filmov
tv
Introduction to Cryptography part3 - Cryptographic Modes of Operation

Показать описание
This is the third of my videos on an introduction to cryptography. I’ve already covered some of the basic theory theory of cryptography, including an explanation of symmetric vs asymmetric encryption. In this video I am going to look a bit deeper into different modes of operation, in effect different ways that the encryption performed.
This covers
Electronic Code Book Mode (ECB)
Cipher Block Chaining Mode (CBC)
Cipher Feedback Mode (CFB)
Output Feedback Mode (OFB)
Counter Mode (CTR)
Galois / Counter Mode (GCM)
Counter with Cipher Block Chaining Message Authentication Code Mode
explaining how these are used with relevant encryption and decryption algorithms, looking at block and streaming based ciphers.
Part 1 about Cryptography, history and importance:
Part 2 about symmetric and asymmetric key algorithms and digital signatures
The video includes the importance of cryptography in the CIA security triad.
Cryptography in various states at rest, in use, in transit.
For more details see:
Chapters:
00:00 Cryptographic modes of operation
00:43 List of common encryption modes of operation
01:06 Electronic Code Book Mode (ECB)
02:12 Cipher Block Chaining Mode (CBC)
03:17 Cipher Feedback Mode (CFB)
04:34 Output Feedback Mode (OFB)
05:16 Counter Mode (CTR)
06:20 Galois / Counter Mode (GCM)
07:13 Counter with Cipher Block Chaining Message Authentication Code Mode
07:44 Summary
This covers
Electronic Code Book Mode (ECB)
Cipher Block Chaining Mode (CBC)
Cipher Feedback Mode (CFB)
Output Feedback Mode (OFB)
Counter Mode (CTR)
Galois / Counter Mode (GCM)
Counter with Cipher Block Chaining Message Authentication Code Mode
explaining how these are used with relevant encryption and decryption algorithms, looking at block and streaming based ciphers.
Part 1 about Cryptography, history and importance:
Part 2 about symmetric and asymmetric key algorithms and digital signatures
The video includes the importance of cryptography in the CIA security triad.
Cryptography in various states at rest, in use, in transit.
For more details see:
Chapters:
00:00 Cryptographic modes of operation
00:43 List of common encryption modes of operation
01:06 Electronic Code Book Mode (ECB)
02:12 Cipher Block Chaining Mode (CBC)
03:17 Cipher Feedback Mode (CFB)
04:34 Output Feedback Mode (OFB)
05:16 Counter Mode (CTR)
06:20 Galois / Counter Mode (GCM)
07:13 Counter with Cipher Block Chaining Message Authentication Code Mode
07:44 Summary
Комментарии