Secret Key Cryptography, Video Edition
Focused View
16:51:01
237 View
001. Chapter 1. Introduction.mp4
06:55
002. Chapter 2. What is cryptography.mp4
08:21
003. Chapter 2. Types of cryptography.mp4
10:26
004. Chapter 2. Mechanical vs. digital.mp4
09:54
005. Chapter 2. Why choose Secret Key.mp4
09:30
006. Chapter 3. Preliminary concepts.mp4
07:57
007. Chapter 3. Number bases.mp4
07:04
008. Chapter 3. Prime numbers.mp4
08:11
009. Chapter 4. Cryptographers toolbox.mp4
10:45
010. Chapter 4. Transposition.mp4
10:03
011. Chapter 4. Chained digit generator.mp4
09:45
012. Chapter 5. Substitution ciphers.mp4
07:08
013. Chapter 5. Simple substitution.mp4
06:35
014. Chapter 5. Mixing the alphabet.mp4
08:08
015. Chapter 5. Nomenclators.mp4
08:39
016. Chapter 5. The Kasiski method.mp4
09:56
017. Chapter 5. Index of Coincidence.mp4
07:32
018. Chapter 5. Solving a polyalphabetic cipher.mp4
10:19
019. Chapter 5. Solving a general polyalphabetic cipher.mp4
09:17
020. Chapter 5. Running key.mp4
08:54
021. Chapter 5. Simulated rotor machines.mp4
06:49
022. Chapter 5. Three rotor machine.mp4
10:34
023. Chapter 6. Countermeasures.mp4
07:41
024. Chapter 6. Interrupted key.mp4
11:06
025. Chapter 6. Bigram and trigram substitution.mp4
09:23
026. Chapter 6. Adding null bits.mp4
12:55
027. Chapter 7. Transposition.mp4
10:32
028. Chapter 7. Columnar transposition.mp4
08:52
029. Chapter 7. Double columnar transposition.mp4
11:21
030. Chapter 7. Key transposition Part 1.mp4
08:39
031. Chapter 7. Key transposition Part 2.mp4
07:38
032. Chapter 8. Jefferson Wheel Cypher.mp4
11:26
033. Chapter 8. Ciphertext only solution.mp4
08:05
034. Chapter 9. Fractionation.mp4
11:30
035. Chapter 9. Solving a Playfair cipher.mp4
10:38
036. Chapter 9. Three Square.mp4
10:39
037. Chapter 9. Bifid.mp4
09:54
038. Chapter 9. Diagonal bifid.mp4
11:37
039. Chapter 9. Rectangular grids.mp4
09:48
040. Chapter 9. Cyclic 8-N.mp4
08:01
041. Chapter 10. Variable length fractionation.mp4
10:51
042. Chapter 10. Periodic lengths.mp4
09:40
043. Chapter 10. Post tag systems.mp4
11:01
044. Chapter 10. Different length tags.mp4
10:48
045. Chapter 10. Text compression.mp4
11:12
046. Chapter 10. Arithmetic coding.mp4
11:55
047. Chapter 10. Adaptive arithmetic coding.mp4
08:53
048. Chapter 11. Block ciphers.mp4
12:45
049. Chapter 11. Double DES.mp4
10:11
050. Chapter 11. Matrix multiplication.mp4
11:27
051. Chapter 11. Fixed vs. keyed substitution.mp4
09:52
052. Chapter 11. Involutory block cipher.mp4
08:25
053. Chapter 11. Ripple ciphers.mp4
09:03
054. Chapter 11. Block chaining.mp4
08:19
055. Chapter 11. Chaining mode summary.mp4
07:14
056. Chapter 12. Principles for secure encryption.mp4
09:08
057. Chapter 12. Confusion.mp4
12:25
058. Chapter 12. Correlation coefficient.mp4
07:12
059. Chapter 12. Base 26 linearity.mp4
11:20
060. Chapter 12. Base 256 linearity.mp4
07:56
061. Chapter 12. Adding a backdoor.mp4
06:32
062. Chapter 12. Condensed linearity.mp4
06:20
063. Chapter 12. Constructing an S box.mp4
12:06
064. Chapter 12. Diffusion.mp4
11:14
065. Chapter 12. Saturation Part 1.mp4
07:15
066. Chapter 12. Saturation Part 2.mp4
09:19
067. Chapter 13. Stream ciphers.mp4
08:13
068. Chapter 13. Multiplicative congruential generator Part 1.mp4
08:22
069. Chapter 13. Multiplicative congruential generator Part 2.mp4
05:47
070. Chapter 13. Linear congruential generator.mp4
09:24
071. Chapter 13. Chained addition generator.mp4
09:25
072. Chapter 13. Mersenne Twister.mp4
09:27
073. Chapter 13. Estimating the period.mp4
07:31
074. Chapter 13. Combining generators Part 1.mp4
07:48
075. Chapter 13. Combining generators Part 2.mp4
07:36
076. Chapter 13. True random numbers.mp4
07:19
077. Chapter 13. Refreshing the random bytes.mp4
10:53
078. Chapter 13. Hash functions.mp4
08:14
079. Chapter 14. One time pad.mp4
10:42
080. Chapter 14. Key supply.mp4
12:01
081. Chapter 14. Diffie Hellman key exchange.mp4
10:10
082. Chapter 14. Constructing large primes, new Part 1.mp4
12:03
083. Chapter 14. Constructing large primes, new Part 2.mp4
10:26
084. Chapter 15. Matrix methods.mp4
07:08
085. Chapter 15. Transposition matrix.mp4
11:15
086. Chapter 15. Hill cipher, computer versions.mp4
11:04
087. Chapter 15. Large integer multiplication.mp4
08:43
088. Chapter 15. Solving a linear congruence.mp4
07:58
089. Chapter 15. Laddering.mp4
05:54
090. Chapter 15. Large integer ciphers.mp4
10:00
091. Chapter 15. Multiplication modulo P.mp4
11:03
092. Chapter 15. Rings.mp4
07:39
093. Chapter 15. Matrices over a ring.mp4
11:10
094. Chapter 15. Finding an invertible matrix.mp4
05:37
095. Chapter 16. Three pass protocol.mp4
10:39
096. Chapter 16. Discrete logarithm.mp4
08:56
097. Chapter 16. Factoring.mp4
08:09
098. Chapter 16. Matrix three pass protocol.mp4
09:10
099. Chapter 16. Maximum order.mp4
07:32
100. Chapter 16. Solving bilinear equations.mp4
09:22
101. Chapter 16. Two sided three pass protocol.mp4
05:31
102. Chapter 17. Codes.mp4
10:33
103. Chapter 18. Quantum computers.mp4
10:46
104. Chapter 18. Error correction.mp4
10:52
105. Chapter 18. Equations.mp4
07:59
106. Chapter 18. Minimization.mp4
12:32
107. Chapter 18. Ultracomputers.mp4
09:31
108. Chapter 18. Ultrasubstitution cipher US A.mp4
06:16
109. Epilogue.mp4
05:31
More details
User Reviews
Rating
average 0
Focused display
Category

O'Reilly
View courses O'ReillyO'Reilly Media is an American learning company established by Tim O'Reilly that publishes books, produces tech conferences, and provides an online learning platform. Its distinctive brand features a woodcut of an animal on many of its book covers.
- language english
- Training sessions 109
- duration 16:51:01
- Release Date 2023/05/04