Stream ciphers

WAKE (cipher)

In cryptography, WAKE is a stream cipher designed by David Wheeler in 1993. WAKE stands for Word Auto Key Encryption. The cipher works in cipher feedback mode, generating keystream blocks from previous ciphertext blocks. WAKE uses an S-box with 256 entries of 32-bit words. The cipher is fast, but vulnerable to chosen plaintext and chosen ciphertext attacks. (Wikipedia).

Video thumbnail

the Internet (part 2)

An intro to the core protocols of the Internet, including IPv4, TCP, UDP, and HTTP. Part of a larger series teaching programming. See codeschool.org

From playlist The Internet

Video thumbnail

Cryptograph: Substitution Cipher (Caesar Cipher)

This lesson explains how to encrypt and decrypt a message using a Caeser cipher. Site: http://mathispower4u.com

From playlist Cryptography

Video thumbnail

Cryptography (part 2 of 3)

An informal introduction to cryptography. Part of a larger series teaching programming at http://codeschool.org

From playlist Cryptography

Video thumbnail

Perfect Cipher - Applied Cryptography

This video is part of an online course, Applied Cryptography. Check out the course here: https://www.udacity.com/course/cs387.

From playlist Applied Cryptography

Video thumbnail

Cryptography (part 1 of 3)

An informal introduction to cryptography. Part of a larger series teaching programming at http://codeschool.org

From playlist Cryptography

Video thumbnail

Shmoocon 2010: GSM: SRSLY? 5/6

Clip 5/6 Speakers: Chris Paget and Karsten Nohl The worlds most popular radio system has over 3 billion handsets in 212 countries and not even strong encryption. Perhaps due to cold-war era laws, GSM's security hasn't received the scrutiny it deserves given its popularity. This bothere

From playlist ShmooCon 2010

Video thumbnail

Symmetric Key Cryptography: The Keyword Cipher

This is the second in a series about cryptography; an extremely important aspect of computer science and cyber security. It covers a substitution cipher called the keyword cipher, also known as the Vigenère cipher. It explains how a keyword, or key phrase, can be used to effectively gene

From playlist Cryptography

Video thumbnail

Jessica Sklar - Mathematical Art Inspirations, Instantiations, and Installations - CoM Feb 2022

During 2020, while the world shut down, creativity flourished. Choral groups sang over Zoom, friends attended virtual cocktail hours, and mathematicians and artists spent their lockdown hours knitting, painting, and constructing wonders. In this talk, I’ll show and discuss pieces by QED A

From playlist Celebration of Mind

Video thumbnail

Zero to Hero Pentesting: Episode 5 - Scanning Tools (Nmap, Nessus, BurpSuite, etc.) & Tactics

*Special thanks to klauslippo for timestamping 0:00 - Introduction and TCP vs UDP 7:55 - 3-Way Handshake & Wireshark 12:38 - Scanning with Nmap 38:15 - Downloading and Installing Nessus 44:48 - Scanning with Metasploit 51:15 - Scanning with Nessus 1:02:00 - Scanning with Nikto 1:05:00 - S

From playlist Zero to Hero: A Practical Network Penetration Testing Course

Video thumbnail

25c3: Messing Around with Garage Doors

Speakers: Timo Kasper, Thomas Eisenbarth Breaking Remote Keyless Entry Systems with Power Analysis We demonstrate a complete break of the KeeLoq crypto-system. Thanks to Power Analysis, even non-specialists can gain access to objects secured by a KeeLoq access control system. KeeLoq rem

From playlist 25C3: Nothing to hide

Video thumbnail

Vigenere Cipher - Decryption (Known Key)

This video shows how to decrypt the ciphertext when the key is known. Decryption (unknown key): http://youtu.be/LaWp_Kq0cKs Encryption: http://youtu.be/izFivfLjD5E

From playlist Cryptography and Coding Theory

Video thumbnail

Scyther Blades & Pemmican - Rimworld Ice Sheet Tribal Ep. 13 [Rimworld Beta 18 Ice Sheet Challenge]

In this episode of our Rimworld Ice Sheet Tribal Challenge our tribal colonist gets his hand on a few Scyther bladesm makes Pemmican and researches Batteries out on the Ice Sheet on Randy Random Extreme difficulty. ► Full Playlist: https://goo.gl/q3Cx7t We return to the Ice Sheet in Rimwo

From playlist Pete Completes: Rimworld Ice Sheet Tribal Challenge - Starting with nothing [Rimworld Randy Random Extreme/Merciless]

Video thumbnail

IED Traps & Snow Shoveling - Rimworld Ice Sheet Tribal Ep. 26 [Rimworld Beta 18 Ice Sheet Challenge]

In this episode of our Rimworld Ice Sheet Tribal Challenge our two tribal colonists upgrade their base defenses with IED trap and start snow shoveling out on the Ice Sheet on Randy Random Extreme difficulty. ► Full Playlist: https://goo.gl/q3Cx7t We return to the Ice Sheet in Rimworld Bet

From playlist Pete Completes: Rimworld Ice Sheet Tribal Challenge - Starting with nothing [Rimworld Randy Random Extreme/Merciless]

Video thumbnail

Episode 042: A Trans, Religious, Simulation Allegory, Oh My! The Matrix Film Franchise

Join Alex in an exploration of the themes and allegories — that have a psychological flair, of course — in The Matrix (1999) film franchise! In this episode, Alex dives into the Wachowski sisters' true meaning of the first film, which was a transgender allegory. He also explores the iconic

From playlist CinemaPsych Podcast

Video thumbnail

27c3: Wideband GSM Sniffing (en)

Speakers: Karsten Nohl, Sylvain Munaut GSM is still the most widely used security technology in the world with a user base of 5 billion and a quickly growing number of critical applications. 26C3's rainbow table attack on GSM's A5/1 encryption convinced many users that GSM calls should b

From playlist 27C3: We come in peace

Video thumbnail

Keeping Secrets: Cryptography In A Connected World

Josh Zepps, Simon Singh, Orr Dunkelman, Tal Rabin, and Brian Snow discuss how, since the earliest days of communication, clever minds have devised methods for enciphering messages to shield them from prying eyes. Today, cryptography has moved beyond the realm of dilettantes and soldiers to

From playlist Explore the World Science Festival

Video thumbnail

Discrete Structures: Random number generators, checksums, hashing

Learn about random number generators, checksums, and hashing. We'll start with the von Neumann random number generator and the contemporary linear congruential generator. Then we'll go over the Luhn algorithm used for credit card number validation and then introduce hash functions such as

From playlist Discrete Structures, Spring 2022

Related pages

Keystream | Stream cipher | Ciphertext | Tiny Encryption Algorithm | XTEA | S-box | Bit | Cryptography