Cryptography lists and comparisons

List of ciphertexts

Some famous ciphertexts (or cryptograms), in chronological order by date, are: (Wikipedia).

List of ciphertexts
Video thumbnail

One Time Pad - Applied Cryptography

This video is part of an online course, Applied Cryptography. Check out the course here: https://www.udacity.com/course/cs387.

From playlist Applied Cryptography

Video thumbnail

Symmetric Key Cryptography: The Caesar Cipher

This is the first in a series about cryptography; an extremely important aspect of computer science and cyber security. It introduces symmetric key cryptography with a well known substitution cipher, namely the Caesar Cipher. It includes a few examples you can try for yourself using diff

From playlist Cryptography

Video thumbnail

Pseudorandom Number Generation and Stream Ciphers

Fundamental concepts of Pseudorandom Number Generation are discussed. Pseudorandom Number Generation using a Block Cipher is explained. Stream Cipher & RC4 are presented.

From playlist Network Security

Video thumbnail

What are the Types of Numbers? Real vs. Imaginary, Rational vs. Irrational

We've mentioned in passing some different ways to classify numbers, like rational, irrational, real, imaginary, integers, fractions, and more. If this is confusing, then take a look at this handy-dandy guide to the taxonomy of numbers! It turns out we can use a hierarchical scheme just lik

From playlist Algebra 1 & 2

Video thumbnail

Java: working with HashMaps

Learn how to read key-value pairs from a text file into a HashMap.

From playlist Intermediate Java

Video thumbnail

Block Ciphers and Data Encryption Standard (DES) - Part 1

Fundamental concepts of Block Cipher Design Principles are discussed. DES is presented. Differential and linear cryptanalysis are explained . Block Cipher Principles Data Encryption Standard (DES) Differential and Linear Cryptanalysis Block Cipher Design Principles

From playlist Network Security

Video thumbnail

the Internet (part 2)

An intro to the core protocols of the Internet, including IPv4, TCP, UDP, and HTTP. Part of a larger series teaching programming. See codeschool.org

From playlist The Internet

Video thumbnail

Stanford Seminar - Bugs in Crypto Implementations

Whether it’s by email, text, or social media platform, the average person will send over 60 messages per day—that's 22,000 messages per year. With billions of messages sent around the world each day, how can you be sure that your messages are safe and secure? Join professor Dan Boneh, on

From playlist Stanford Seminars

Video thumbnail

Jonathan Katz - Introduction to Cryptography Part 1 of 3 - IPAM at UCLA

Recorded 25 July 2022. Jonathan Katz of the University of Maryland presents "Introduction to Cryptography I" at IPAM's Graduate Summer School Post-quantum and Quantum Cryptography. Abstract: This lecture will serve as a "crash course" in modern cryptography for those with no prior exposure

From playlist 2022 Graduate Summer School on Post-quantum and Quantum Cryptography

Video thumbnail

System Security Fundamentals

Presented by WWCode Blockchain Speaker: Swetha Srinivasan, Google This talk will give an overview of introductory concepts in security such as confidentiality, integrity, availability, authentication and authorization. It will cover how cryptography is used in real world systems and funda

From playlist Center for Applied Cybersecurity Research (CACR)

Video thumbnail

Tackling Enigma (Turing's Enigma Problem Part 2) - Computerphile

Just how did the team at Bletchley Park tackle the problem of decoding Enigma? In Part Two of our series on "The Real" Imitation Game, Professor Brailsford explains how they did it. Part One of this series: Turing's Enigma Problem: http://youtu.be/d2NWPG2gB_A Professor Brailsford's no

From playlist Subtitled Films

Video thumbnail

RSA Encryption Algorithm | Rivest–Shamir–Adleman | RSA Algorithm Explained | Simplilearn

In this video on the RSA Encryption Algorithm, we learn about the global standard in asymmetric encryption, designed by Rivest-Shamir-Adleman. We understand the basics of asymmetric encryption, handling of digital signatures, and how we can use RSA encryption algorithm in the verification

From playlist Cyber Security Playlist [2023 Updated]🔥

Video thumbnail

Cryptography (part 1 of 3)

An informal introduction to cryptography. Part of a larger series teaching programming at http://codeschool.org

From playlist Cryptography

Video thumbnail

Discrete Structures: Digital certificates and implementing RSA

Our last session on RSA and public key cryptography. We'll learn about digital certificates and see how to implement the core RSA algorithms in Python.

From playlist Discrete Structures, Spring 2022

Video thumbnail

Discrete Structures: Modular Arithmetic & Simple Ciphers

In this session we'll introduce modular arithmetic and apply the principles to simple crytographic ciphers such as the shift cipher (also called the Caesar cipher) and the linear cipher.

From playlist Discrete Structures, Spring 2022

Video thumbnail

What is Cryptography? | Introduction to Cryptography | Cryptography for Beginners | Edureka

🔵Edureka Cyber Security Masters Program: https://bit.ly/3pfHHIN 🔥Edureka CompTIA Security+ Certification Training: https://bit.ly/3nxeVRl Cryptography is essential to protect the information shared across the internet. This video on What is cryptography explaines you the fundamental concep

From playlist Cyber Security Training for Beginners | Edureka

Video thumbnail

ASCII and Unicode Character Sets

This video describes the fundamental principles of character sets, character encoding, ASCII and Unicode. In particular, it covers the limitations of ASCII and the plethora of extended ASCII code pages. It also covers the design goals of Unicode, and describes the way control bits are al

From playlist GCSE Computer Science

Related pages

Enigma machine | The Magic Words are Squeamish Ossifrage | Copiale cipher | Ciphertext | Chaocipher | Edgar Allan Poe | Lorenz cipher