Cryptography

Hardware-based encryption

Hardware-based encryption is the use of computer hardware to assist software, or sometimes replace software, in the process of data encryption. Typically, this is implemented as part of the processor's instruction set. For example, the AES encryption algorithm (a modern cipher) can be implemented using the AES instruction set on the ubiquitous x86 architecture. Such instructions also exist on the ARM architecture. However, more unusual systems exist where the cryptography module is separate from the central processor, instead being implemented as a coprocessor, in particular a secure cryptoprocessor or cryptographic accelerator, of which an example is the IBM 4758, or its successor, the IBM 4764. Hardware implementations can be faster and less prone to exploitation than traditional software implementations, and furthermore can be protected against tampering. (Wikipedia).

Hardware-based encryption
Video thumbnail

Network Security: Classical Encryption Techniques

Fundamental concepts of encryption techniques are discussed. Symmetric Cipher Model Substitution Techniques Transposition Techniques Product Ciphers Steganography

From playlist Network Security

Video thumbnail

Network Security, Part 1 : Basic Encryption Techniques

Fundamental concepts of network security are discussed. It provides a good overview of secret Key and public key Encryption. Important data encryption standards are presented.

From playlist Network Security

Video thumbnail

Public Key Cryptography & RSA: Part 1

Fundamental concepts of Public Key Encryption are discussed. RSA Public Encryption is presented. Optimization of Private Key operations is analyzed. Public Key Encryption Symmetric vs. Public-Key RSA Public Key Encryption RSA Key Construction Optimizing Private Key Operations RSA Securit

From playlist Network Security

Video thumbnail

Cryptanalysis of Classical Ciphers

Cryptography and Network Security by Prof. D. Mukhopadhyay, Department of Computer Science and Engineering, IIT Kharagpur. For more details on NPTEL visit http://nptel.iitm.ac.in

From playlist Computer - Cryptography and Network Security

Video thumbnail

Network Security, Part 2 : Public Key Encryption

Fundamental concepts of public key encryption are discussed. RSA encryption method explained with an example. Confidentiality of message is presented.

From playlist Cryptography, Security

Video thumbnail

Cryptography 101

Cryptography is a complex and confusing subject. In this talk you will learn about the core components of cryptography used in software development: securing data with encryption, ensuring data integrity with hashes and digital signatures, and protecting passwords with key derivation funct

From playlist Blockchain

Video thumbnail

Intrusion Detection: Part 2

Fundamental concepts of intrusion detection are discussed. Various types of intrusion are analyzed. Password management is explained.

From playlist Network Security

Video thumbnail

DEFCON 13: The Next Generation of Cryptanalytic Hardware

Speaker: The Next Generation of Cryptanalytic Hardware David Hulton, Dachb0den Labs Encryption is simply the act of obfuscating something to the point that it would take too much time or money for an attacker to recover it. Many algorithms have time after time failed due to Moore's law

From playlist DEFCON 13

Video thumbnail

29C3: (Un)Sicherheit Hardware-basierter Festplattenverschlüsselung (DE)

Speaker: tilo Hardware-basierte Festplattenvollverschlüsselungen in Form sogenannter SEDs (Self-Encrypting Drives) werden gemeinhin als sichere und performante Alternative zu Software-basierter Verschlüsselung wie BitLocker und TrueCrypt gesehen. Während der Performance-Gewinn und die Ben

From playlist 29C3: Not my department

Video thumbnail

24C3: Why Silicon-Based Security is still that hard: Deconstructing Xbox 360 Security

Speakers: Michael Steil, Felix Domke Console Hacking 2007 The Xbox 360 probably is the video game console with the most sophisticated security system to date. Nevertheless, is has been hacked, and now Linux can be run on it. This presentation consists of two parts. In the first par

From playlist 24C3: Full steam ahead

Video thumbnail

Embedded Recipes 2018 - WooKey: the USB Battlefront Warrior - Mathieu Renard, Ryad Benadjila

USB devices are nowadays ubiquitous and participate to a wide variety of use cases. Recent studies have exposed vulnerabilities on the USB implementations, and among them the BadUSB attacks are a serious threat against the integrity of USB devices. Firmwares, hosts Operating Systems, as we

From playlist Embedded Recipes 2018

Video thumbnail

Secure collaborative learning using the MC^2 platform I Healthcare NLP Summit 2021

Get your Free Spark NLP and Spark OCR Free Trial: https://www.johnsnowlabs.com/spark-nlp-try-free/ Register for NLP Summit 2021: https://www.nlpsummit.org/2021-events/​ Watch all Healthcare NLP Summit 2021 sessions: https://www.nlpsummit.org/​ Multiple organizations often wish to a

From playlist Healthcare NLP Summit 2021

Video thumbnail

Cyber Security Questions & Answers - Interactive Quiz | Cyber Security Training | 2022 | Simplilearn

🔥Explore Our Free Courses With Completion Certificate by SkillUp: https://www.simplilearn.com/skillup-free-online-courses?utm_campaign=QuizLiveApr28&utm_medium=Description&utm_source=youtube This YouTube live quiz on cybersecurity will be touching upon the basics of information security an

From playlist Quiz Contests | Simplilearn

Video thumbnail

SPO1423 Can You Trust Your Cloud How to Build a Secure Hybrid Cloud with IBM LinuxONE and SUSE

This sponsor session was delivered at SUSECON in April 2019, in Nashville, TN. Abstract: Not all clouds are created equal. Rising cybercrime and security incidents, both from insiders and external threats, threaten your IT infrastructure, data, and corporate reputation. Is there a better w

From playlist SUSECON 2019

Video thumbnail

Cyber Security Interview Questions And Answers | Network Security Interview Preparation |Simplilearn

🔥Advanced Executive Program In Cybersecurity: https://www.simplilearn.com/pgp-advanced-executive-program-in-cyber-security?utm_campaign=CyberSecurityIQs&utm_medium=Descriptionff&utm_source=youtube 🔥Caltech Cybersecurity Bootcamp(US Only): https://www.simplilearn.com/cybersecurity-bootcamp?

From playlist Cyber Security Playlist [2023 Updated]🔥

Video thumbnail

Cyber Security Week Day - 4 | Cyber Security Interview Questions And Answers 2021 | Simplilearn

🔥Free Cyber Security Course: https://www.simplilearn.com/learn-cyber-security-basics-skillup?utm_campaign=CSWEEKNOV5&utm_medium=DescriptionFirstFold&utm_source=youtube This Simplilearn video on Cyber Security Interview Questions And Answers acquaints you with the top cyber security intervi

From playlist Simplilearn Live

Video thumbnail

Intrusion Detection: Part 1

Fundamental concepts of intrusion detection are discussed. Various types of intrusion are analyzed. Password management is explained.

From playlist Network Security

Video thumbnail

24C3: Playstation Portable Cracking

Speaker: TyRaNiD How In The End We Got It All! The Sony PSP is over 3 years old yet barely a day has gone by without some part of it getting attacked. This lecture will go through how hacker ingenuity and systematic failures in Sony's hardware, software and business practices ended up c

From playlist 24C3: Full steam ahead

Related pages

Enigma machine | PBKDF2 | Encryption | Scytale | Hardware-based full disk encryption | Hash function | Secure Hash Algorithms | Spectre (security vulnerability) | Timing attack | Cipher | Cryptographic hash function | AES instruction set | Cryptography | Advanced Encryption Standard