Intro To Cyber: 2-2

preview_player
Показать описание
Cryptography. Shannon and Symmetric Key Cryptography

Table of Contents:

00:06 - A unit about cats cybersecurity
01:58 - Computers and Ciphers
04:24 - Computers and Ciphers
04:53 - Why we use XOR
06:02 - Why we use XOR
07:25 - Cryptography Today
08:45 - Symmetric Key Cryptography
10:59 - DES
14:53 - ECB Mode
15:20 - CBC Mode
16:04 - CFB Mode
16:25 - OFB Mode
16:34 - CTR Mode
16:58 - Pros and Cons of Modes
17:47 - Pros and Cons of Modes
18:26 - DES is broken
20:34 - 3DES and AES
Рекомендации по теме