Cryptographic attacks

Rubber-hose cryptanalysis

In cryptography, rubber-hose cryptanalysis is a euphemism for the extraction of cryptographic secrets (e.g. the password to an encrypted file) from a person by coercion or torture—such as beating that person with a rubber hose, hence the name—in contrast to a mathematical or technical cryptanalytic attack. (Wikipedia).

Video thumbnail

Cryptanalysis of Classical Ciphers

Cryptography and Network Security by Prof. D. Mukhopadhyay, Department of Computer Science and Engineering, IIT Kharagpur. For more details on NPTEL visit http://nptel.iitm.ac.in

From playlist Computer - Cryptography and Network Security

Video thumbnail

Steganography Tutorial - Hide Messages In Images

Steganography is the hiding of a secret message within an ordinary message and the extraction of it at its destination. Steganography takes cryptography a step further by hiding an encrypted message so that no one suspects it exists. Ideally, anyone scanning your data will fail to know it

From playlist Ethical Hacking & Penetration Testing - Complete Course

Video thumbnail

Bitcoin Q&A: Key Management and Inheritance Planning

How does the average person solve the "$5 wrench problem" / prevent rubber-hose cryptanalysis? What is the easiest way to do a multi-signature or multi-factor set-up? Could timelocks and smart contract solutions be used for inheritance issues? The technology and educational resources aroun

From playlist English Subtitles - aantonop Videos with subtitles in English

Video thumbnail

Intro to Cryptography

This video gives a general introduction to cryptography WITHOUT actually doing any math. Terms covered include cryptology vs cryptography vs cryptanalysis, symmetric vs public key systems, and "coding theory." NOTE: Yes, I said and wrote "cryptOanalysis" when it's actually "cryptanalysis

From playlist Cryptography and Coding Theory

Video thumbnail

Introduction - Applied Cryptography

This video is part of an online course, Applied Cryptography. Check out the course here: https://www.udacity.com/course/cs387.

From playlist Applied Cryptography

Video thumbnail

Cryptography (part 1 of 3)

An informal introduction to cryptography. Part of a larger series teaching programming at http://codeschool.org

From playlist Cryptography

Video thumbnail

Few other Cryptanalytic Techniques

Cryptography and Network Security by Prof. D. Mukhopadhyay, Department of Computer Science and Engineering, IIT Kharagpur. For more details on NPTEL visit http://nptel.iitm.ac.in

From playlist Computer - Cryptography and Network Security

Video thumbnail

How to Make a Vacuum Pump

This video will show how to make a vacuum pump, a device that can be used to suck the air out of sealed environments. This is the same pump I use to operate my vacuum cannon seen here: http://youtu.be/CVL99yIB3NQ A clear vacuum chamber such as the one seen in the video can be obtained by

From playlist Practical Projects & Skills

Video thumbnail

Cryptograph: Substitution Cipher (Caesar Cipher)

This lesson explains how to encrypt and decrypt a message using a Caeser cipher. Site: http://mathispower4u.com

From playlist Cryptography

Video thumbnail

The Polymer Explosion: Crash Course Engineering #20

We’re continuing our look at engineering materials with third main type of material that you’ll encounter as an engineer: polymers. They’re made of long, repeating chains of smaller molecules known as monomers and today we’ll explore their strange history of polymers and the things that co

From playlist Engineering

Video thumbnail

HOW IT WORKS: Old Diving Suit

The parts and function are demonstrated.

From playlist HOW IT WORKS

Video thumbnail

22C3: A discussion about modern disk encryption systems

Speaker: Jacob Appelbaum Jacob Appelbaum will discuss different disk encryption systems in their current implementation, the users rights in their given country (ie: the USA, Germany and the UK), issues with the implementations, commentary on the community surrounding each featured implem

From playlist 22C3: Private Investigations

Video thumbnail

Amazing Water & Sound Experiment #2

Music: Monolith - https://open.spotify.com/track/2Dujp1sL96EJo2HNAlZoIq TikTok DMCA verification - Fed 26 2021 Link to TikTok video / account that reuploaded this video without permission https://www.tiktok.com/@m0tivationspeech/video/6929951454979558662?sender_device=pc&sender_web_id=69

From playlist Waves and Resonance

Video thumbnail

Physics of toys-Big Cartesian divers-part 2 // Homemade Science with Bruce Yeany

Part 2. Cartesian divers can be a fun and easy science experiment, in this video let's go beyond the soda bottle divers and take a look at how to use large bottles and various toys to larger larger divers. Music: Uplifting Inspirational Background Music by Sophonic

From playlist Videos in the introduction

Video thumbnail

Crushing cans from weight of one cup of water....Magdeburg Hemispheres without a pump..Bruce Yeany

Hydrostatics is the study of changing water pressure and it's relationship to water depth or column of water height in a pipe or tube In this video I'll demonstrate how water in a long thin tube can reduce pressure inside various soda bottles and can enough to crush them, actually it's a

From playlist Videos in the introduction

Video thumbnail

How to Make a Full Auto Airsoft Mini Gun [Halo Inspired Mobile Turret]

This is a type of cloud airsoft gun - named so because of how the pellets are blown around the reservoir before being fired out the barrel. Since there is nothing mechanical to get in the way of the workings of this gun the rate of fire is extremely high, an estimated 50 rounds per second.

From playlist DIY Ballistics

Video thumbnail

Network Security: Classical Encryption Techniques

Fundamental concepts of encryption techniques are discussed. Symmetric Cipher Model Substitution Techniques Transposition Techniques Product Ciphers Steganography

From playlist Network Security

Video thumbnail

Cryogenic machining: Custom rubber parts

I demonstrate the process of cryogenically freezing rubber, then CNC milling it into a custom shape. This avoids the need to injection mold or cast rubber parts.

From playlist Mechanics

Related pages

Cryptanalysis | Deniable encryption | Cryptosystem | Public-key cryptography | Key (cryptography) | Cryptography | RSA (cryptosystem)