Cryptographic attacks

Message forgery

In cryptography, message forgery is sending a message so to deceive the recipient about the actual sender's identity. A common example is sending a spam or prank e-mail as if it were originated from an address other than the one which was really used. (Wikipedia).

Video thumbnail

Deconstructing Media Messages

In this video, you’ll learn strategies for breaking down media messages to better understand their meaning. Visit https://edu.gcfglobal.org/en/digital-media-literacy/deconstructing-media-messages/1/ to learn even more. We hope you enjoy!

From playlist Digital Media Literacy

Video thumbnail

Steganography Tutorial - Hide Messages In Images

Steganography is the hiding of a secret message within an ordinary message and the extraction of it at its destination. Steganography takes cryptography a step further by hiding an encrypted message so that no one suspects it exists. Ideally, anyone scanning your data will fail to know it

From playlist Ethical Hacking & Penetration Testing - Complete Course

Video thumbnail

Can You Validate These Emails?

Email Validation is a procedure that verifies if an email address is deliverable and valid. Can you validate these emails?

From playlist Fun

Video thumbnail

Symmetric Cryptosystems - Applied Cryptography

This video is part of an online course, Applied Cryptography. Check out the course here: https://www.udacity.com/course/cs387.

From playlist Applied Cryptography

Video thumbnail

Convincing Solution - Applied Cryptography

This video is part of an online course, Applied Cryptography. Check out the course here: https://www.udacity.com/course/cs387.

From playlist Applied Cryptography

Video thumbnail

Cryptography: Transposition Cipher

This lesson explains how to encrypt and decrypt a message using a transposition cipher. Site: http://mathispower4u.com

From playlist Cryptography

Video thumbnail

Correctness And Security - Applied Cryptography

This video is part of an online course, Applied Cryptography. Check out the course here: https://www.udacity.com/course/cs387.

From playlist Applied Cryptography

Video thumbnail

What the Fax!

Unless you've been living under a rock for the past 30 years or so, you probably know what a fax machine is. For decades, fax machines were used worldwide as the main way of electronic document delivery. But this happened in the 1980s. Humanity has since developed far more advanced ways to

From playlist Security

Video thumbnail

Digital Signatures: RSA and El Gamal

We describe the theory and applications of digital signatures, and provide two examples of digital signature algorithms: RSA and El Gamal

From playlist PubKey

Video thumbnail

Jonathan Katz - Introduction to Cryptography Part 2 of 3 - IPAM at UCLA

Recorded 25 July 2022. Jonathan Katz of the University of Maryland presents "Introduction to Cryptography II" at IPAM's Graduate Summer School Post-quantum and Quantum Cryptography. Abstract: This session will focus on public-key cryptography, including key exchange, public-key encryption,

From playlist 2022 Graduate Summer School on Post-quantum and Quantum Cryptography

Video thumbnail

CERIAS Security: What Every Engineer Needs To Know About Security And Where To Learn It 3/6

Clip 3/6 Speaker: Neil Daswani · Google This talk discusses how engineers can go about learning what they need to know to prevent the most significant emerging data security vulnerabilities, and the impact these vulnerabilities are having on electronic commerce. I'll review how attac

From playlist The CERIAS Security Seminars 2007

Video thumbnail

R11. Cryptography: More Primitives

MIT 6.046J Design and Analysis of Algorithms, Spring 2015 View the complete course: http://ocw.mit.edu/6-046JS15 Instructor: Ling Ren In this recitation, problems related to cryptography are discussed. License: Creative Commons BY-NC-SA More information at http://ocw.mit.edu/terms More c

From playlist MIT 6.046J Design and Analysis of Algorithms, Spring 2015

Video thumbnail

DEFCON 15: Biting tha Hand that Feeds You - Storing and Serving Malicous Content

Speakers: Billy Rios Senior Security Researcher, VeriSign Nathan McFeters Senior Security Advisor, Ernst & Young Whats in a name? How do you know you should "trust" the content you are receiving? In today's World Wide Web, we place a lot of "trust" into domain names. For many, domain name

From playlist DEFCON 15

Video thumbnail

Security for Modern Webapps: New Web Platform Security Features to Protect your Application

Web applications have historically been plagued by vulnerabilities which allow attackers to compromise the session of a logged-in user: XSS, CSRF, clickjacking and related issues. Luckily, new security mechanisms available in web browsers in 2019 offer exciting features which allow develop

From playlist Security

Video thumbnail

CERIAS Security: What Every Engineer Needs To Know About Security And Where To Learn It 4/6

Clip 4/6 Speaker: Neil Daswani · Google This talk discusses how engineers can go about learning what they need to know to prevent the most significant emerging data security vulnerabilities, and the impact these vulnerabilities are having on electronic commerce. I'll review how attac

From playlist The CERIAS Security Seminars 2007

Video thumbnail

Blackhat Europe 2010: Next Generation Clickjacking 1/7

Clip 1/7 Speaker: Paul Stone Clickjacking is a technique that can be used to trick users into performing unintended actions on a website by formatting a web page so that the victim clicks on concealed links, typically hidden within an IFRAME. However, in comparison to other browser-based

From playlist Black Hat Europe 2010

Video thumbnail

Using Messages on LinkedIn

In this video, you’ll learn more about using Messages in LinkedIn. Visit https://edu.gcfglobal.org/en/linkedin/keeping-up-with-linkedin/1/ for our text-based lesson. We hope you enjoy!

From playlist LinkedIn

Video thumbnail

End-to-end Encrypted Messaging in Rust, with Ockam by Mrinal Wadhwa

Topic: End-to-end Encrypted Messaging in Rust, with Ockam Code: [https://github.com/ockam-network/ockam](https://github.com/ockam-network/ockam) Machines, within distributed applications, operate by exchanging messages with cloud services and other remote machines. Secure, private, a

From playlist Denver Rust Meetup

Related pages

Message authentication code | Cryptography