Completed
Why would we decrypt malicious cyberattacks
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Cryptology - It's a Scalpel, Not a Hammer
Automatically move to the next video in the Classroom when playback concludes
- 1 Introduction
- 2 Software bugs vs security vulnerabilities
- 3 Brief history
- 4 Classic ciphers
- 5 Prometheus tables
- 6 How it works
- 7 Triangle of Security
- 8 The four main adversarial capabilities
- 9 Why would we decrypt malicious cyberattacks
- 10 The system must not require secrecy
- 11 Long BS passage
- 12 Pepe
- 13 The Problem
- 14 Randomness
- 15 CBC Mode
- 16 Penguin
- 17 Oracle
- 18 Padding Oracle
- 19 Integrity
- 20 Fencegate
- 21 Authentic Encryption
- 22 Prime Numbers
- 23 Trust
- 24 Key Exchange
- 25 Untrusting
- 26 Public Key Cryptography
- 27 Passwords
- 28 Salt
- 29 Elliptical Curve