Companies Home Search Profile

Secret Key Cryptography, Video Edition

Focused View

16:51:01

237 View
  • 001. Chapter 1. Introduction.mp4
    06:55
  • 002. Chapter 2. What is cryptography.mp4
    08:21
  • 003. Chapter 2. Types of cryptography.mp4
    10:26
  • 004. Chapter 2. Mechanical vs. digital.mp4
    09:54
  • 005. Chapter 2. Why choose Secret Key.mp4
    09:30
  • 006. Chapter 3. Preliminary concepts.mp4
    07:57
  • 007. Chapter 3. Number bases.mp4
    07:04
  • 008. Chapter 3. Prime numbers.mp4
    08:11
  • 009. Chapter 4. Cryptographers toolbox.mp4
    10:45
  • 010. Chapter 4. Transposition.mp4
    10:03
  • 011. Chapter 4. Chained digit generator.mp4
    09:45
  • 012. Chapter 5. Substitution ciphers.mp4
    07:08
  • 013. Chapter 5. Simple substitution.mp4
    06:35
  • 014. Chapter 5. Mixing the alphabet.mp4
    08:08
  • 015. Chapter 5. Nomenclators.mp4
    08:39
  • 016. Chapter 5. The Kasiski method.mp4
    09:56
  • 017. Chapter 5. Index of Coincidence.mp4
    07:32
  • 018. Chapter 5. Solving a polyalphabetic cipher.mp4
    10:19
  • 019. Chapter 5. Solving a general polyalphabetic cipher.mp4
    09:17
  • 020. Chapter 5. Running key.mp4
    08:54
  • 021. Chapter 5. Simulated rotor machines.mp4
    06:49
  • 022. Chapter 5. Three rotor machine.mp4
    10:34
  • 023. Chapter 6. Countermeasures.mp4
    07:41
  • 024. Chapter 6. Interrupted key.mp4
    11:06
  • 025. Chapter 6. Bigram and trigram substitution.mp4
    09:23
  • 026. Chapter 6. Adding null bits.mp4
    12:55
  • 027. Chapter 7. Transposition.mp4
    10:32
  • 028. Chapter 7. Columnar transposition.mp4
    08:52
  • 029. Chapter 7. Double columnar transposition.mp4
    11:21
  • 030. Chapter 7. Key transposition Part 1.mp4
    08:39
  • 031. Chapter 7. Key transposition Part 2.mp4
    07:38
  • 032. Chapter 8. Jefferson Wheel Cypher.mp4
    11:26
  • 033. Chapter 8. Ciphertext only solution.mp4
    08:05
  • 034. Chapter 9. Fractionation.mp4
    11:30
  • 035. Chapter 9. Solving a Playfair cipher.mp4
    10:38
  • 036. Chapter 9. Three Square.mp4
    10:39
  • 037. Chapter 9. Bifid.mp4
    09:54
  • 038. Chapter 9. Diagonal bifid.mp4
    11:37
  • 039. Chapter 9. Rectangular grids.mp4
    09:48
  • 040. Chapter 9. Cyclic 8-N.mp4
    08:01
  • 041. Chapter 10. Variable length fractionation.mp4
    10:51
  • 042. Chapter 10. Periodic lengths.mp4
    09:40
  • 043. Chapter 10. Post tag systems.mp4
    11:01
  • 044. Chapter 10. Different length tags.mp4
    10:48
  • 045. Chapter 10. Text compression.mp4
    11:12
  • 046. Chapter 10. Arithmetic coding.mp4
    11:55
  • 047. Chapter 10. Adaptive arithmetic coding.mp4
    08:53
  • 048. Chapter 11. Block ciphers.mp4
    12:45
  • 049. Chapter 11. Double DES.mp4
    10:11
  • 050. Chapter 11. Matrix multiplication.mp4
    11:27
  • 051. Chapter 11. Fixed vs. keyed substitution.mp4
    09:52
  • 052. Chapter 11. Involutory block cipher.mp4
    08:25
  • 053. Chapter 11. Ripple ciphers.mp4
    09:03
  • 054. Chapter 11. Block chaining.mp4
    08:19
  • 055. Chapter 11. Chaining mode summary.mp4
    07:14
  • 056. Chapter 12. Principles for secure encryption.mp4
    09:08
  • 057. Chapter 12. Confusion.mp4
    12:25
  • 058. Chapter 12. Correlation coefficient.mp4
    07:12
  • 059. Chapter 12. Base 26 linearity.mp4
    11:20
  • 060. Chapter 12. Base 256 linearity.mp4
    07:56
  • 061. Chapter 12. Adding a backdoor.mp4
    06:32
  • 062. Chapter 12. Condensed linearity.mp4
    06:20
  • 063. Chapter 12. Constructing an S box.mp4
    12:06
  • 064. Chapter 12. Diffusion.mp4
    11:14
  • 065. Chapter 12. Saturation Part 1.mp4
    07:15
  • 066. Chapter 12. Saturation Part 2.mp4
    09:19
  • 067. Chapter 13. Stream ciphers.mp4
    08:13
  • 068. Chapter 13. Multiplicative congruential generator Part 1.mp4
    08:22
  • 069. Chapter 13. Multiplicative congruential generator Part 2.mp4
    05:47
  • 070. Chapter 13. Linear congruential generator.mp4
    09:24
  • 071. Chapter 13. Chained addition generator.mp4
    09:25
  • 072. Chapter 13. Mersenne Twister.mp4
    09:27
  • 073. Chapter 13. Estimating the period.mp4
    07:31
  • 074. Chapter 13. Combining generators Part 1.mp4
    07:48
  • 075. Chapter 13. Combining generators Part 2.mp4
    07:36
  • 076. Chapter 13. True random numbers.mp4
    07:19
  • 077. Chapter 13. Refreshing the random bytes.mp4
    10:53
  • 078. Chapter 13. Hash functions.mp4
    08:14
  • 079. Chapter 14. One time pad.mp4
    10:42
  • 080. Chapter 14. Key supply.mp4
    12:01
  • 081. Chapter 14. Diffie Hellman key exchange.mp4
    10:10
  • 082. Chapter 14. Constructing large primes, new Part 1.mp4
    12:03
  • 083. Chapter 14. Constructing large primes, new Part 2.mp4
    10:26
  • 084. Chapter 15. Matrix methods.mp4
    07:08
  • 085. Chapter 15. Transposition matrix.mp4
    11:15
  • 086. Chapter 15. Hill cipher, computer versions.mp4
    11:04
  • 087. Chapter 15. Large integer multiplication.mp4
    08:43
  • 088. Chapter 15. Solving a linear congruence.mp4
    07:58
  • 089. Chapter 15. Laddering.mp4
    05:54
  • 090. Chapter 15. Large integer ciphers.mp4
    10:00
  • 091. Chapter 15. Multiplication modulo P.mp4
    11:03
  • 092. Chapter 15. Rings.mp4
    07:39
  • 093. Chapter 15. Matrices over a ring.mp4
    11:10
  • 094. Chapter 15. Finding an invertible matrix.mp4
    05:37
  • 095. Chapter 16. Three pass protocol.mp4
    10:39
  • 096. Chapter 16. Discrete logarithm.mp4
    08:56
  • 097. Chapter 16. Factoring.mp4
    08:09
  • 098. Chapter 16. Matrix three pass protocol.mp4
    09:10
  • 099. Chapter 16. Maximum order.mp4
    07:32
  • 100. Chapter 16. Solving bilinear equations.mp4
    09:22
  • 101. Chapter 16. Two sided three pass protocol.mp4
    05:31
  • 102. Chapter 17. Codes.mp4
    10:33
  • 103. Chapter 18. Quantum computers.mp4
    10:46
  • 104. Chapter 18. Error correction.mp4
    10:52
  • 105. Chapter 18. Equations.mp4
    07:59
  • 106. Chapter 18. Minimization.mp4
    12:32
  • 107. Chapter 18. Ultracomputers.mp4
    09:31
  • 108. Chapter 18. Ultrasubstitution cipher US A.mp4
    06:16
  • 109. Epilogue.mp4
    05:31
  • More details


    User Reviews
    Rating
    0
    0
    0
    0
    0
    average 0
    Total votes0
    Focused display
    O'Reilly Media is an American learning company established by Tim O'Reilly that publishes books, produces tech conferences, and provides an online learning platform. Its distinctive brand features a woodcut of an animal on many of its book covers.
    • language english
    • Training sessions 109
    • duration 16:51:01
    • Release Date 2023/05/04

    Courses related to Cryptography

    Courses related to Network Security