AES GCM (Advanced Encryption Standard in Galois Counter Mode) - Computerphile

preview_player
Показать описание
Your browser is using this system right now! (at time of typing!) - Dr Mike Pound explains this ubiquitous system!

This video was filmed and edited by Sean Riley.

Рекомендации по теме
Комментарии
Автор

Prof. Pound teaches in such an elegant manner, as easy as possible for such a difficult subject, with nothing but paper and pens... Please, guys, give him a wide whiteboard!

DarkLink
Автор

A 18 minute crypto video with Dr Pound! Feels like christmas 😁

_PsychoFish_
Автор

Can you please do a video on the xz backdoor vulnerability that was recently discovered?

paradox
Автор

It's like you just have an empty office where you keep these guys on tap for us 😂

liquidmobius
Автор

Something to note: In a Galois field, multiplication is the polynomial operation described, and addition/subtraction is XOR!
This is what motivates using + and x (XOR distributes over Galois multiplication)

Skybrg
Автор

I can't wait for his take on the xz exploit. So intricate

Ny_babs
Автор

I come across GCM all the time when setting up IPsec VPN tunnels, now it makes sense why you don’t have a separate hashing algorithm!!

TomWhi
Автор

17:22 "but you've got to consider you don't want to truncate it too much because if you only took the first bit of a tag then you've got a 50/50 chance"

The thing about Mike Poind is that he cracks jokes in the serious flow of the conversation.

muhammadsiddiqui
Автор

We never got to the modes like GCM in my crypto class when i took it a few years ago. So I'm happy to actually learn it now lmao

GreenPhoton
Автор

Never would have clicked on this but I'm studying for my CompTIA security+ exam and this was genuinely so helpful and well explained haha, thank you!

Smoth
Автор

I watched many videos from Dr. Pound while doing the Cryptography class at the State University of Campinas. I wish this video was released sooner, it would be easier to study for the exams 😂

paulopacitti
Автор

Hey yoo, such a coincidence, I was researching about the AES for my Go app just the other day. This is very helpful, thank <3

Strawberry_Htet
Автор

Can we set a gofundme page for dr Pound, he is in need of more paper for sure. Btw always love Dr. Pounds mini lectures, keep going strong 💪

cedric-johnson
Автор

Few deserve the title of Doctor, as evidently as Mr Pound does

phpn
Автор

this was very informative and interesting and made me miss my uni days

draugno
Автор

Just a request, could Dr. Pound cover the latest XZ schemes. It would be awesome! Great video btw

velho
Автор

Can you do video on chacha20-poly1305? I've heard it's faster than aes without hardware acceleration?

t.g.
Автор

Seeing how many cycles are basically "wasted" due to our need to protect ourselves from bad actors is kinda crazy. I guess it's not that different from military investments, high fences or whatever, but because it is performed for every single message as opposed to an investment early on that pays off, it feels like having to carry a gun and put on armor plates to go check the mail.

pauloavelar
Автор

POWND, Da POUND Dawg! It's the POUND Town

klyanadkmorr
Автор

Why is a simple HMAC not sufficient to check that the decrypted plaintext wasn't tampered with?

keyurjoshi