Cryptographic attacks | Side-channel attacks

Acoustic cryptanalysis

Acoustic cryptanalysis is a type of side channel attack that exploits sounds emitted by computers or other devices. Most of the modern acoustic cryptanalysis focuses on the sounds produced by computer keyboards and internal computer components, but historically it has also been applied to impact printers, and electromechanical deciphering machines. (Wikipedia).

Video thumbnail

Cryptography (part 1 of 3)

An informal introduction to cryptography. Part of a larger series teaching programming at http://codeschool.org

From playlist Cryptography

Video thumbnail

Intro to Cryptography

This video gives a general introduction to cryptography WITHOUT actually doing any math. Terms covered include cryptology vs cryptography vs cryptanalysis, symmetric vs public key systems, and "coding theory." NOTE: Yes, I said and wrote "cryptOanalysis" when it's actually "cryptanalysis

From playlist Cryptography and Coding Theory

Video thumbnail

Cryptanalysis of Classical Ciphers

Cryptography and Network Security by Prof. D. Mukhopadhyay, Department of Computer Science and Engineering, IIT Kharagpur. For more details on NPTEL visit http://nptel.iitm.ac.in

From playlist Computer - Cryptography and Network Security

Video thumbnail

Steganography Tutorial - Hide Messages In Images

Steganography is the hiding of a secret message within an ordinary message and the extraction of it at its destination. Steganography takes cryptography a step further by hiding an encrypted message so that no one suspects it exists. Ideally, anyone scanning your data will fail to know it

From playlist Ethical Hacking & Penetration Testing - Complete Course

Video thumbnail

Introduction - Applied Cryptography

This video is part of an online course, Applied Cryptography. Check out the course here: https://www.udacity.com/course/cs387.

From playlist Applied Cryptography

Video thumbnail

Do Not Implement Your Own Crypto Solution - Applied Cryptography

This video is part of an online course, Applied Cryptography. Check out the course here: https://www.udacity.com/course/cs387.

From playlist Applied Cryptography

Video thumbnail

Cryptanalysis of Vigenere cipher: not just how, but why it works

The Vigenere cipher, dating from the 1500's, was still used during the US civil war. We introduce the cipher and explain a standard method of cryptanalysis based on frequency analysis and the geometry of vectors. We focus on visual intuition to explain why it works. The only background

From playlist Classical Cryptography

Video thumbnail

Differential Cryptanalysis

Cryptography and Network Security by Prof. D. Mukhopadhyay, Department of Computer Science and Engineering, IIT Kharagpur. For more details on NPTEL visit http://nptel.iitm.ac.in

From playlist Computer - Cryptography and Network Security

Video thumbnail

Linear Cryptanalysis

Cryptography and Network Security by Prof. D. Mukhopadhyay, Department of Computer Science and Engineering, IIT Kharagpur. For more details on NPTEL visit http://nptel.iitm.ac.in

From playlist Computer - Cryptography and Network Security

Video thumbnail

Types of Cryptography Algorithms | Cryptography in Network Security | Edureka | Cybersecurity Live-2

šŸ”„Edureka Cybersecurity Online Training: https://www.edureka.co/cybersecurity-certification-training This Edureka video on Cryptography Algorithms Explained talks about the various algorithms used for cryptography and how they help in making our data secure. Cybersecurity Training Playlist

From playlist Edureka Live Classes 2020

Video thumbnail

Colossus - Applied Cryptography

This video is part of an online course, Applied Cryptography. Check out the course here: https://www.udacity.com/course/cs387.

From playlist Applied Cryptography

Video thumbnail

Bitcoin Q&A: Migrating to Post-Quantum Cryptography

Keywords/phrases: Quantum cryptography, quantum cryptoanalysis, quantum computing. Bitcoin uses SHA-256. In cryptography there is a 20-30 year lifecycle for an algorithm before it gets exceeded by new technologies and developments in mathematics. Both the signing and hashing algorithms can

From playlist English Subtitles - aantonop Videos with subtitles in English

Video thumbnail

Bitcoin Q&A: Key Management and Inheritance Planning

How does the average person solve the "$5 wrench problem" / prevent rubber-hose cryptanalysis? What is the easiest way to do a multi-signature or multi-factor set-up? Could timelocks and smart contract solutions be used for inheritance issues? The technology and educational resources aroun

From playlist English Subtitles - aantonop Videos with subtitles in English

Video thumbnail

Block Ciphers and Data Encryption Standard (DES): Part 2

Fundamental concepts of Block Cipher Design Principles are discussed. Differential cryptanalysis and linear cryptanalysis are explained.

From playlist Network Security

Video thumbnail

Block Ciphers and Data Encryption Standard (DES) - Part 1

Fundamental concepts of Block Cipher Design Principles are discussed. DES is presented. Differential and linear cryptanalysis are explained . Block Cipher Principles Data Encryption Standard (DES) Differential and Linear Cryptanalysis Block Cipher Design Principles

From playlist Network Security

Video thumbnail

Few other Cryptanalytic Techniques

Cryptography and Network Security by Prof. D. Mukhopadhyay, Department of Computer Science and Engineering, IIT Kharagpur. For more details on NPTEL visit http://nptel.iitm.ac.in

From playlist Computer - Cryptography and Network Security

Video thumbnail

27c3: News Key Recovery Attacks on RC4/WEP (en)

Speaker: Martin Vuagnoux In this paper, we present several weaknesses in the stream cipher RC4. First, we present a technique to automatically reveal linear correlations in the PRGA of RC4. With this method, 48 new exploitable correlations have been discovered. Then we bind these new b

From playlist 27C3: We come in peace

Related pages

White noise | Timing attack | Passphrase | Fast Fourier transform | Artificial neural network