Classical ciphers

Pigpen cipher

The pigpen cipher (alternatively referred to as the masonic cipher, Freemason's cipher, Napoleon cipher, and tic-tac-toe cipher) is a geometric simple substitution cipher, which exchanges letters for symbols which are fragments of a grid. The example key shows one way the letters can be assigned to the grid. (Wikipedia).

Pigpen cipher
Video thumbnail

Cryptograph: Substitution Cipher (Caesar Cipher)

This lesson explains how to encrypt and decrypt a message using a Caeser cipher. Site: http://mathispower4u.com

From playlist Cryptography

Video thumbnail

Symmetric Key Cryptography: The Keyword Cipher

This is the second in a series about cryptography; an extremely important aspect of computer science and cyber security. It covers a substitution cipher called the keyword cipher, also known as the Vigenère cipher. It explains how a keyword, or key phrase, can be used to effectively gene

From playlist Cryptography

Video thumbnail

Cryptography (part 2 of 3)

An informal introduction to cryptography. Part of a larger series teaching programming at http://codeschool.org

From playlist Cryptography

Video thumbnail

Pseudorandom Number Generation and Stream Ciphers

Fundamental concepts of Pseudorandom Number Generation are discussed. Pseudorandom Number Generation using a Block Cipher is explained. Stream Cipher & RC4 are presented.

From playlist Network Security

Video thumbnail

The Story of Chinese Character :圂

圂 is composed of 豕(a pig) stays inside 囗(an enclosure), 圂 is the picture of a pigpen.

From playlist The Story of HanZi (Chinese Characters)

Video thumbnail

Desmos Holiday Peanuts Dance (Redone)

Added a few more characters (PigPen, Woodstock, & Sally) to this year's #Desmos holiday Peanuts dance. 🙂https://desmos.com/calculator/mmetvkgwm2 #DesmosFun

From playlist Desmos Activities, Illustrations, and How-To's

Video thumbnail

Linear Codes Introduction

This video is a brief introduction to linear codes: dimensions, G (generating matrix), H (parity check matrix), their forms. Also gives an example of how to convert between G and H. Here is the formal definition of a Linear Code: A linear code of dimension k and length n over a field

From playlist Cryptography and Coding Theory

Video thumbnail

Hamming Code - Errors

How to detect and correct an error using the Hamming Code. Hamming codes are a type of linear code, see link for intro to linear code: https://www.youtube.com/watch?v=oYONDEX2sh8 Questions? Feel free to post them in the comments and I'll do my best to answer!

From playlist Cryptography and Coding Theory

Video thumbnail

Cryptography: Transposition Cipher

This lesson explains how to encrypt and decrypt a message using a transposition cipher. Site: http://mathispower4u.com

From playlist Cryptography

Video thumbnail

Shark Repellent

Mike Rowe meets a chemist with a unique way to keep sharks away.

From playlist Shark Week Archives

Video thumbnail

Stunning Pitcairn Islands Revealed | Edge of the World

In 2012 National Geographic's Pristine Seas project went on an expedition to the Pitcairn Islands—a legendary and remote archipelago in the middle of the Pacific Ocean—and returned with footage of incredible natural wonders underwater and on land. The expedition led to the historic announc

From playlist National Geographic Explorers

Video thumbnail

Bjarne Jespersen - Invention of the Paper Gear - G4G12 April 2016

The presentation explains the interests and ideas behind my invention.

From playlist G4G12 Videos

Video thumbnail

Practice with me! Basic Number Theory :)

Sign up on Brilliant for FREE using the link https://brilliant.org/FlammableMaths/ ! =D First 200 people to sign up get 20% off an annual Premium Subscription! Let us practice some basicx number theory together! =) This video has been sponsored by Brilliant btw! Help me create more fr

From playlist Livestreams

Video thumbnail

Toy Substitution Cipher 1 - Applied Cryptography

This video is part of an online course, Applied Cryptography. Check out the course here: https://www.udacity.com/course/cs387.

From playlist Applied Cryptography

Video thumbnail

Toy Substitution Cipher 2 - Applied Cryptography

This video is part of an online course, Applied Cryptography. Check out the course here: https://www.udacity.com/course/cs387.

From playlist Applied Cryptography

Video thumbnail

A Bitter AI Lesson - Compute Reigns Supreme!

📝 The article "The Bitter Lesson" is available here: http://www.incompleteideas.net/IncIdeas/BitterLesson.html Nice twitter thread on this video: https://twitter.com/karoly_zsolnai/status/1114867598724931585 ❤️ Pick up cool perks on our Patreon page: https://www.patreon.com/TwoMinutePape

From playlist AI and Deep Learning - Two Minute Papers

Video thumbnail

How Pheromones Work in Humans

Are we really attracted to other people through pheromones? How do they work? Turns out it's much more complicated than you might think. Join Hank Green for a fascinating look into the world of human pheromones in this new episode of SciShow! ---------- Dooblydoo thanks go to the followin

From playlist Biology

Video thumbnail

Follow-up: Barbie electronic typewriter

Here is a copy of the description from the Barbie video: ---- I first found this story on the crypto museum website, which has great information about the Barbie typewriter (and other cipher machines) https://www.cryptomuseum.com/crypto/mehano/barbie/ ------- Thanks to Sarah Everett fr

From playlist My Maths Videos

Video thumbnail

Symmetric Key Cryptography: The Caesar Cipher

This is the first in a series about cryptography; an extremely important aspect of computer science and cyber security. It introduces symmetric key cryptography with a well known substitution cipher, namely the Caesar Cipher. It includes a few examples you can try for yourself using diff

From playlist Cryptography

Video thumbnail

Symmetric Key Ciphers

Cryptography and Network Security by Prof. D. Mukhopadhyay, Department of Computer Science and Engineering, IIT Kharagpur. For more details on NPTEL visit http://nptel.iitm.ac.in

From playlist Computer - Cryptography and Network Security

Related pages

Cipher | Cryptanalysis