5. Stream Ciphers - The practical implementations of One Time Pads/14. Brute force of our Stream Cipher - More than one weakness revealed.mp4 188.5 MB
5. Stream Ciphers - The practical implementations of One Time Pads/2. Implementation of our Stream Cipher.mp4 177.3 MB
3. Substitution Cipher - is security only dependent on the size of Key Space/13. Implementation of frequency analysis.mp4 171.5 MB
1. Introduction/1. Overview - What will you learn.mp4 155.9 MB
2. Caesar Cipher - The biggest learning in Crypto (Kerckhoff's Principle)/4. Implementing the Caesar Cipher (encryption).mp4 155.2 MB
2. Caesar Cipher - The biggest learning in Crypto (Kerckhoff's Principle)/8. Understand the weakness of Caesar Cipher (Kerckhoff's Principle).mp4 152.3 MB
3. Substitution Cipher - is security only dependent on the size of Key Space/8. Implementing the Substitution Cipher (encryption).mp4 151.3 MB
5. Stream Ciphers - The practical implementations of One Time Pads/11. Implementation explaining the problem of re-use of keys in Stream Ciphers.mp4 146.7 MB
9. Hash Functions/4. How Digital Signatures works (uses hash functions) and implementation of it.mp4 141.7 MB
3. Substitution Cipher - is security only dependent on the size of Key Space/19. Make a calculated guess of the key.mp4 140.9 MB
6. Block Ciphers - DES/6. DES and modifying the cipher texts.mp4 139.6 MB
3. Substitution Cipher - is security only dependent on the size of Key Space/1. Introduction to permutations - you need them to understand Substitution Ciphers.mp4 136.0 MB
3. Substitution Cipher - is security only dependent on the size of Key Space/17. Making guesses (not lucky ones).mp4 133.9 MB
9. Hash Functions/1. What is a Hash Function and What is a Good Hash Function.mp4 123.5 MB
7. Key Exchange/2. Crash Course in Modular Calculations.mp4 122.9 MB
7. Key Exchange/3. Implementation of Modular Calculations in Python.mp4 121.6 MB
6. Block Ciphers - DES/2. Introduction to DES.mp4 113.5 MB
8. Public Key Encryption Systems - RSA/2. What is and Understand RSA.mp4 111.0 MB
4. One Time Pad (provable secure systems - what is the catch)/5. Implementing the One Time Pad.mp4 110.2 MB
5. Stream Ciphers - The practical implementations of One Time Pads/8. Implementation of the Authenticity problem with Stream Ciphers.mp4 108.3 MB
3. Substitution Cipher - is security only dependent on the size of Key Space/4. Check the performance and understand how fast the space of permutations grows.mp4 108.0 MB
9. Hash Functions/12. Why iterate over hash function and demonstrated by implementation in Python.mp4 107.9 MB
1. Introduction/3. About me.mp4 107.9 MB
5. Stream Ciphers - The practical implementations of One Time Pads/5. Implementation to understand the benefit of Stream Cipher.mp4 106.1 MB
7. Key Exchange/8. Implementing a Random Prime Generator.mp4 104.0 MB
5. Stream Ciphers - The practical implementations of One Time Pads/1. Why One Time Pads are difficult and introducing the Stream Cipher.mp4 102.5 MB
8. Public Key Encryption Systems - RSA/6. The Security of RSA and how to Implement an Attack.mp4 102.2 MB
11. TLSSSL protocol - Now we understand it all/1. TLSSSL protocol.mp4 93.9 MB
9. Hash Functions/8. How Passwords are Verified - with real example from Mac.mp4 92.9 MB
7. Key Exchange/11. Implementing a Group Generator.mp4 91.7 MB
7. Key Exchange/1. Key Exchange Problem Explained.mp4 90.3 MB
3. Substitution Cipher - is security only dependent on the size of Key Space/2. Implementing a counter on how many permutations there are.mp4 87.8 MB
4. One Time Pad (provable secure systems - what is the catch)/1. Introduction to XOR - the most beautiful operation.mp4 86.4 MB
2. Caesar Cipher - The biggest learning in Crypto (Kerckhoff's Principle)/6. Implementing the Caesar Cipher (decryption).mp4 86.2 MB
2. Caesar Cipher - The biggest learning in Crypto (Kerckhoff's Principle)/9. Implementing an Attack on Caesar Cipher.mp4 82.9 MB
5. Stream Ciphers - The practical implementations of One Time Pads/17. Modern day Stream Ciphers - A51.mp4 81.9 MB
9. Hash Functions/2. Implementation of Hash Functions in Python with hashlib.mp4 80.6 MB
3. Substitution Cipher - is security only dependent on the size of Key Space/12. Introduction to Frequency Analysis.mp4 79.6 MB
8. Public Key Encryption Systems - RSA/10. Security Considerations of RSA.mp4 79.3 MB
8. Public Key Encryption Systems - RSA/8. How Wrong Use of RSA Breaks it - By Example in Python.mp4 78.3 MB
5. Stream Ciphers - The practical implementations of One Time Pads/14. Brute force of our Stream Cipher - More than one weakness revealed.srt 16.7 kB
5. Stream Ciphers - The practical implementations of One Time Pads/2. Implementation of our Stream Cipher.srt 16.3 kB
3. Substitution Cipher - is security only dependent on the size of Key Space/1. Introduction to permutations - you need them to understand Substitution Ciphers.srt 15.1 kB
3. Substitution Cipher - is security only dependent on the size of Key Space/8. Implementing the Substitution Cipher (encryption).srt 14.8 kB
3. Substitution Cipher - is security only dependent on the size of Key Space/13. Implementation of frequency analysis.srt 14.5 kB
2. Caesar Cipher - The biggest learning in Crypto (Kerckhoff's Principle)/8. Understand the weakness of Caesar Cipher (Kerckhoff's Principle).srt 14.3 kB
2. Caesar Cipher - The biggest learning in Crypto (Kerckhoff's Principle)/4. Implementing the Caesar Cipher (encryption).srt 14.2 kB
3. Substitution Cipher - is security only dependent on the size of Key Space/17. Making guesses (not lucky ones).srt 13.8 kB
5. Stream Ciphers - The practical implementations of One Time Pads/11. Implementation explaining the problem of re-use of keys in Stream Ciphers.srt 13.3 kB
7. Key Exchange/2. Crash Course in Modular Calculations.srt 12.8 kB
1. Introduction/1. Overview - What will you learn.srt 12.8 kB
3. Substitution Cipher - is security only dependent on the size of Key Space/19. Make a calculated guess of the key.srt 12.5 kB
9. Hash Functions/1. What is a Hash Function and What is a Good Hash Function.srt 12.3 kB
6. Block Ciphers - DES/6. DES and modifying the cipher texts.srt 12.2 kB
5. Stream Ciphers - The practical implementations of One Time Pads/8. Implementation of the Authenticity problem with Stream Ciphers.srt 11.6 kB
9. Hash Functions/4. How Digital Signatures works (uses hash functions) and implementation of it.srt 11.4 kB
7. Key Exchange/3. Implementation of Modular Calculations in Python.srt 11.3 kB
5. Stream Ciphers - The practical implementations of One Time Pads/1. Why One Time Pads are difficult and introducing the Stream Cipher.srt 11.2 kB
6. Block Ciphers - DES/2. Introduction to DES.srt 10.1 kB
3. Substitution Cipher - is security only dependent on the size of Key Space/4. Check the performance and understand how fast the space of permutations grows.srt 10.1 kB
7. Key Exchange/8. Implementing a Random Prime Generator.srt 10.0 kB
8. Public Key Encryption Systems - RSA/2. What is and Understand RSA.srt 9.8 kB
9. Hash Functions/12. Why iterate over hash function and demonstrated by implementation in Python.srt 9.7 kB
4. One Time Pad (provable secure systems - what is the catch)/5. Implementing the One Time Pad.srt 9.6 kB
7. Key Exchange/1. Key Exchange Problem Explained.srt 9.3 kB
3. Substitution Cipher - is security only dependent on the size of Key Space/2. Implementing a counter on how many permutations there are.srt 9.2 kB
5. Stream Ciphers - The practical implementations of One Time Pads/5. Implementation to understand the benefit of Stream Cipher.srt 9.2 kB
5. Stream Ciphers - The practical implementations of One Time Pads/10. Re-use of keys in Stream Ciphers - Another Weakness.srt 4.4 kB
5. Stream Ciphers - The practical implementations of One Time Pads/13. Low entropy explained.srt 4.3 kB
9. Hash Functions/6. Eve trying to modify a signed message - will Bob figure it out.srt 4.0 kB
10. HMAC - What is a Message Authentication Code and how is it used/1. What is a HMAC.srt 4.0 kB
4. One Time Pad (provable secure systems - what is the catch)/4. One Time Pad explained.srt 3.2 kB
5. Stream Ciphers - The practical implementations of One Time Pads/4. Benefits of Stream Ciphers in practical use.srt 3.1 kB
10. HMAC - What is a Message Authentication Code and how is it used/4. What happens if Eve modifies a message - will Bob figure it out.srt 1.9 kB
3. Substitution Cipher - is security only dependent on the size of Key Space/13.1 FrequencyAnalysis.py 1.2 kB
7. Key Exchange/9. REMARK If you do not use Python 3.8 (read this) and a small correction.html 747 Bytes
12. Next step and feedback/1. Thank you.html 629 Bytes
10. HMAC - What is a Message Authentication Code and how is it used/3. HMAC example.html 169 Bytes
10. HMAC - What is a Message Authentication Code and how is it used/5. HMAC modifying the message.html 169 Bytes
2. Caesar Cipher - The biggest learning in Crypto (Kerckhoff's Principle)/10. Implement an Attack on Caesar Cipher.html 169 Bytes
2. Caesar Cipher - The biggest learning in Crypto (Kerckhoff's Principle)/11. Weakness of Caesar Cipher.html 169 Bytes
2. Caesar Cipher - The biggest learning in Crypto (Kerckhoff's Principle)/3. Caesar Cipher Example.html 169 Bytes
2. Caesar Cipher - The biggest learning in Crypto (Kerckhoff's Principle)/5. Implement the encryption of Caesar Cipher.html 169 Bytes
2. Caesar Cipher - The biggest learning in Crypto (Kerckhoff's Principle)/7. Implement the decryption of Caesar Cipher.html 169 Bytes
3. Substitution Cipher - is security only dependent on the size of Key Space/11. A simple implementation of decryption of the Substitution Cipher.html 169 Bytes
3. Substitution Cipher - is security only dependent on the size of Key Space/14. Frequency Analysis.html 169 Bytes
3. Substitution Cipher - is security only dependent on the size of Key Space/16. Refactoring our code.html 169 Bytes
3. Substitution Cipher - is security only dependent on the size of Key Space/18. Making qualified guesses.html 169 Bytes
3. Substitution Cipher - is security only dependent on the size of Key Space/20. Make a calculated guess of the key.html 169 Bytes
3. Substitution Cipher - is security only dependent on the size of Key Space/22. Finalise the guess and read the encrypted message.html 169 Bytes
3. Substitution Cipher - is security only dependent on the size of Key Space/3. Count number of permutations.html 169 Bytes
3. Substitution Cipher - is security only dependent on the size of Key Space/5. How to check the performance.html 169 Bytes
3. Substitution Cipher - is security only dependent on the size of Key Space/9. A simple implementation of Substitution Cipher.html 169 Bytes
4. One Time Pad (provable secure systems - what is the catch)/3. XOR.html 169 Bytes
4. One Time Pad (provable secure systems - what is the catch)/6. One Time Pad.html 169 Bytes
4. One Time Pad (provable secure systems - what is the catch)/9. Example showing that the One Time Pad cannot be broken.html 169 Bytes
5. Stream Ciphers - The practical implementations of One Time Pads/12. Exploiting re-use of key in Stream Ciphers.html 169 Bytes
5. Stream Ciphers - The practical implementations of One Time Pads/15. Brute force attack on out Stream Cipher.html 169 Bytes
5. Stream Ciphers - The practical implementations of One Time Pads/16. Brute force attack on the full key space of the Pseudo Random Generator..html 169 Bytes
5. Stream Ciphers - The practical implementations of One Time Pads/3. Your first Stream Cipher.html 169 Bytes
5. Stream Ciphers - The practical implementations of One Time Pads/6. Bit lost in transmission.html 169 Bytes
5. Stream Ciphers - The practical implementations of One Time Pads/9. Authentication problem in Stream Ciphers.html 169 Bytes
6. Block Ciphers - DES/5. A simple DES example.html 169 Bytes
6. Block Ciphers - DES/7. Modifying the cipher text of block ciphers.html 169 Bytes
6. Block Ciphers - DES/9. A simple attack on a weakened Double-DES implementation.html 169 Bytes
7. Key Exchange/10. Generate a prime.html 169 Bytes
7. Key Exchange/12. Get a generator.html 169 Bytes
7. Key Exchange/14. Full implementation of Diffie-Hellman.html 169 Bytes