Introduction to Cryptography part3 - Cryptographic Modes of Operation

preview_player
Показать описание
This is the third of my videos on an introduction to cryptography. I’ve already covered some of the basic theory theory of cryptography, including an explanation of symmetric vs asymmetric encryption. In this video I am going to look a bit deeper into different modes of operation, in effect different ways that the encryption performed.

This covers
Electronic Code Book Mode (ECB)
Cipher Block Chaining Mode (CBC)
Cipher Feedback Mode (CFB)
Output Feedback Mode (OFB)
Counter Mode (CTR)
Galois / Counter Mode (GCM)
Counter with Cipher Block Chaining Message Authentication Code Mode

explaining how these are used with relevant encryption and decryption algorithms, looking at block and streaming based ciphers.

Part 1 about Cryptography, history and importance:

Part 2 about symmetric and asymmetric key algorithms and digital signatures

The video includes the importance of cryptography in the CIA security triad.
Cryptography in various states at rest, in use, in transit.

For more details see:

Chapters:
00:00 Cryptographic modes of operation
00:43 List of common encryption modes of operation
01:06 Electronic Code Book Mode (ECB)
02:12 Cipher Block Chaining Mode (CBC)
03:17 Cipher Feedback Mode (CFB)
04:34 Output Feedback Mode (OFB)
05:16 Counter Mode (CTR)
06:20 Galois / Counter Mode (GCM)
07:13 Counter with Cipher Block Chaining Message Authentication Code Mode
07:44 Summary
Рекомендации по теме
Комментарии
Автор

You haven't uploaded anything from the last 2 months. Waiting for you brother 😉😉

TahaHassan-csos