikipedia).

BBM92 protocol
Video thumbnail

Introduction to TCP/IP and Sockets, part 1: Introducing the protocols and API

This is a basic introduction to the Internet protocols and how to use them in programs using sockets. This is the first of two introduction videos on the Internet Protocol and its family of associated protocols (UDP, TCP, etc.) as well as Sockets, a pseudo-standard interface made for prog

From playlist Introduction to TCP/IP and Sockets

Video thumbnail

the Internet (part 2)

An intro to the core protocols of the Internet, including IPv4, TCP, UDP, and HTTP. Part of a larger series teaching programming. See codeschool.org

From playlist The Internet

Video thumbnail

Introduction to TCP/IP and Sockets, part 2: Example code Walk-Through

This is a walk-through of example C++ code for using Sockets to send and receive messages between programs using the Internet protocols. This is part 2 of the series. Part 1 is here: https://youtu.be/C7CpfL1p6y0 Here is a link to all the code: https://github.com/rhymu8354/SocketTutori

From playlist Introduction to TCP/IP and Sockets

Video thumbnail

29C3: ISP's black box (EN)

Speaker: Luka Perkov provisioning behind the scene This talk is aimed to give an insight into CPE WAN Management Protocol (CWMP) and its GPLv2 implementations that were developed in the past year. CWMP (often called only TR-069) enables ISP to remotely configure, manage, upgrade and trou

From playlist 29C3: Not my department

Video thumbnail

IPv4 vs IPv6 | Difference Between IPv4 and IPv6 | IP Address Explained | IP Address | Simplilearn

In this video on IPv4 vs IPv6, we will understand some of the details regarding IPv4 and IPv6 network addresses. Then continuing with differences between IPv4 and IPv6, which are based on various features in accordance to the network settings, using these points, we can easily and efficien

From playlist Cyber Security Playlist [2023 Updated]🔥

Video thumbnail

Stanford Seminar - The TLS 1.3 Protocol

"The TLS 1.3 Protocol" - Eric Rescorla of Mozilla and RTFM, Inc. About the talk: Transport Layer Security (TLS) is used for securing everything from Web transactions (HTTPS) to voice and video calls (DTLS-SRTP). However, the basic design of TLS dates back to the mid 1990s and the protocol

From playlist Engineering

Video thumbnail

EEVblog #635 - FPGA's Vs Microcontrollers

How easy are FPGA's to hook up and use use compared to traditional microcontrollers? A brief explanation of why FPGA are a lot more complicated to setup and get working than microcontrollers. A short video linking to several other FGPA videos. NOTE: This is very old footage that was meant

From playlist FPGA / Programmable Logic

Video thumbnail

MPC in the Head With Applications to Blockchain (Lecture 2) by Carmit Hazay

DISCUSSION MEETING : FOUNDATIONAL ASPECTS OF BLOCKCHAIN TECHNOLOGY ORGANIZERS : Pandu Rangan Chandrasekaran DATE : 15 to 17 January 2020 VENUE : Madhava Lecture Hall, ICTS, Bangalore Blockchain technology is among one of the most influential disruptive technologies of the current decade.

From playlist Foundational Aspects of Blockchain Technology 2020

Video thumbnail

A Tutorial on Network Protocols

Cryptography and Network Security by Prof. D. Mukhopadhyay, Department of Computer Science and Engineering, IIT Kharagpur. For more details on NPTEL visit http://nptel.iitm.ac.in

From playlist Computer - Cryptography and Network Security

Video thumbnail

Communications and Network Security | CISSP Training Videos

🔥 Enroll for FREE CISSP Course & Get your Completion Certificate: https://www.simplilearn.com/learn-cloud-security-basics-skillup?utm_campaign=CCSP&utm_medium=DescriptionFirstFold&utm_source=youtube Communication and Network Security : Domain 4 of the CISSP certification course offered by

From playlist Cyber Security Playlist [2023 Updated]🔥

Video thumbnail

The information cost of quantum memoryless protocols - M. Lauriere - Main Conference - CEB T3 2017

Mathieu Lauriere (NYU Shanghai) / 12.12.2017 Title: The information cost of quantum memoryless protocols Abstract: In this talk, we will consider memoryless quantum communication protocols, where the two parties do not possess any memory besides their classical input and they take turns

From playlist 2017 - T3 - Analysis in Quantum Information Theory - CEB Trimester

Video thumbnail

Selective Repeat ARQ Explained | Selective Repeat Protocol | Networking Tutorial | Simplilearn

🔥Advanced Executive Program In Cybersecurity: https://www.simplilearn.com/pgp-advanced-executive-program-in-cyber-security?utm_campaign=SelectiveRepeatARQExplained-dUX8A6VTqdk&utm_medium=Descriptionff&utm_source=youtube🔥Caltech Cybersecurity Bootcamp(US Only): https://www.simplilearn.com/c

From playlist Cyber Security Playlist [2023 Updated]🔥

Video thumbnail

Black Hat USA 2010: Burning Asgard: What Happens When Loki Breaks Free 2/5

Speakers: Enno Rey, Daniel Mende I personally remember the release of Yersinia at Black Hat Europe 2005. It was a ground breaking experience: a number of Layer 2 attacks regarded purely theoretical until then, was suddenly available in a mostly automated way. And those guys even showed so

From playlist BH USA 2010 - NETWORK

Video thumbnail

the Internet (part 4)

An intro to the core protocols of the Internet, including IPv4, TCP, UDP, and HTTP. Part of a larger series teaching programming. See codeschool.org

From playlist The Internet

Video thumbnail

29C3: The future of protocol reversing and simulation applied on ZeroAccess botnet (EN)

Speakers: Frédéric Guihéry | Georges Bossert Mapping your enemy Botnet with Netzob Have you ever been staring for nights at binary or hexadecimal data flows extracted from an USB channel? Don't you remember yourself searching for some patterns and similarities in this fuc*g mess of zeros

From playlist 29C3: Not my department

Related pages

BB84 | Bell's theorem | Quantum key distribution | Decoy state