Cryptographic hash functions | Key derivation functions | Broken cryptography algorithms

Crypt (C)

crypt is a POSIX C library function. It is typically used to compute the hash of user account passwords. The function outputs a text string which also encodes the salt (usually the first two characters are the salt itself and the rest is the hashed result), and identifies the hash algorithm used (defaulting to the "traditional" one explained below). This output string forms a password record, which is usually stored in a text file. More formally, crypt provides cryptographic key derivation functions for password validation and storage on Unix systems. (Wikipedia).

Video thumbnail

Cryptography (part 1 of 3)

An informal introduction to cryptography. Part of a larger series teaching programming at http://codeschool.org

From playlist Cryptography

Video thumbnail

Cryptanalysis of Classical Ciphers

Cryptography and Network Security by Prof. D. Mukhopadhyay, Department of Computer Science and Engineering, IIT Kharagpur. For more details on NPTEL visit http://nptel.iitm.ac.in

From playlist Computer - Cryptography and Network Security

Video thumbnail

How To Create Cryptocurrency In C++ | Introduction | #C | #crypto | #blockchain

Don’t forget to subscribe! This project series will teach you how to create your own cryptocurrency in C++. Throughout this course we will learn how to fork a crypto project, renaming things in the project, creating our very own genesis block, and changing parameters and values. In the en

From playlist Create Cryptocurrency In C++

Video thumbnail

Intro to Cryptography

This video gives a general introduction to cryptography WITHOUT actually doing any math. Terms covered include cryptology vs cryptography vs cryptanalysis, symmetric vs public key systems, and "coding theory." NOTE: Yes, I said and wrote "cryptOanalysis" when it's actually "cryptanalysis

From playlist Cryptography and Coding Theory

Video thumbnail

GoRuCo 2013 - Krypt. Semper Pi. by Martin Bosslet

Many people don't like Cryptography. Whenever he falls out of a bar, he carries this strong odor of ivory-towering, bikeshedding and plain, outright arrogance. He seems to be a loner and a smartass, rude, and it's hard to follow his boring, lengthy explanations. But once you get to know hi

From playlist GoRuCo 2013

Video thumbnail

How To Create Cryptocurrency In C++ | Session 01 | #C | #crypto | #blockchain

Don’t forget to subscribe! This project series will teach you how to create your own cryptocurrency in C++. Throughout this course we will learn how to fork a crypto project, renaming things in the project, creating our very own genesis block, and changing parameters and values. In the en

From playlist Create Cryptocurrency In C++

Video thumbnail

Ruby Conf 12 - Krypt the next level of Ruby Cryptogaphy by Martin Boßlet

Last year it was an idea, more of it in our heads than on github. This year, krypt is reality, it's growing quickly and its goal is to become the successor of the OpenSSL extension. Learn about why we need a successor at all, about the evils of OpenSSL certificate validation and how krypt

From playlist Ruby Conference 2012

Video thumbnail

How To Create Cryptocurrency In C++ | Session 03 | #C | #crypto | #blockchain

Don’t forget to subscribe! This project series will teach you how to create your own cryptocurrency in C++. Throughout this course we will learn how to fork a crypto project, renaming things in the project, creating our very own genesis block, and changing parameters and values. In the en

From playlist Create Cryptocurrency In C++

Video thumbnail

Rocky Mountain Ruby 2014 - 80,00 Plaintext Passwords

fluffmuffin, peppercorn, gilligan — those are just a few of our users' plaintext passwords. I have 80,000 more, and it only took me 87 seconds to gather them from our customer database in a white-hat attack. In Act I, we'll cover the history of secure password storage, examine the hack,

From playlist Rocky Mountain Ruby 2014

Video thumbnail

How To Create Cryptocurrency In C++ | Session 02 | #C | #crypto | #blockchain

Don’t forget to subscribe! This project series will teach you how to create your own cryptocurrency in C++. Throughout this course we will learn how to fork a crypto project, renaming things in the project, creating our very own genesis block, and changing parameters and values. In the en

From playlist Create Cryptocurrency In C++

Video thumbnail

How To Create Cryptocurrency In C++ | Session 04 | #C | #crypto | #blockchain

Don’t forget to subscribe! This project series will teach you how to create your own cryptocurrency in C++. Throughout this course we will learn how to fork a crypto project, renaming things in the project, creating our very own genesis block, and changing parameters and values. In the en

From playlist Create Cryptocurrency In C++

Video thumbnail

How To Create Cryptocurrency In C++ | Session 05 | #C | #crypto | #blockchain

Don’t forget to subscribe! This project series will teach you how to create your own cryptocurrency in C++. Throughout this course we will learn how to fork a crypto project, renaming things in the project, creating our very own genesis block, and changing parameters and values. In the en

From playlist Create Cryptocurrency In C++

Video thumbnail

TUT1062 SAP HANA Replication and SUSE HA Security Best Practice

This tutorial session was delivered at SUSECON in April 2019, in Nashville, TN. Abstract: Demo on how to run HANA 2.0 using SUSE HA Extension. HANA 2.0 will be demonstrated on how to manage multi tenant databases using HANA Cockpit 2.0. The technical demo includes a setup of SAP HANA Rep

From playlist SUSECON 2019

Video thumbnail

Unity Tutorial | How To Create Zombie Mobile VR Game In Unity3D | Session 09 | #unity3d | #gamedev

Don’t forget to subscribe! In this Unity tutorial, you will learn to create a zombie mobile VR game in Unity3D. This project is for any beginner, intermediate or expert developer in ( VR )Virtual Reality. The project will cover everything that is required to build and test a complete Zom

From playlist Create Zombie Mobile VR Game In Unity3D

Video thumbnail

24. Stem Cells, Apoptosis, & Tissue Homeostasis

MIT 7.016 Introductory Biology, Fall 2018 Instructor: Adam Martin View the complete course: https://ocw.mit.edu/7-016F18 YouTube Playlist: https://www.youtube.com/playlist?list=PLUl4u3cNGP63LmSVIVzy584-ZbjbJ-Y63 Professor Martin talks about the regenerative and renewal capabilities of cel

From playlist MIT 7.016 Introductory Biology, Fall 2018

Video thumbnail

25c3: Full-Disk-Encryption Crash-Course

Speaker: Juergen Pabel Everything to hide This is not a hacking presentation, no vulnerabilities are presented. It's a crash-course in full-disk-encryption ("FDE") concepts, products and implementation aspects. An overview of both commercial and open-source offerings for Windows, Linux,

From playlist 25C3: Nothing to hide

Video thumbnail

Symmetric Key Cryptography: The Caesar Cipher

This is the first in a series about cryptography; an extremely important aspect of computer science and cyber security. It introduces symmetric key cryptography with a well known substitution cipher, namely the Caesar Cipher. It includes a few examples you can try for yourself using diff

From playlist Cryptography

Video thumbnail

Turing's Enigma Problem (Part 1) - Computerphile

The Enigma cipher machine, said to be unbreakable. Alan Turing had a pivotal role in cracking Enigma codes during WWII. Professor Brailsford takes us through just what Turing and his team were up against. Engima Part 2: http://youtu.be/kj_7Jc1mS9k Professor Brailsford's notes: http://bit

From playlist Subtitled Films

Related pages

Serialization | Argon2 | Scrypt | MD5 | Blowfish (cipher) | Bcrypt | Cryptographic hash function | Crypt (Unix) | Password Hashing Competition | SHA-1 | Code | SHA-2 | Salt (cryptography) | MD4 | Key derivation function | Dictionary attack | MS-CHAP | Base64 | Data Encryption Standard