Broken block ciphers

MacGuffin (cipher)

In cryptography, MacGuffin is a block cipher created in 1994 by Bruce Schneier and Matt Blaze at a Fast Software Encryption workshop. It was intended as a catalyst for analysis of a new cipher structure, known as Generalized Unbalanced Feistel Networks (GUFNs). The cryptanalysis proceeded very quickly, so quickly that the cipher was broken at the same workshop by Vincent Rijmen and Bart Preneel. (Wikipedia).

MacGuffin (cipher)
Video thumbnail

Symmetric Key Cryptography: The Keyword Cipher

This is the second in a series about cryptography; an extremely important aspect of computer science and cyber security. It covers a substitution cipher called the keyword cipher, also known as the Vigenère cipher. It explains how a keyword, or key phrase, can be used to effectively gene

From playlist Cryptography

Video thumbnail

Message Authentication Codes: Part 1

Message Authentication MACs based on Hash Functions: HMAC MACs based on Block Ciphers: DAA and CMAC Authenticated Encryption: CCM and GCM Pseudorandom Number Generation Using Hash Functions and MACs

From playlist Network Security

Video thumbnail

Cryptograph: Substitution Cipher (Caesar Cipher)

This lesson explains how to encrypt and decrypt a message using a Caeser cipher. Site: http://mathispower4u.com

From playlist Cryptography

Video thumbnail

Message Authentication Codes: Part 2

Message Authentication MACs based on Hash Functions: HMAC MACs based on Block Ciphers: DAA and CMAC Authenticated Encryption: CCM and GCM Pseudorandom Number Generation Using Hash Functions and MACs

From playlist Network Security

Video thumbnail

Symmetric Key Cryptography: The Caesar Cipher

This is the first in a series about cryptography; an extremely important aspect of computer science and cyber security. It introduces symmetric key cryptography with a well known substitution cipher, namely the Caesar Cipher. It includes a few examples you can try for yourself using diff

From playlist Cryptography

Video thumbnail

Ask Adam Savage: "Would You Go Back to ILM?"

Tested member Ian Mastin wanted to know, "Would you ever consider going back to ILM for a one-time dream project, and if so, what would it have to be?" Here's Adam's answer, and we thank you, Ian, for your support and question! Join this channel to support Tested and get access to perks, l

From playlist ILM-Related Videos

Video thumbnail

CS3 Greetings from the Future - Richard Buckland

This is a video message to my upcoming CS3 computing design students. I thought it would be a nice introduction to the course to go on a walk together along the beach and chat about the (unusual) course and my hopes (and tips) for you, and how to approach it. I look quite pained and sic

From playlist CS3: Design in Computing - Richard Buckland UNSW

Video thumbnail

One Time Pad - Applied Cryptography

This video is part of an online course, Applied Cryptography. Check out the course here: https://www.udacity.com/course/cs387.

From playlist Applied Cryptography

Video thumbnail

Automatically Create an Unreal Scene Using Real-World Bathymetry Data | AUV Deep Dive, Part 7

For engineers who are not experienced in graphic design, creating a photorealistic simulation environment can be time-consuming. Visit our AUV solution page for more examples: https://bit.ly/3vzkRx8 With RoadRunnner, you can create a high-quality Unreal® scene using both real-world bathy

From playlist AUV Deep Dive

Video thumbnail

Toy Substitution Cipher 2 Solution - Applied Cryptography

This video is part of an online course, Applied Cryptography. Check out the course here: https://www.udacity.com/course/cs387.

From playlist Applied Cryptography

Video thumbnail

"Grant Imahara's R2D2 Work" (Sept. 14, 2020, Q&A Part 4)

In Adam's Sept. 14's live stream, he took questions from Tested Patron members about Star Wars, a subject they had chosen by poll beforehand. This excerpt is brought to you by Tested Channel Membership. Join this channel to support Tested and get access to perks: https://www.youtube.com/ch

From playlist Adam Savage's Live Streams

Video thumbnail

Last Jedi Trailer and Passengers SPOILERCAST - Still Untitled: The Adam Savage Project - 4/20/17

Recording later in the week, Adam, Will, and Norm catch up on Star Wars Celebration's reveal of The Last Jedi's teaser trailer, drop some Pete Seeger knowledge, and dive into a Spoilercast discussion of the recent film Passengers. Plus, we get excited for Silicon Valley Comic Con and the S

From playlist The Adam Savage Project

Video thumbnail

Open Space: May 7, 2018 - Live QA with Fraser Cain and Guest: John Michael Godier

Time for another live QA event, this time with sci-fi author and futurist John Michael Godier. Check out JMG's channel here: https://www.youtube.com/channel/UCEszlI8-W79IsU8LSAiRbDg Join us live, ask us your questions about space, astronomy and the future that awaits us all.

From playlist Open Space - Live QA with Fraser Cain and Guests

Video thumbnail

Books in Browsers 2012: Maureen Evans & Blaine Cook, "Conversation in an electronic age"

Books in Browsers 2012: Maureen Evans & Blaine Cook, "Dear Editor: conversation in an electronic age"

From playlist Books in Browsers 2012

Video thumbnail

Networks: The size of a Mac Address

We're busy people who learn to code, then practice by building projects for nonprofits. Learn Full-stack JavaScript, build a portfolio, and get great references with our open source community. Join our community at https://freecodecamp.com Follow us on twitter: https://twitter.com/freecod

From playlist Networks

Video thumbnail

Follow-up: Barbie electronic typewriter

Here is a copy of the description from the Barbie video: ---- I first found this story on the crypto museum website, which has great information about the Barbie typewriter (and other cipher machines) https://www.cryptomuseum.com/crypto/mehano/barbie/ ------- Thanks to Sarah Everett fr

From playlist My Maths Videos

Video thumbnail

Symmetric Key Ciphers

Cryptography and Network Security by Prof. D. Mukhopadhyay, Department of Computer Science and Engineering, IIT Kharagpur. For more details on NPTEL visit http://nptel.iitm.ac.in

From playlist Computer - Cryptography and Network Security

Video thumbnail

Live CEOing Ep 544: Language Design in Wolfram Language [Ciphers & WFR Submissions] [Part 01]

In this episode of Live CEOing, Stephen Wolfram discusses upcoming improvements and features to the Wolfram Language. If you'd like to contribute to the discussion in future episodes, you can participate through this YouTube channel or through the official Twitch channel of Stephen Wolfram

From playlist Behind the Scenes in Real-Life Software Design

Video thumbnail

ADFGVX Cipher: Encryption and Decryption (OLD VERSION: SEE NEW VERSION LINK BELOW)

This video has been replaced with an updated video: visit https://youtu.be/T0xfKiU9Rr4 Encryption and Decryption of the World War One ADFGVX Cipher, through examples.

From playlist Classical Cryptography

Related pages

Cryptanalysis | Block cipher | Feistel cipher | Key schedule | S-box | PostScript | Differential cryptanalysis | Cryptography | Data Encryption Standard