Pseudorandom number generators | Stream ciphers

Solitaire (cipher)

The Solitaire cryptographic algorithm was designed by Bruce Schneier at the request of Neal Stephenson for use in his novel Cryptonomicon, in which field agents use it to communicate securely without having to rely on electronics or having to carry incriminating tools. It was designed to be a manual cryptosystem calculated with an ordinary deck of playing cards. In Cryptonomicon, this algorithm was originally called Pontifex to hide the fact that it involved playing cards. One of the motivations behind Solitaire's creation is that in totalitarian environments, a deck of cards is far more affordable (and less incriminating) than a personal computer with an array of cryptological utilities. However, as Schneier warns in the appendix of Cryptonomicon, just about everyone with an interest in cryptanalysis will now know about this algorithm, so carrying a deck of cards may also be considered incriminating. Furthermore, analysis has revealed flaws in the cipher such that it is now considered insecure. (Wikipedia).

Video thumbnail

Cryptography (part 1 of 3)

An informal introduction to cryptography. Part of a larger series teaching programming at http://codeschool.org

From playlist Cryptography

Video thumbnail

Cryptanalysis of Classical Ciphers

Cryptography and Network Security by Prof. D. Mukhopadhyay, Department of Computer Science and Engineering, IIT Kharagpur. For more details on NPTEL visit http://nptel.iitm.ac.in

From playlist Computer - Cryptography and Network Security

Video thumbnail

Symmetric Key Cryptography: The Keyword Cipher

This is the second in a series about cryptography; an extremely important aspect of computer science and cyber security. It covers a substitution cipher called the keyword cipher, also known as the Vigenère cipher. It explains how a keyword, or key phrase, can be used to effectively gene

From playlist Cryptography

Video thumbnail

Classical Cryptosystems

Cryptography and Network Security by Prof. D. Mukhopadhyay, Department of Computer Science and Engineering, IIT Kharagpur. For more details on NPTEL visit http://nptel.iitm.ac.in

From playlist Computer - Cryptography and Network Security

Video thumbnail

Steganography Tutorial - Hide Messages In Images

Steganography is the hiding of a secret message within an ordinary message and the extraction of it at its destination. Steganography takes cryptography a step further by hiding an encrypted message so that no one suspects it exists. Ideally, anyone scanning your data will fail to know it

From playlist Ethical Hacking & Penetration Testing - Complete Course

Video thumbnail

The RSA Cryptosystem

Cryptography and Network Security by Prof. D. Mukhopadhyay, Department of Computer Science and Engineering, IIT Kharagpur. For more details on NPTEL visit http://nptel.iitm.ac.in

From playlist Computer - Cryptography and Network Security

Video thumbnail

Cryptograph: Substitution Cipher (Caesar Cipher)

This lesson explains how to encrypt and decrypt a message using a Caeser cipher. Site: http://mathispower4u.com

From playlist Cryptography

Video thumbnail

Symmetric Key Cryptography: The Caesar Cipher

This is the first in a series about cryptography; an extremely important aspect of computer science and cyber security. It introduces symmetric key cryptography with a well known substitution cipher, namely the Caesar Cipher. It includes a few examples you can try for yourself using diff

From playlist Cryptography

Video thumbnail

How did Fibonacci beat the Solitaire army?

Fibonacci and a super pretty piece of life-and-death mathematics. What can go wrong? 00:00 Intro 02:20 Solitaire 03:12 Survivor challenge 05:32 Invasion 11:41 The triangles of death 20:22 Final animation 21:43 Thank You! Here is an online version of Marty and my newspaper article about

From playlist Recent videos

Video thumbnail

An Alternative Look at Peg Solitaire

A video about peg solitaire, parity arguments, and biscuits. This video is for educational purposes. There is a lot of fun mathematics going on under the hood, including connections to linear programming, Diophantine equations and the mysteriously named Fredholm alternative. If you're in

From playlist Summer of Math Exposition 2 videos

Video thumbnail

SOLITAIRE FROM SCRATCH! - CS50 on Twitch, EP. 39

Join CS50's Colton Ogden for part 1 of a from-scratch implementation of Solitaire, a classic card game immortalized on older versions of Windows. In this episode, we cover creating card objects, a deck with shuffling capability, a game board, and much of the foundation upon which we'll bui

From playlist CS50 on Twitch

Video thumbnail

SOLITAIRE PART 2! - CS50 on Twitch, EP. 41

Join CS50's Colton Ogden for the second of three parts implementing Solitaire from scratch in LÖVE and Lua. In this episode, we explore laying out the tableaus, "Z-indexing" in the context of our game (in line with a special guest appearance!), discussing parenting, and more. Tune in live

From playlist CS50 on Twitch

Video thumbnail

The Kobayashi Maru - No-Win Scenarios in Games - Extra Credits

Come hang out on the twitch channel! : twitch.tv/ExtraCredits Ah, the infamous Kobayashi Maru. The no-win Star Trek scenario is actually more common in video games than you might think. When games employ random elements, you increase the odds of creating a scenario where before the player

From playlist Extra Credits: Game Design

Video thumbnail

Solving Impossible Puzzles | Math Logic and Games

How can math help you find solutions to some of the world's trickiest puzzles? Watch as Art Benjamin uses logic to solve some classic games, including the 15 Puzzle, Box of Lights, and Peg Solitaire—all which have been driving people crazy for centuries. This video is episode eight from t

From playlist Math and Statistics

Video thumbnail

Pyramid Solitaire

Pyramid Solitaire is a simple game in which students will find pairs of cards that have a sum of 13. Fun and a good way to practice addition facts. Read more about this game: http://theothermath.com/index.php/2020/04/02/pyramid/

From playlist Games and puzzles

Video thumbnail

Robert Vallin - Maverick Solitaire & Three-Card Poker - G4G13 Apr 2018

We apply the idea of Maverick Solitaire to a casino game to show any 15 cards can be arranged into 5 three-card hands all of which hold a pair or higher.

From playlist G4G13 Videos

Video thumbnail

MORE OF YOUR SOURCE CODE! - CS50 on Twitch, EP. 37

Join CS50's David J. Malan, Brian Yu, and Colton Ogden for a look at more of *your* source code, submitted to us at bit.ly/cs50twitchcodereview! We'll cover design and style pluses and minuses from a multitude of languages; today, we even learn about prime numbers! Tune in live on twitch.

From playlist CS50 on Twitch

Video thumbnail

Micropython Name Badge - Computerphile

What's in a name badge? Well in this case a microprocessor, LCD display, Gyro, WiFi and all sorts of things. Rob Miles discusses the Electromagnetic Field 2016 name badge. Physics of Computer Chips: https://youtu.be/xkLAhU74f3s Arduino Playlist: https://www.youtube.com/playlist?list=PLzH6

From playlist Computerphile Videos

Related pages

Keystream | Cryptanalysis | Ciphertext | Algorithm | Modular arithmetic