Cryptography

Honey encryption

Honey encryption is a type of data encryption that "produces a ciphertext, which, when decrypted with an incorrect key as guessed by the attacker, presents a plausible-looking yet incorrect plaintext password or encryption key." (Wikipedia).

Video thumbnail

Network Security: Classical Encryption Techniques

Fundamental concepts of encryption techniques are discussed. Symmetric Cipher Model Substitution Techniques Transposition Techniques Product Ciphers Steganography

From playlist Network Security

Video thumbnail

Intrusion Detection: Part 2

Fundamental concepts of intrusion detection are discussed. Various types of intrusion are analyzed. Password management is explained.

From playlist Network Security

Video thumbnail

Intrusion Detection: Part 1

Fundamental concepts of intrusion detection are discussed. Various types of intrusion are analyzed. Password management is explained.

From playlist Network Security

Video thumbnail

Cryptography (part 1 of 3)

An informal introduction to cryptography. Part of a larger series teaching programming at http://codeschool.org

From playlist Cryptography

Video thumbnail

Network Security, Part 2 : Public Key Encryption

Fundamental concepts of public key encryption are discussed. RSA encryption method explained with an example. Confidentiality of message is presented.

From playlist Cryptography, Security

Video thumbnail

Cryptanalysis of Classical Ciphers

Cryptography and Network Security by Prof. D. Mukhopadhyay, Department of Computer Science and Engineering, IIT Kharagpur. For more details on NPTEL visit http://nptel.iitm.ac.in

From playlist Computer - Cryptography and Network Security

Video thumbnail

Network Security, Part 1 : Basic Encryption Techniques

Fundamental concepts of network security are discussed. It provides a good overview of secret Key and public key Encryption. Important data encryption standards are presented.

From playlist Network Security

Video thumbnail

[Twitch] Hacknet walkthrough - part 3 - Getting UNstuck

Join me on Twitter: http://twitter.com/WhatDaMath Facebook: https://www.facebook.com/whatdamath Hello and welcome to What Da Math. This is an attempt at beating the awesome new game called Hacknet. The video was broadcasted on Twitch. http://www.twitch.tv/whatdamath The game is availabl

From playlist Hacknet

Video thumbnail

25c3: Squeezing Attack Traces

Speakers: Markus Kötter, Tillmann Werner How to get useable information out of your honeypot This talk will give an overview about how modern attack analysis tools (dynamic honeypots, an automated shellcode analyzer, and an intrusion signature generator) can be used to get a deep underst

From playlist 25C3: Nothing to hide

Video thumbnail

Black Hat USA 2010: Defenseless in Depth 1/3

Speaker: Ryan Smith Defense in Depth (DiD) is a term commonly used by the security industry to describe the strategy of implementing layers of security controls at various logical and physical teirs within an organization to reduce security risk. This presentation will examine DiD from a

From playlist BH USA 2010 - BIG PICTURE

Video thumbnail

!!Con 2019 - Tales from the Underground: Hilarious Cybercrime Fails!! by Pranshu Bajpai

!!Con 2019 - Tales from the Underground: Hilarious Cybercrime Fails!! by Pranshu Bajpai Hilarity ensues as cybercriminals fail miserably in their objectives in these tales. Hackers have a fearsome reputation thanks to their sustained glorification in Hollywood. However, not all of these “

From playlist !!Con 2019

Video thumbnail

DeepSec 2007: Collecting and Managing Accumulated Malware Automatically

Thanks to the DeepSec organisation for making these videos available and let me share the videos on YouTube. Speaker: Georg Wicherski, mwcollect.org, EmsiSoft, RWTH Aachen With the nepenthes Platform, we are able to collect malware autonomously. Centrally collecting this malware over mon

From playlist DeepSec 2007

Video thumbnail

DEFCON 20:Network Anti-Reconnaissance: Messing with Nmap Through Smoke and Mirrors

Speaker: DAN "ALTF4" PETRO SECURITY RESEARCHER, DATASOFT CORP Reconnaissance on a network has been an attacker's game for far too long, where's the defense? Nmap routinely evades firewalls, traverses NATs, bypasses signature based NIDS, and gathers up the details of your highly vulnerable

From playlist DEFCON 20

Video thumbnail

Block Ciphers and Data Encryption Standard (DES): Part 2

Fundamental concepts of Block Cipher Design Principles are discussed. Differential cryptanalysis and linear cryptanalysis are explained.

From playlist Network Security

Video thumbnail

DEFCON 19: Balancing The Pwn Trade Deficit -- APT Secrets in Asia

Speakers: Anthony Lai Co-founder and Security Researcher, Xecure Lab | Benson Wu Founder and Security Researcher, Xecure Lab | Jeremy Chiu Founder and Security Researcher, Xecure Lab | PK Security Researcher In last year, we have given a talk over China-made malware in both Blackhat and

From playlist DEFCON 19

Video thumbnail

23C3: Information Operations

Speaker: Sebastian Schroeder Sector-Oriented Analysis of the Potential Impact and Possible Countermeasures The use of information technology has brought a lot of new functionality and efficiency with it. But due to the fact that enterprises are totally dependant on IT, they are vulnera

From playlist 23C3: Who can you trust

Video thumbnail

22C3: Honeymonkeys

Speakers: Krisztian Piller, Sebastian Wolfgarten Chasing hackers with a bunch of monkeys As part of their ongoing efforts to secure the use of the web for Windows-based systems Microsoft recently launched a new research initiative called Honeymonkeys. This talk will introduce the basic

From playlist 22C3: Private Investigations

Video thumbnail

Fishy Codes: Bletchley's Other Secret - Computerphile

Hitler's High Command didn't use Enigma, they used a faster system called Lorenz, but when Allied forces first encountered it, they had no idea what it was and code-named it 'Tunny' (Tuna). Professor Brailsford explains why this relates to the early days of Computer Science Next Video in

From playlist Subtitled Films

Video thumbnail

Authentication, Authorization, Accounting (AAA) - Part 2

Fundamental concepts of authentication protocols are discussed. Radius server is presented. Extensible Authentication protocol is explained.

From playlist Network Security

Related pages

Known-plaintext attack | Ciphertext | Luhn algorithm | Brute-force attack