Disk encryption

Dm-crypt

dm-crypt is a transparent block device encryption subsystem in Linux kernel versions 2.6 and later and in DragonFly BSD. It is part of the device mapper (dm) infrastructure, and uses cryptographic routines from the kernel's Crypto API. Unlike its predecessor cryptoloop, dm-crypt was designed to support advanced modes of operation, such as XTS, LRW and ESSIV (see disk encryption theory for further information), in order to avoid watermarking attacks. In addition to that, dm-crypt addresses some reliability problems of cryptoloop. dm-crypt is implemented as a device mapper target and may be stacked on top of other device mapper transformations. It can thus encrypt whole disks (including removable media), partitions, software RAID volumes, logical volumes, as well as files. It appears as a block device, which can be used to back file systems, swap or as an LVM physical volume. Some Linux distributions support the use of dm-crypt on the root file system. These distributions use initrd to prompt the user to enter a passphrase at the console, or insert a smart card prior to the normal boot process. (Wikipedia).

Video thumbnail

Symmetric Key Cryptography: The Caesar Cipher

This is the first in a series about cryptography; an extremely important aspect of computer science and cyber security. It introduces symmetric key cryptography with a well known substitution cipher, namely the Caesar Cipher. It includes a few examples you can try for yourself using diff

From playlist Cryptography

Video thumbnail

File Encryption - Applied Cryptography

This video is part of an online course, Applied Cryptography. Check out the course here: https://www.udacity.com/course/cs387.

From playlist Applied Cryptography

Video thumbnail

Public key cryptography - Diffie-Hellman Key Exchange (full version)

The history behind public key cryptography & the Diffie-Hellman key exchange algorithm. We also have a video on RSA here: https://www.youtube.com/watch?v=wXB-V_Keiu8

From playlist Cryptography, Security

Video thumbnail

Totient - Applied Cryptography

This video is part of an online course, Applied Cryptography. Check out the course here: https://www.udacity.com/course/cs387.

From playlist Applied Cryptography

Video thumbnail

Cryptography (part 1 of 3)

An informal introduction to cryptography. Part of a larger series teaching programming at http://codeschool.org

From playlist Cryptography

Video thumbnail

25c3: Full-Disk-Encryption Crash-Course

Speaker: Juergen Pabel Everything to hide This is not a hacking presentation, no vulnerabilities are presented. It's a crash-course in full-disk-encryption ("FDE") concepts, products and implementation aspects. An overview of both commercial and open-source offerings for Windows, Linux,

From playlist 25C3: Nothing to hide

Video thumbnail

27c3: FrozenCache

Speaker: Juergen Pabel Mitigating cold-boot attacks for Full-Disk-Encryption software Cold boot attacks are a major risk for the protection that Full-Disk-Encryption solutions provide. FrozenCache is a general-purpose solution to this attack for x86 based systems that employs a special C

From playlist 27C3: We come in peace

Video thumbnail

27c3: FrozenCache (en)

Speaker: Juergen Pabel Mitigating cold-boot attacks for Full-Disk-Encryption software Cold boot attacks are a major risk for the protection that Full-Disk-Encryption solutions provide. FrozenCache is a general-purpose solution to this attack for x86 based systems that employs a specia

From playlist 27C3: We come in peace

Video thumbnail

Cryptanalysis of Classical Ciphers

Cryptography and Network Security by Prof. D. Mukhopadhyay, Department of Computer Science and Engineering, IIT Kharagpur. For more details on NPTEL visit http://nptel.iitm.ac.in

From playlist Computer - Cryptography and Network Security

Video thumbnail

26C3: Lightning Talks - Day 2 6/14

Clip 6/14 Speakers: Oliver Pritzkow. Sven Guckes 4 minutes of fame 4 minutes for every speaker. Learn about the good, the bad, and the ugly - in software, hardware, projects, and more. For more information go to: http://events.ccc.de/congress/2009/Fahrplan/events/3642.en.html

From playlist 26C3: Here be dragons day 2

Video thumbnail

Python Flask Tutorial: Full-Featured Web App Part 6 - User Authentication

In this Python Flask Tutorial, we will be learning how to add users to our database. We will then create an authentication system so that users can log in and log out of our application. We will be using the flask-bcrypt and flask-login extensions to help us with this. Let's get started...

From playlist Flask Tutorials

Video thumbnail

How To Set Up A Private Docker Registry On Ubuntu | Session 03 | #ubuntu | #programming

Don’t forget to subscribe! This project series is about setting up a private docker registry on Unbuntu. This tutorial will cover downloading and installing docker, the registry, setup, and deployment on your local machine. After this tutorial, you should be able to get your own registry

From playlist Set Up A Private Docker Registry On Ubuntu

Video thumbnail

How To Set Up A Private Docker Registry On Ubuntu | Session 05 | #ubuntu | #programming

Don’t forget to subscribe! This project series is about setting up a private docker registry on Unbuntu. This tutorial will cover downloading and installing docker, the registry, setup, and deployment on your local machine. After this tutorial, you should be able to get your own registry

From playlist Set Up A Private Docker Registry On Ubuntu

Video thumbnail

Symmetric Cryptosystems - Applied Cryptography

This video is part of an online course, Applied Cryptography. Check out the course here: https://www.udacity.com/course/cs387.

From playlist Applied Cryptography

Video thumbnail

GoRuCo 2013 - Krypt. Semper Pi. by Martin Bosslet

Many people don't like Cryptography. Whenever he falls out of a bar, he carries this strong odor of ivory-towering, bikeshedding and plain, outright arrogance. He seems to be a loner and a smartass, rude, and it's hard to follow his boring, lengthy explanations. But once you get to know hi

From playlist GoRuCo 2013

Video thumbnail

Picking E And D Solution - Applied Cryptography

This video is part of an online course, Applied Cryptography. Check out the course here: https://www.udacity.com/course/cs387.

From playlist Applied Cryptography

Video thumbnail

Block Ciphers and Data Encryption Standard (DES): Part 2

Fundamental concepts of Block Cipher Design Principles are discussed. Differential cryptanalysis and linear cryptanalysis are explained.

From playlist Network Security

Video thumbnail

24. Stem Cells, Apoptosis, & Tissue Homeostasis

MIT 7.016 Introductory Biology, Fall 2018 Instructor: Adam Martin View the complete course: https://ocw.mit.edu/7-016F18 YouTube Playlist: https://www.youtube.com/playlist?list=PLUl4u3cNGP63LmSVIVzy584-ZbjbJ-Y63 Professor Martin talks about the regenerative and renewal capabilities of cel

From playlist MIT 7.016 Introductory Biology, Fall 2018

Video thumbnail

Correctness And Security - Applied Cryptography

This video is part of an online course, Applied Cryptography. Check out the course here: https://www.udacity.com/course/cs387.

From playlist Applied Cryptography

Related pages

PBKDF2 | Disk encryption | Key management | Key stretching | Symmetric-key algorithm | Disk encryption theory | Initialization vector | Watermarking attack | TrueCrypt | Hash function | Linux Unified Key Setup | Disk encryption software | Comparison of disk encryption software | Block cipher | Salt (cryptography) | Passphrase | Key (cryptography) | FreeOTFE