Cryptographic algorithms

Ciphertext stealing

In cryptography, ciphertext stealing (CTS) is a general method of using a block cipher mode of operation that allows for processing of messages that are not evenly divisible into blocks without resulting in any expansion of the ciphertext, at the cost of slightly increased complexity. (Wikipedia).

Ciphertext stealing
Video thumbnail

Cryptograph: Substitution Cipher (Caesar Cipher)

This lesson explains how to encrypt and decrypt a message using a Caeser cipher. Site: http://mathispower4u.com

From playlist Cryptography

Video thumbnail

Cryptography (part 2 of 3)

An informal introduction to cryptography. Part of a larger series teaching programming at http://codeschool.org

From playlist Cryptography

Video thumbnail

Cryptography (part 1 of 3)

An informal introduction to cryptography. Part of a larger series teaching programming at http://codeschool.org

From playlist Cryptography

Video thumbnail

Correctness And Security - Applied Cryptography

This video is part of an online course, Applied Cryptography. Check out the course here: https://www.udacity.com/course/cs387.

From playlist Applied Cryptography

Video thumbnail

Steganography Tutorial - Hide Messages In Images

Steganography is the hiding of a secret message within an ordinary message and the extraction of it at its destination. Steganography takes cryptography a step further by hiding an encrypted message so that no one suspects it exists. Ideally, anyone scanning your data will fail to know it

From playlist Ethical Hacking & Penetration Testing - Complete Course

Video thumbnail

Modes of Operation of Block Ciphers

Cryptography and Network Security by Prof. D. Mukhopadhyay, Department of Computer Science and Engineering, IIT Kharagpur. For more details on NPTEL visit http://nptel.iitm.ac.in

From playlist Computer - Cryptography and Network Security

Video thumbnail

Perfect Cipher - Applied Cryptography

This video is part of an online course, Applied Cryptography. Check out the course here: https://www.udacity.com/course/cs387.

From playlist Applied Cryptography

Video thumbnail

Symmetric Key Cryptography: The Caesar Cipher

This is the first in a series about cryptography; an extremely important aspect of computer science and cyber security. It introduces symmetric key cryptography with a well known substitution cipher, namely the Caesar Cipher. It includes a few examples you can try for yourself using diff

From playlist Cryptography

Video thumbnail

Weak Ciphers - Applied Cryptography

This video is part of an online course, Applied Cryptography. Check out the course here: https://www.udacity.com/course/cs387.

From playlist Applied Cryptography

Video thumbnail

Ethical Hacking Tutorial For Beginners [2023] | Learn Ethical hacking From Scratch | Edureka

๐Ÿ”ฅ๐„๐๐ฎ๐ซ๐ž๐ค๐š'๐ฌ ๐‚๐ž๐ซ๐ญ๐ข๐Ÿ๐ข๐ž๐ ๐„๐ญ๐ก๐ข๐œ๐š๐ฅ ๐‡๐š๐œ๐ค๐ข๐ง๐  ๐‚๐จ๐ฎ๐ซ๐ฌ๐ž - ๐‚๐„๐‡ ๐ฏ๐Ÿ๐Ÿ: https://www.edureka.co/ceh-ethical-hacking-certification-course This Edureka "Ethical Hacking Tutorial for Beginners" video will introduce you the world of Ethical Hacking. This video will help you learn Ethical Hacking from scratch. B

From playlist Ethical Hacking Tutorial For Beginners | Edureka

Video thumbnail

Ethical Hacking Tutorial For Beginners | Ethical Hacking Course | Ethical Hacking Training | Edureka

๐Ÿ”ฅEdureka Cyber Security Course: https://www.edureka.co/cybersecurity-certification-training ๐Ÿ”ต Edureka Cyber Security Masters Program: https://bit.ly/3pfHHIN This Edureka "Ethical Hacking Tutorial" video will give you an introduction to Ethical Hacking. This video will give you an exhaustiv

From playlist Cyber Security Training for Beginners | Edureka

Video thumbnail

Symmetric Key Cryptography And Asymmetric Key Cryptography | Cryptography Tutorial | Simplilearn

๐Ÿ”ฅAdvanced Executive Program In Cybersecurity: https://www.simplilearn.com/pgp-advanced-executive-program-in-cyber-security?utm_campaign=SymmetricKeyCryptographyAndAsymmetricKeyCryptography&utm_medium=Descriptionff&utm_source=youtube ๐Ÿ”ฅCaltech Cybersecurity Bootcamp(US Only): https://www.sim

From playlist Cyber Security Playlist [2023 Updated]๐Ÿ”ฅ

Video thumbnail

CS50W 2018 - Lecture 11 - Security

TABLE OF CONTENTS 00:00:00 - Introduction 00:00:37 - Security 00:01:39 - Git 00:02:01 - Open-Source Software 00:05:22 - Two-Factor Authentication 00:08:47 - HTML 00:15:26 - Flask 00:15:49 - HTTP and HTTPS 00:17:47 - Cryptography 00:20:42 - Public-Key Cryptography 00:23:21 - Environment Va

From playlist CS50's Web Programming with Python and JavaScript

Video thumbnail

OWASP AppSec EU 2013: Keynote: Cryptography in Web Security: Stupid, Broken, and maybe Working?

For more information and to download the video visit: http://bit.ly/appseceu13 Playlist OWASP AppSec EU 2013: http://bit.ly/plappseceu13 Speaker: Jรถrg Schwenk

From playlist OWASP AppSec EU 2013

Video thumbnail

Cyber Security Full Course 2023 | Cyber Security Course Training For Beginners 2023 | Simplilearn

๐Ÿ”ฅAdvanced Executive Program In Cybersecurity: https://www.simplilearn.com/pgp-advanced-executive-program-in-cyber-security?utm_campaign=CyberSecurityFullCourse2023-hXSFdwIOfnE&utm_medium=Descriptionff&utm_source=youtube ๐Ÿ”ฅCaltech Cybersecurity Bootcamp(US Only): https://www.simplilearn.

From playlist Cyber Security Playlist [2023 Updated]๐Ÿ”ฅ

Video thumbnail

CS105: Introduction to Computers | 2021 | Lecture 20.2 Computer Security: Mechanisms

Patrick Young Computer Science, PhD This course is a survey of Internet technology and the basics of computer hardware. You will learn what computers are and how they work and gain practical experience in the development of websites and an introduction to programming. To follow along wi

From playlist Stanford CS105 - Introduction to Computers Full Course

Video thumbnail

Week 2: Wednesday - CS50 2008 - Harvard University

Functions, continued. Global variables. Parameters. Return values. Stack. Frames. Scope. Arrays. Strings. Command-line arguments. Cryptography.

From playlist CS50 Lectures 2008

Video thumbnail

Ethical Hacking Tutorial Basics-Why, what, how? | Ethical Hacking Training | Edureka Ethical Hacking

๐Ÿ”ฅEdureka Online Training: https://www.edureka.co/cybersecurity-certification-training This Edureka "Ethical Hacking Tutorial" LIVE session will give you an introduction to Ethical Hacking. This video will give you an exhaustive video on key topics of Ethical Hacking for beginners! ๐Ÿ”ต PGP

From playlist Edureka Live Classes 2020

Video thumbnail

Yes, You Too Can Break Crypto: Exploiting Common Crypto Mistakes

Cryptography is tricky. Sure, everybody knows not to roll out their own crypto, but is it enough? Are the standard algorithms, libraries, and utilities always used the right way? This is of course a rhetorical question! Humans keep making mistakes that other humans can exploit, and Murphyโ€™

From playlist Security

Related pages

Plaintext | Initialization vector | Ciphertext | Data structure alignment | Block size (cryptography) | Padding (cryptography) | Block cipher mode of operation | Cryptography