Cryptography

Deniable encryption

In cryptography and steganography, plausibly deniable encryption describes encryption techniques where the existence of an encrypted file or message is deniable in the sense that an adversary cannot prove that the plaintext data exists. The users may convincingly deny that a given piece of data is encrypted, or that they are able to decrypt a given piece of encrypted data, or that some specific encrypted data exists. Such denials may or may not be genuine. For example, it may be impossible to prove that the data is encrypted without the cooperation of the users. If the data is encrypted, the users genuinely may not be able to decrypt it. Deniable encryption serves to undermine an attacker's confidence either that data is encrypted, or that the person in possession of it can decrypt it and provide the associated plaintext. (Wikipedia).

Video thumbnail

Cryptography (part 1 of 3)

An informal introduction to cryptography. Part of a larger series teaching programming at http://codeschool.org

From playlist Cryptography

Video thumbnail

Network Security: Classical Encryption Techniques

Fundamental concepts of encryption techniques are discussed. Symmetric Cipher Model Substitution Techniques Transposition Techniques Product Ciphers Steganography

From playlist Network Security

Video thumbnail

Cryptanalysis of Classical Ciphers

Cryptography and Network Security by Prof. D. Mukhopadhyay, Department of Computer Science and Engineering, IIT Kharagpur. For more details on NPTEL visit http://nptel.iitm.ac.in

From playlist Computer - Cryptography and Network Security

Video thumbnail

Block Ciphers and Data Encryption Standard (DES): Part 2

Fundamental concepts of Block Cipher Design Principles are discussed. Differential cryptanalysis and linear cryptanalysis are explained.

From playlist Network Security

Video thumbnail

Off-the-Record Messaging: Useful Security and Privacy for IM

May 23, 2007 lecture by Ian Goldberg for the Stanford University Computer Systems Colloquium (EE 380). In this talk, Ian discusses "Off-the-Record Messaging" (OTR), a widely used software tool for secure and private instant messaging; he outlines the properties of Useful Security and Priva

From playlist Course | Computer Systems Laboratory Colloquium (2006-2007)

Video thumbnail

Picking E And D Solution - Applied Cryptography

This video is part of an online course, Applied Cryptography. Check out the course here: https://www.udacity.com/course/cs387.

From playlist Applied Cryptography

Video thumbnail

Network Security, Part 2 : Public Key Encryption

Fundamental concepts of public key encryption are discussed. RSA encryption method explained with an example. Confidentiality of message is presented.

From playlist Cryptography, Security

Video thumbnail

Correctness Of RSA - Applied Cryptography

This video is part of an online course, Applied Cryptography. Check out the course here: https://www.udacity.com/course/cs387.

From playlist Applied Cryptography

Video thumbnail

Cryptography and Preventing Collusion in Second Price (Vickery) Auctions - Michael Rabin

Michael Rabin Harvard University and Columbia University April 29, 2013 We present practically efficient methods for proving correctness of announced results of a computation while keeping input and intermediate values information theoretically secret. These methods are applied to solve th

From playlist Mathematics

Video thumbnail

Symmetric Key Cryptography: The Caesar Cipher

This is the first in a series about cryptography; an extremely important aspect of computer science and cyber security. It introduces symmetric key cryptography with a well known substitution cipher, namely the Caesar Cipher. It includes a few examples you can try for yourself using diff

From playlist Cryptography

Video thumbnail

OHM2013: USE OTR!

For more information visit: http://bit.ly/OHM13_web To download the video visit: http://bit.ly/OHM13_down Playlist OHM 2013: http://bit.ly/OHM13_pl Speakers: Jurre van Bergen | David Goulet USE OTR is an organisation that works on security, encryption and usability of open source instant

From playlist OHM 2013

Video thumbnail

DEFCON 18: Changing Threats To Privacy: From TIA to Google 3/3

Speaker: Moxie Marlinspike A lot has changed since discussions around digital privacy began. The security community won the war for strong cryptography, anonymous darknets have been successfully deployed, and much of the communications infrastructure has been decentralized. These strate

From playlist DEFCON 18-2

Video thumbnail

You Should Make A Digital Bugout Bag

Support independent research and analysis by joining my Patreon page: https://www.patreon.com/thehatedone International Red Cross recommends that all persons have an emergency survival kit with multiday supplies of the most essential items. This is in case of any natural or man-made cri

From playlist TUTORIALS & HOW TO's

Video thumbnail

ShmooCon 2014: Keynote - Privacy Online: What Now?

For more information visit: http://bit.ly/shmooc14 To download the video visit: http://bit.ly/shmooc14_down Playlist Shmoocon 2014: http://bit.ly/shmooc14_pl Speaker: Ian Goldberg Recent revelations about data and metadata collection of Internet users' communications have been extremely

From playlist ShmooCon 2014

Video thumbnail

DEFCON 14: The Plausible Deniability Toolkit

Speakers: weasel, Nomad Mobile Research Centre simple nomad, Nomad Mobile Research Centre Abstract: The Plausible Deniability Toolkit is a collection of processes and tools designed to protect its users from invasions of privacy and infringement of civil rights by oppresive organizations

From playlist DEFCON 14

Video thumbnail

Blackhat Europe 2010: Changing Threats To Privacy: From TIA to Google 5/7

Clip 5/7 Speaker: Moxie Marlinspike We won the war for strong cryptography, anonymous darknets exist in the wild today, and decentralized communication networks have emerged to become reality. These strategies for communicating online were conceived of in anticipation of a dystopian futur

From playlist Black Hat Europe 2010

Video thumbnail

How To Protect Your Online Privacy With A Threat Model | Tutorial 2022

Privacy tutorial with a threat model methodology. This will help you achieve strong privacy consistently and reliably. Support independent research: https://www.patreon.com/thehatedone Privacy tools are inconsistent. The inventory of recommended countermeasures changes all the time. On t

From playlist Security by compartmentalization - learn to protect your privacy effectively

Video thumbnail

DEFCON 19: Pervasive Cloaking

Speaker: William Manning Booz Allen Hamilton What Cloak? Recent policy proposals from the US Executive seem to call for government support for strong encryption use by individuals and vendors in the name of protecting privacy and anonymity. Yet strong encryption is still considered a cont

From playlist DEFCON 19

Video thumbnail

Public Key Cryptography & RSA: Part 1

Fundamental concepts of Public Key Encryption are discussed. RSA Public Encryption is presented. Optimization of Private Key operations is analyzed. Public Key Encryption Symmetric vs. Public-Key RSA Public Key Encryption RSA Key Construction Optimizing Private Key Operations RSA Securit

From playlist Network Security

Related pages

TrueCrypt | Disk encryption software | Pseudorandom permutation | Randomness | Disk encryption | Encryption | Block cipher | Cryptographic hash function | Rubberhose (file system) | Edit distance | Key (cryptography) | Cryptography | Watermarking attack | Ciphertext | OpenPuff | StegFS | Cryptographically secure pseudorandom number generator | VeraCrypt | Plaintext | BestCrypt | Steganography