Classical ciphers

Great Cipher

The Great Cipher (French: Grand chiffre) was a nomenclator cipher developed by the Rossignols, several generations of whom served the French monarchs as cryptographers. The Great Cipher was so named because of its excellence and because it was reputed to be unbreakable. Modified forms were in use by the French Peninsular army until the summer of 1811. After it fell out of current use, many documents in the French archives were unreadable until it was decoded. (Wikipedia).

Great Cipher
Video thumbnail

Symmetric Key Cryptography: The Keyword Cipher

This is the second in a series about cryptography; an extremely important aspect of computer science and cyber security. It covers a substitution cipher called the keyword cipher, also known as the Vigenère cipher. It explains how a keyword, or key phrase, can be used to effectively gene

From playlist Cryptography

Video thumbnail

Symmetric Key Cryptography: The Caesar Cipher

This is the first in a series about cryptography; an extremely important aspect of computer science and cyber security. It introduces symmetric key cryptography with a well known substitution cipher, namely the Caesar Cipher. It includes a few examples you can try for yourself using diff

From playlist Cryptography

Video thumbnail

Classical Cryptosystems

Cryptography and Network Security by Prof. D. Mukhopadhyay, Department of Computer Science and Engineering, IIT Kharagpur. For more details on NPTEL visit http://nptel.iitm.ac.in

From playlist Computer - Cryptography and Network Security

Video thumbnail

Perfect Cipher - Applied Cryptography

This video is part of an online course, Applied Cryptography. Check out the course here: https://www.udacity.com/course/cs387.

From playlist Applied Cryptography

Video thumbnail

Otp And Quantum Crypto - Applied Cryptography

This video is part of an online course, Applied Cryptography. Check out the course here: https://www.udacity.com/course/cs387.

From playlist Applied Cryptography

Video thumbnail

Block Ciphers and Data Encryption Standard (DES): Part 2

Fundamental concepts of Block Cipher Design Principles are discussed. Differential cryptanalysis and linear cryptanalysis are explained.

From playlist Network Security

Video thumbnail

Modern Symmetric Ciphers - Applied Cryptography

This video is part of an online course, Applied Cryptography. Check out the course here: https://www.udacity.com/course/cs387.

From playlist Applied Cryptography

Video thumbnail

Cryptanalysis of Classical Ciphers

Cryptography and Network Security by Prof. D. Mukhopadhyay, Department of Computer Science and Engineering, IIT Kharagpur. For more details on NPTEL visit http://nptel.iitm.ac.in

From playlist Computer - Cryptography and Network Security

Video thumbnail

Follow-up: Barbie electronic typewriter

Here is a copy of the description from the Barbie video: ---- I first found this story on the crypto museum website, which has great information about the Barbie typewriter (and other cipher machines) https://www.cryptomuseum.com/crypto/mehano/barbie/ ------- Thanks to Sarah Everett fr

From playlist My Maths Videos

Video thumbnail

The Barbie electronic typewriter - with Just My Typewriter

I first found this story on the crypto museum website, which has great information about the Barbie typewriter (and other cipher machines) https://www.cryptomuseum.com/crypto/mehano/barbie/ ------- Thanks to Sarah Everett from Just My Typewriter, check out her channel here: https://www.y

From playlist My Maths Videos

Video thumbnail

26C3: DECT (part II) 4/7

Clip 4/7 Speaker: Erik Tews What has changed in DECT security after one year After dedected.org was published on 25C3, lots has changed in DECT security. For more information go to: http://events.ccc.de/congress/2009/Fahrplan/events/3648.en.html

From playlist 26C3: Here be dragons day 3

Video thumbnail

Fishy Codes: Bletchley's Other Secret - Computerphile

Hitler's High Command didn't use Enigma, they used a faster system called Lorenz, but when Allied forces first encountered it, they had no idea what it was and code-named it 'Tunny' (Tuna). Professor Brailsford explains why this relates to the early days of Computer Science Next Video in

From playlist Subtitled Films

Video thumbnail

DEFCON 19: Speaking with Cryptographic Oracles

Speaker: Daniel Crowley Application Security Consultant, Trustwave - SpiderLabs Cryptography is often used to secure data, but few people have a solid understanding of cryptography. It is often said that if you are not strictly a cryptographer, you will get cryptography wrong. For that ma

From playlist DEFCON 19

Video thumbnail

25c3: An introduction to new stream cipher designs

Speaker: Tor E. Bjørstad Turning data into line noise and back Even with "nothing to hide", we want to protect the privacy of our bits and bytes. Encryption is an important tool for this, and stream ciphers are a major class of symmetric-key encryption schemes. Algorithms such as RC4 (us

From playlist 25C3: Nothing to hide

Video thumbnail

Yes, You Too Can Break Crypto: Exploiting Common Crypto Mistakes

Cryptography is tricky. Sure, everybody knows not to roll out their own crypto, but is it enough? Are the standard algorithms, libraries, and utilities always used the right way? This is of course a rhetorical question! Humans keep making mistakes that other humans can exploit, and Murphy’

From playlist Security

Video thumbnail

The Art and Science of Secret Messages: Some Glimpses (ONLINE) by Geetha Venkataraman

KAAPI WITH KURIOSITY THE ART AND SCIENCE OF SECRET MESSAGES: SOME GLIMPSES (ONLINE) SPEAKER: Geetha Venkataraman (Dr. B. R. Ambedkar University Delhi, Delhi) WHEN: 4:00 pm to 5:30 pm Sunday, 19 September 2021 WHERE: Livestream via the ICTS YouTube channel Abstract:- In the modern worl

From playlist Kaapi With Kuriosity (A Monthly Public Lecture Series)

Video thumbnail

Cryptography - CS50 for Lawyers 2019

00:00:00 - Introduction 00:00:15 - Cryptography 00:01:25 - Ciphers 00:02:25 - Substitution Cipher 00:09:25 - Caesar Cipher 00:11:08 - Vigenere Cipher 00:17:52 - Substitution Cipher 00:18:20 - Frequency Analysis 00:20:20 - Ciphers (continued) 00:22:20 - Hashes 00:25:46 - Hash Function 00:32

From playlist CS50 for Lawyers 2019

Video thumbnail

Doggie Aggression (Full Episode) | Cesar Millan: Better Human, Better Dog

Cesar intervenes when dog brothers draw blood - a Doberman who continuously causes fights with his packmate and a Jindo-Pit Mix that’s a nervous wreck. ➡ Subscribe: http://bit.ly/NatGeoWILDSubscribe ➡ Get more Nat Geo Wild Full Episodes: https://youtu.be/qAG2SkTPltw ➡ Get more Nat Geo Ful

From playlist Cesar Millan | National Geographic

Video thumbnail

Block Ciphers and Data Encryption Standard (DES) - Part 1

Fundamental concepts of Block Cipher Design Principles are discussed. DES is presented. Differential and linear cryptanalysis are explained . Block Cipher Principles Data Encryption Standard (DES) Differential and Linear Cryptanalysis Block Cipher Design Principles

From playlist Network Security

Related pages

Frequency analysis | Substitution cipher