The Pike stream cipher was invented by Ross Anderson to be a "leaner and meaner" version of FISH after he broke FISH in 1994. Its name is supposed to be a humorous allusion to the pike fish. The cipher combines ideas from A5 with the lagged Fibonacci generators used in FISH. It is about 10% faster than FISH, yet believed to be much stronger. It potentially has a huge key length, and no attacks have been published as of 2004. (Wikipedia).
From playlist Week 2 2015 Shorts
Symmetric Key Cryptography: The Caesar Cipher
This is the first in a series about cryptography; an extremely important aspect of computer science and cyber security. It introduces symmetric key cryptography with a well known substitution cipher, namely the Caesar Cipher. It includes a few examples you can try for yourself using diff
From playlist Cryptography
Symmetric Key Cryptography: The Keyword Cipher
This is the second in a series about cryptography; an extremely important aspect of computer science and cyber security. It covers a substitution cipher called the keyword cipher, also known as the Vigenère cipher. It explains how a keyword, or key phrase, can be used to effectively gene
From playlist Cryptography
Public key cryptography - Diffie-Hellman Key Exchange (full version)
The history behind public key cryptography & the Diffie-Hellman key exchange algorithm. We also have a video on RSA here: https://www.youtube.com/watch?v=wXB-V_Keiu8
From playlist Cryptography, Security
Fast, Furious and Insecure: Hacking Tesla S
Our research revealed several weaknesses in the Tesla Model S passive keyless entry and start system. The talk will be a comprehensive overview of how we reverse engineered the key fob, the issues we found and an efficient proof of concept attack. The proof of concept attack exploits the u
From playlist Security
Keeping Secrets: Cryptography In A Connected World
Josh Zepps, Simon Singh, Orr Dunkelman, Tal Rabin, and Brian Snow discuss how, since the earliest days of communication, clever minds have devised methods for enciphering messages to shield them from prying eyes. Today, cryptography has moved beyond the realm of dilettantes and soldiers to
From playlist Explore the World Science Festival
My stream schedule has changed, I will be skipping the morning stream and instead be keeping to the Sunday streams. When I have time I'll be streaming after work, but no set schedule at this time.
From playlist Channel updates
Block Ciphers and Data Encryption Standard (DES) - Part 1
Fundamental concepts of Block Cipher Design Principles are discussed. DES is presented. Differential and linear cryptanalysis are explained . Block Cipher Principles Data Encryption Standard (DES) Differential and Linear Cryptanalysis Block Cipher Design Principles
From playlist Network Security
An intro to the core protocols of the Internet, including IPv4, TCP, UDP, and HTTP. Part of a larger series teaching programming. See codeschool.org
From playlist The Internet
Early Silk Road | World History | Khan Academy
The early Silk Roads facilitated trade and the spread of ideas, technology, disease and religion across Eurasia in the beginning of the Common Era. Practice this yourself on Khan Academy right now: https://www.khanacademy.org/humanities/world-history/ancient-medieval/silk-road/e/key-conce
From playlist 600 BCE - 600 CE Second-Wave Civilizations | AP World History | Khan Academy
Side Channel Analysis of Cryptographic Implementations
Cryptography and Network Security by Prof. D. Mukhopadhyay, Department of Computer Science and Engineering, IIT Kharagpur. For more details on NPTEL visit http://nptel.iitm.ac.in
From playlist Computer - Cryptography and Network Security
Prime Numbers Make the Internet Possible. Here's How - The RSA Encryption Algorithm
In this video I talk about the RSA Encryption Algorithm, and about the history of cryptography. People have been coding and decoding information ever since we learnt how to write. The Romans were one of the first to implement it, making what they considered to be the unbreakable 'Caesar C
From playlist Prime Numbers
As technology increases, so do the methods of encryption and decryption we have at our disposal. World War II saw wide use of various codes from substitution ciphers to employing Navajo code talkers in the Pacific theater. Here, science journalist and author Simon Singh demonstrates the Ge
From playlist Mathematics
Seattle Pike Place Area Quick Tour | Washington 🇺🇸
This was from a quick walk around the Pike Place area in Seattle on July 10th, 2021. As things are opening up, the market area was pretty crowded. The same day walk around Space Needle is also included. 0:00 Start 0:50 Public Market 2:23 Pike Place 6:24 Pike Place Market 12:12 Starbucks
From playlist Travels around the World
Stuff They Don't Want You to Know - Albert Pike
Mystic, Mason and alleged prophet, Albert Pike stands as one of the most unusual and fascinating personalities from the Civil War era. But who was he, exactly? Did he really predict three world wars? Listen in to learn more about Albert Pike. http://howstuffworks.com http://facebook.com/C
From playlist Stuff They Don't Want You To Know
The Pikes Peak International Hill Climb is the second oldest auto race in the United States. Find out why The Race to the Clouds continues to be one of the most dangerous and unpredictable races in the world. VIDEOS REFERENCED: "Watch Sebatien Loeb smash the Pikes Peak International Hill
From playlist Uploads from CarStuff - HowStuffWorks
CarStuff: The Pikes Peak Hill Climb
The Pikes Peak International Hill Climb is the second oldest auto race in the United States. Find out why The Race to the Clouds continues to be one of the most dangerous and unpredictable races in the world. Subscribe http://bit.ly/1AWgeM7 Twitter https://twitter.com/HowStuffWorks Faceb
From playlist CarStuff
Who was Albert Pike? | CLASSIC
Mystic, Mason and alleged prophet, Albert Pike stands as one of the most unusual and fascinating personalities from the Civil War era. But who was he, exactly? Did he really predict three world wars? SUBSCRIBE | http://bit.ly/stdwytk-sub WEBSITE | http://bit.ly/stdwytk-home AUDIO POD
From playlist Strange Stuff
Cryptograph: Substitution Cipher (Caesar Cipher)
This lesson explains how to encrypt and decrypt a message using a Caeser cipher. Site: http://mathispower4u.com
From playlist Cryptography