Symmetric Key Cryptography: Cryptographic Techniques

preview_player
Показать описание
This is the fifth in a series about cryptography; an extremely important aspect of computer science and cyber security. It reviews how the XOR logical operation can be used to encrypt at the bit level in symmetric key cryptography, then shows how this can be combined with permutation steps to create an even stronger cipher. It mentions a number of principles used in modern day block ciphers such as DES and AES, including the Feistel cipher, block ciphers, block chaining, the use of multiple sub keys and multiple encryption rounds.
Рекомендации по теме
Комментарии
Автор

Mind_blowing how you were able to explain such concepts so 'effortlessly'!

inarisound
Автор

I have been following your videos for a while. To be honest: you don't have the subscribers you deserve. Thanks man

alainperez
Автор

woooow, ecellent way to explain this topic. Keep it up mate! - Many thanks

kristiannn
Автор

Thanks a lot for this clear explanation! (And also thanks for showing that it's possible to create your own function in Excel, never knew that's possible)

de_pool