Theory of cryptography | Cryptography
In cryptography, concrete security or exact security is a practice-oriented approach that aims to give more precise estimates of the computational complexities of adversarial tasks than polynomial equivalence would allow. It quantifies the security of a cryptosystem by bounding the probability of success for an adversary running for a fixed amount of time. Security proofs with precise analyses are referred to as concrete. Traditionally, provable security is asymptotic: it classifies the hardness of computational problems using polynomial-time reducibility. Secure schemes are defined to be those in which the advantage of any computationally bounded adversary is negligible. While such a theoretical guarantee is important, in practice one needs to know exactly how efficient a reduction is because of the need to instantiate the security parameter - it is not enough to know that "sufficiently large" security parameters will do. An inefficient reduction results either in the success probability for the adversary or the resource requirement of the scheme being greater than desired. Concrete security parametrizes all the resources available to the adversary, such as running time and memory, and other resources specific to the system in question, such as the number of plaintexts it can obtain or the number of queries it can make to any oracles available. Then the advantage of the adversary is upper bounded as a function of these resources and of the problem size. It is often possible to give a lower bound (i.e. an adversarial strategy) matching the upper bound, hence the name exact security. (Wikipedia).
Network Security, Part 1 : Basic Encryption Techniques
Fundamental concepts of network security are discussed. It provides a good overview of secret Key and public key Encryption. Important data encryption standards are presented.
From playlist Network Security
Fundamental concepts of intrusion detection are discussed. Various types of intrusion are analyzed. Password management is explained.
From playlist Network Security
Transport Layer Security: Part 1
Fundamental concepts of TLS are discussed. SSL is analyzed. HTTPS & SSH are presented.
From playlist Network Security
Network Security: Classical Encryption Techniques
Fundamental concepts of encryption techniques are discussed. Symmetric Cipher Model Substitution Techniques Transposition Techniques Product Ciphers Steganography
From playlist Network Security
Fundamental concepts of intrusion detection are discussed. Various types of intrusion are analyzed. Password management is explained.
From playlist Network Security
Transport Layer Security: Part 2 - TLS & HTTPS
Fundamental concepts of TLS are discussed. SSL is analyzed. HTTPS & SSH are presented.
From playlist Network Security
What do we mean by device security? Why should we care about this?
Keep your smart devices safe! Learn what device security is, and how it protects your phones, tablets, and computers from being accessed and exploited by cybercriminals.
From playlist Internet Safety
Firmware Security: Why It Matters and How You Can Have It
A system is only as secure as the least secure component it depends on. Hardening the kernel is a vital part of developing a secure operating system, but if the firmware underneath the kernel is insecure then attackers have an opportunity to sidestep your security and compromise you anyway
From playlist Security
Fundamental concepts of IPSec are discussed. Authentication Header is explained. ESP & IKE are analyzed.
From playlist Network Security
DeepSec 2010: Circumventing common Pitfalls when auditing sourcecode for Security Vulnerabilities
Thanks to the DeepSec organisation for making these videos available and let me share the videos on YouTube. Speakers: Aljosha Judmaier | David White, SEC Consult There comes the time where a true security expert has to look at some source code. Everybody knows that ----real men---- use
From playlist DeepSec 2010
MPC in the Head With Applications to Blockchain (Lecture 2) by Carmit Hazay
DISCUSSION MEETING : FOUNDATIONAL ASPECTS OF BLOCKCHAIN TECHNOLOGY ORGANIZERS : Pandu Rangan Chandrasekaran DATE : 15 to 17 January 2020 VENUE : Madhava Lecture Hall, ICTS, Bangalore Blockchain technology is among one of the most influential disruptive technologies of the current decade.
From playlist Foundational Aspects of Blockchain Technology 2020
Stanford Seminar - Protecting Patient Privacy in Genomic Analysis
One of the challenges for patients with rare diseases is the lack of local data to use for analysis. As a result, patients are having to rely on 3rd party facilities to carry out the computations based on data collected around the globe. But due to patient privacy concerns, as well as heav
From playlist Stanford Seminars
DeepSec 2011: Do They Deliver? - Practical Security and Load Testing of Cloud Service Providers
Speaker: Matthias Luft | Enno Rey Matthias Luft talks at the DeepSec 2011 conference about cloud service providers and cloud security: The rapid evolution of cloud based computing is often used to illustrate a possible paradigm shift in computing. The centralized processing and storing
From playlist DeepSec 2011
CERN checks Particle Physics Anomaly, A New Explanation for the Interstellar Object 'Oumuamua & More
Check out Ground News to raise your news reading to a higher level: https://ground.news/sabine Correction to what I say at 9:45 -- That should have been *billions* of course, not millions! Sorry about that. Today we’ll talk a new explanation for the interstellar object Oumuamua, what’s u
From playlist Weekly Science News
Secure computation with RAMs - Dr Mariana Raykova, Yale University
Secure computation with RAMs: revisiting square root ORAM and low leakage secure Boolean queries Hiding memory access patterns is required for secure computation, but remains prohibitively expensive for many interesting applications. This talk presents two works addressing this question:
From playlist Turing Seminars
The Engineering Behind Disney's Floating Mountains
A look at the design and construction of Disney’s floating mountains located within Pandora – The World of Avatar. Support Art of Engineering on Patreon: https://www.patreon.com/ArtofEngineering Shop Art of Engineering Merchandise: https://teespring.com/stores/ArtofEngineering Twitter:
From playlist Theme Park Engineering
Himmler's Mini-Wolf's Lair - SS Hochwald
Near the Wolf's Lair in present-day Poland are the ruins of Hochwald, Himmler's forgotten SS headquarters for the Eastern Front. Discover the history of this most secret site. Special thanks to Mike Muzik for Hochwald footage - please visit his channel for more footage of German command f
From playlist Trains
UK: British Hollywood - A New Studio (1927)
EMPIRE NEWS NEWSREEL (REUTERS) To license this film, visit https://www.britishpathe.com/video/VLVACGLZO91R6FZQXDK0C58BGM7Q4-RTV A British Hollywood! The world's largest concrete building secured for production of British films. The man behind? Full Description: ENGLAND, UK A British
From playlist EMPIRE NEWS NEWSREEL (REUTERS)
4 Myths About Construction Debunked
Let's set the record straight for a few construction misconceptions! Errata: The shot at 4:16 is of the Greek Acropolis (not a Roman structure). Over the past 6 years of reading emails and comments from people who watch Practical Engineering, I know that parts of heavy construction are c
From playlist Civil Engineering