Cryptanalytic software

The Radio Hacker's Codebook

The Radio Hacker's Codebook is a book for computer enthusiasts written by George Sassoon. The book explains how to receive international radioteletype signals, convert them with a circuit and then decode them on a microcomputer. In the case of this book the computer is the superseded Research Machines 380Z. Programs to do these functions are given, written in machine code and BASIC. However legal and moral issues relating to intercepting messages are not included. Other radioteletype subject included are the FEC and automatic repeat request used in . The book also include an exposition of encryption, including the public key RSA cipher and presciently expounds on the lack of privacy in the cashless society. Code examples are also given using the to encode and decode the German Enigma machine. The books claims that the Enigma was kept secret for long periods because understanding it could compromise the American M-209 cipher machine, and that it was still being sold to other countries. Other encryption topics covered include Data Encryption Standard, Vernam cipher (one-time pad), pseudo random number generators, transposition ciphers, and substitution ciphers The Radio Hacker's Codebook is idiosyncratic revealing a personal quest by Sassoon to decrypt military signals on the radio spectrum. However he would have had no chance to decode modern encryption as described in the book. The Radio Hacker's Codebook broke ground in having a low price for a technical computing book being sold for £6.95 well below the typical £10+ price for computing books at the time. It was published by Duckworth and had 239 pages. (Wikipedia).

The Radio Hacker's Codebook
Video thumbnail

the Internet (part 2)

An intro to the core protocols of the Internet, including IPv4, TCP, UDP, and HTTP. Part of a larger series teaching programming. See codeschool.org

From playlist The Internet

Video thumbnail

3D Printed Hacker Computer #shorts

I designed this 3D printed hacker computer. All you need is a cell phone. Download link: https://www.thingiverse.com/thing:2855723 #halloween #prop #cellphone #diy

From playlist Shorts

Video thumbnail

Make A Laser Listener!

Learn how to transmit audio over a laser beam. And incase you are wondering. Yes. This is true. The CIA has been using this technology for decades.

From playlist Cool Science Tricks

Video thumbnail

Bluetooth sniffing in Linux

Credits go out to DRGR33NS visit his website at http://drgr33nsblog.blogspot.com Bluetooth sniffing in *nux vol 2 Link key exchange and pin crack

From playlist Bluetooth Hacking

Video thumbnail

25c3: Analyzing RFID Security

Speakers: Henryk Plötz. Karsten Nohl Many RFID tags have weaknesses, but the security level of different tags varies widely. Using the Mifare Classic cards as an example, we illustrate the complexity of RFID systems and discuss different attack vectors. To empower further analysis of RFID

From playlist 25C3: Nothing to hide

Video thumbnail

5G Explained: Uplink Data in 5G NR

View the full playlist here: https://www.youtube.com/playlist?list=PLn8PRpmsu08rCL-Ejn25HMX6M6o7QjJoe Learn about the uplink shared channel chain, which includes elements already found in the downlink shared channel chain including LDPC coding, modulation schemes, layer mapping, and the tw

From playlist 5G Explained

Video thumbnail

Spy Control - Intro to Algorithms

This video is part of an online course, Intro to Algorithms. Check out the course here: https://www.udacity.com/course/cs215.

From playlist Introduction to Algorithms

Video thumbnail

Wireless Key Grabber

for backtrack 4 final extract this file http://www.megaupload.com/?d=Z1TZEFDG script information is here http://pastebin.com/f29b60836

From playlist wireless hacking

Video thumbnail

USS England's Twelve Days

In a period of twelve days in May 1944, the Buckley-class destroyer escort USS England set a record unparalleled in the annals of antisubmarine warfare. It is history that deserves to be remembered. Get your free trial of MagellanTV here: https://try.magellantv.com/historyguy/. It's an ex

From playlist US History

Video thumbnail

Intro to fiber optics and RF encoding | Networking tutorial (2 of 13)

A quick look at how bits of information can be encoded for transmission over fiber optics or radio. Support me on Patreon: https://www.patreon.com/beneater This video is part 2 of an intro to networking tutorial: https://www.youtube.com/playlist?list=PLowKtXNTBypH19whXTVoG3oKSuOcw_XeW

From playlist Networking tutorial

Video thumbnail

Hamming Code For Error Detection And Correction | Hamming Code Error Correction | Simplilearn

In this video on "Hamming Code for Error Detection," we will look into the introductory knowledge related to the network technique of hamming code. This network will allow us to detect and correct errors on the receiver side. Explained in the stepwise format for proper clarification. Topi

From playlist Networking

Video thumbnail

Cryptography: Crash Course Computer Science #33

Today we’re going to talk about how to keep information secret, and this isn’t a new goal. From as early as Julius Caesar’s Caesar cipher to Mary, Queen of Scots, encrypted messages to kill Queen Elizabeth in 1587, theres has long been a need to encrypt and decrypt private correspondence.

From playlist Computer Science

Video thumbnail

The SPSS 27 Data Codebook - Statistics with SPSS for Beginners (with Puppies) (7 of 8)

Now that we have a dataset, Dr. Daniel shows you an underused SPSS tool to make your data readable by human beings...not just a computer! Diva and Mickey get a nap in while Dr. Daniel walks you through the settings for a codebook, using all available settings. Then we examine the output to

From playlist Introduction to Statistics with IBM SPSS 27 for Beginners (with Puppies)

Video thumbnail

Nexus Trimester - Ofer Shayevitz (Tel Aviv University)

Zero-error capacity for multiuser channels Ofer Shayevitz (Tel Aviv University) March,03 206 Abstract: The capacity of a point-to-point communication channel under a zero-error criterion was originally studied by Shannon in 1956. Despite the apparent simplicity of the problem, and in cont

From playlist Nexus Trimester - 2016 - Central Workshop

Video thumbnail

[Quiz] Interpretable ML, VQ-VAE w/o Quantization / infinite codebook, Pearson’s, PointClouds

🔥 A hot batch of #MachineLearning Quiz questions explained! Tim Elsner @daidailoh (Twitter) jumped in again to do Ms. Coffee Bean’s Job in explaining these concepts that were part of the AI Coffee Break Quiz (👉 https://www.youtube.com/c/AICoffeeBreak/community ) The Machine Learning Quiz

From playlist AI Coffee Break Quiz question answers

Video thumbnail

Jukebox: A Generative Model for Music (Paper Explained)

This generative model for music can make entire songs with remarkable quality and consistency. It can be conditioned on genre, artist, and even lyrics. Blog: https://openai.com/blog/jukebox/ Paper: https://cdn.openai.com/papers/jukebox.pdf Code: https://github.com/openai/jukebox/ Abstrac

From playlist Papers Explained

Video thumbnail

26C3: GSM: SRSLY? 4/7

Clip 4/7 Speakers: Chris Paget, Karsten Nohl The worlds most popular radio system has over 3 billion handsets in 212 countries and not even strong encryption. Perhaps due to cold-war era laws, GSM's security hasn't received the scrutiny it deserves given its popularity. This bothere

From playlist 26C3: Here be dragons day 1

Video thumbnail

VQ-GAN | Paper Explanation

Vector Quantized Generative Adversarial Networks (VQGAN) is a generative model for image modeling. It was introduced in Taming Transformers for High-Resolution Image Synthesis. The concept is build upon two stages. The first stage learns in an autoencoder-like fashion by encoding images in

From playlist Paper Explanations

Video thumbnail

Top Coding Challenge Websites

A great way to improve your skills when learning to code is by solving coding challenges. Solving different types of challenges and puzzles can help you become a better problem solver, learn the intricacies of a programming language, prepare for job interviews, learn new algorithms, and mo

From playlist Learn To Code

Related pages

Enigma machine | Transposition cipher | One-time pad | Automatic repeat request | Substitution cipher | Data Encryption Standard