Этот материал находится в платной подписке. Оформи премиум подписку и смотри или слушай Cryptography and Hashing Fundamentals in Python and Java, а также все другие курсы, прямо сейчас!
Премиум
  • Урок 1. 00:02:43
    Introduction
  • Урок 2. 00:04:47
    What is cryptography?
  • Урок 3. 00:02:44
    Symmetric encryption
  • Урок 4. 00:03:17
    Asymmetric encryption
  • Урок 5. 00:03:34
    What is Caesar cipher?
  • Урок 6. 00:05:06
    Caesar cipher - encryption and decryption
  • Урок 7. 00:07:23
    Caesar cipher example
  • Урок 8. 00:06:04
    Caesar cipher implementation I
  • Урок 9. 00:03:22
    Caesar cipher implementation II
  • Урок 10. 00:04:14
    Caesar cipher implementation III
  • Урок 11. 00:06:23
    Caesar cipher implementation I
  • Урок 12. 00:03:29
    Caesar cipher implementation II
  • Урок 13. 00:03:25
    Caesar cipher implementation III
  • Урок 14. 00:02:37
    Cracking Caesar cipher with brute-force attack
  • Урок 15. 00:05:24
    Cracking Caesar-cipher with brute-force implementation (Python)
  • Урок 16. 00:06:45
    Cracking Caesar-cipher with brute-force implementation (Java)
  • Урок 17. 00:04:21
    What is frequency analysis?
  • Урок 18. 00:08:11
    Frequency analysis implementation (Python)
  • Урок 19. 00:08:17
    Frequency analysis implementation (Java)
  • Урок 20. 00:09:48
    Cracking Caesar-cipher with frequency analysis (Python)
  • Урок 21. 00:09:26
    Cracking Caesar-cipher with frequency analysis (Java)
  • Урок 22. 00:04:39
    Detecting english language introduction
  • Урок 23. 00:08:10
    Detecting english language implementation I (Python)
  • Урок 24. 00:04:31
    Detecting english language implementation II (Python)
  • Урок 25. 00:03:55
    Detecting english language implementation III (Python)
  • Урок 26. 00:06:07
    Detecting english language implementation I (Java)
  • Урок 27. 00:06:45
    Detecting english language implementation II (Java)
  • Урок 28. 00:01:49
    Detecting english language implementation III (Java)
  • Урок 29. 00:03:03
    Language detection with machine learning
  • Урок 30. 00:04:50
    What is the Vigenere cipher?
  • Урок 31. 00:02:46
    Vigenere cipher encryption and decryption
  • Урок 32. 00:05:28
    Vigenere cipher example
  • Урок 33. 00:04:55
    Vigenere cipher implementation I
  • Урок 34. 00:07:05
    Vigenere cipher implementation II
  • Урок 35. 00:05:12
    Vigenere cipher implementation I
  • Урок 36. 00:05:19
    Vigenere cipher implementation II
  • Урок 37. 00:03:05
    Kasiski-algorithm introduction I
  • Урок 38. 00:06:51
    Kasiski-algorithm introduction II
  • Урок 39. 00:08:32
    Kasiski-algorithm introduction III
  • Урок 40. 00:03:24
    Kasiski-algorithm introduction IV
  • Урок 41. 00:06:09
    What is a One Time Pad (OTP)?
  • Урок 42. 00:10:23
    One time pad and the XOR logical operator
  • Урок 43. 00:03:37
    One time pad example
  • Урок 44. 00:13:17
    Random and pseudo-random numbers
  • Урок 45. 00:04:18
    One time pad implementation I
  • Урок 46. 00:05:23
    One time pad implementation II
  • Урок 47. 00:03:02
    One time pad implementation III
  • Урок 48. 00:04:20
    One time pad implementation I
  • Урок 49. 00:05:02
    One time pad implementation II
  • Урок 50. 00:03:23
    One time pad implementation III
  • Урок 51. 00:08:17
    Cracking one time pad - Shannon's secrecy
  • Урок 52. 00:07:36
    What is the Data Encryption Standard (DES)?
  • Урок 53. 00:04:51
    DES cryptosystem theory II
  • Урок 54. 00:07:06
    DES cryptosystem theory III
  • Урок 55. 00:08:13
    DES cryptosystem theory IV
  • Урок 56. 00:08:01
    DES cryptosystem theory V
  • Урок 57. 00:01:37
    DES cryptosystem theory VI
  • Урок 58. 00:06:03
    DES cryptosystem implementation I
  • Урок 59. 00:04:17
    DES cryptosystem implementation II
  • Урок 60. 00:03:16
    DES cryptosystem implementation III
  • Урок 61. 00:03:12
    DES cryptosystem implementation IV
  • Урок 62. 00:04:31
    DES cryptosystem implementation I
  • Урок 63. 00:10:14
    DES cryptosystem implementation II
  • Урок 64. 00:04:15
    DES cryptosystem implementation III
  • Урок 65. 00:01:56
    DES cryptosystem implementation IV
  • Урок 66. 00:04:03
    Brute-force DES cracking
  • Урок 67. 00:07:17
    Linear cryptoanalysis
  • Урок 68. 00:03:16
    Differential cryptoanalysis
  • Урок 69. 00:03:46
    AES cryptosystem theory I
  • Урок 70. 00:05:25
    AES cryptosystem theory II
  • Урок 71. 00:06:14
    AES cryptosystem theory III
  • Урок 72. 00:08:29
    AES cryptosystem theory IV
  • Урок 73. 00:06:47
    AES cryptosystem theory V
  • Урок 74. 00:03:43
    AES cryptosystem implementation I
  • Урок 75. 00:06:51
    AES cryptosystem implementation II
  • Урок 76. 00:07:02
    AES cryptosystem implementation III
  • Урок 77. 00:01:56
    AES cryptosystem implementation IV
  • Урок 78. 00:04:38
    AES cryptosystem implementation I
  • Урок 79. 00:04:38
    AES cryptosystem implementation II
  • Урок 80. 00:05:28
    Shannon's confusion and diffusion
  • Урок 81. 00:03:19
    Problems with private key cryptosystems
  • Урок 82. 00:03:13
    Asymmetric cryptosystems basics
  • Урок 83. 00:02:22
    Random numbers and prime numbers
  • Урок 84. 00:04:09
    Modular arithmetic fundamentals
  • Урок 85. 00:09:30
    Finding primes - naive approach (Python)
  • Урок 86. 00:07:15
    Finding primes - naive approach (Java)
  • Урок 87. 00:09:52
    Finding primes - advanced algorithms (Python)
  • Урок 88. 00:10:54
    Finding primes - advanced algorithms (Java)
  • Урок 89. 00:03:02
    Integer factorization problem
  • Урок 90. 00:06:00
    Integer factorization implementation (Python)
  • Урок 91. 00:05:11
    Integer factorization implementation (Java)
  • Урок 92. 00:02:37
    Discrete logarithm problem
  • Урок 93. 00:05:13
    Discrete logarithm implementation (Python)
  • Урок 94. 00:06:50
    Discrete logarithm implementation (Java)
  • Урок 95. 00:04:51
    Why to use prime numbers at all?
  • Урок 96. 00:04:09
    Diffie-Hellman key exchange basics
  • Урок 97. 00:05:10
    Diffie-Hellman key exchange - the algorithm
  • Урок 98. 00:03:43
    Diffie-Hellman key exchange - example
  • Урок 99. 00:06:13
    Why to use primes and primitive roots?
  • Урок 100. 00:05:10
    Diffie-Hellman key exchange algorithm implementation
  • Урок 101. 00:08:36
    Diffie-Hellman key exchange algorithm implementation 2
  • Урок 102. 00:04:13
    Cracking Diffie-Hellman cryptosystem
  • Урок 103. 00:07:14
    Man in the middle attack
  • Урок 104. 00:05:46
    RSA cryptosystem basics
  • Урок 105. 00:05:53
    RSA cryptosystem - the algorithm
  • Урок 106. 00:05:11
    RSA cryptosystem - example
  • Урок 107. 00:06:09
    Euclidean algorithm (GCD) introduction
  • Урок 108. 00:03:46
    Euclidean algorithm (GCD) implementation (Python)
  • Урок 109. 00:04:35
    Euclidean algorithm (GCD) implementation (Java)
  • Урок 110. 00:04:27
    Modular inverse introduction
  • Урок 111. 00:04:35
    Modular inverse implementation (Python)
  • Урок 112. 00:04:19
    Modular inverse implementation (Java)
  • Урок 113. 00:08:43
    Extended Euclidean algorithm introduction
  • Урок 114. 00:11:56
    Extended Euclidean algorithm implementation (Python)
  • Урок 115. 00:07:46
    Extended Euclidean algorithm stack memory visualization
  • Урок 116. 00:05:42
    RSA cryptosystem implementation I
  • Урок 117. 00:07:15
    RSA cryptosystem implementation II
  • Урок 118. 00:05:23
    RSA cryptosystem implementation III
  • Урок 119. 00:03:20
    RSA cryptosystem implementation IV
  • Урок 120. 00:02:46
    RSA cryptosystem implementation I
  • Урок 121. 00:03:55
    RSA cryptosystem implementation II
  • Урок 122. 00:07:00
    RSA cryptosystem implementation III
  • Урок 123. 00:03:10
    RSA cryptosystem implementation IV
  • Урок 124. 00:04:10
    The problem of factorization
  • Урок 125. 00:02:50
    Why do we need elliptic curve cryptography?
  • Урок 126. 00:04:20
    What are elliptic curves?
  • Урок 127. 00:14:03
    Point addition and point doubling
  • Урок 128. 00:04:31
    Double and add algorithm
  • Урок 129. 00:03:35
    Elliptic curve discrete logarithm problem
  • Урок 130. 00:05:49
    Elliptic curve based Diffie-Hellman key exchange algorithm
  • Урок 131. 00:10:45
    Digital signatures with elliptic curves
  • Урок 132. 00:03:13
    RSA and elliptic curve cryptography
  • Урок 133. 00:08:27
    Elliptic curve cryptography (ECC) implementation I
  • Урок 134. 00:05:52
    Elliptic curve cryptography (ECC) implementation II
  • Урок 135. 00:04:03
    Elliptic curve cryptography (ECC) implementation III
  • Урок 136. 00:08:13
    Elliptic curve cryptography (ECC) implementation I
  • Урок 137. 00:04:47
    Elliptic curve cryptography (ECC) implementation II
  • Урок 138. 00:04:31
    Elliptic curve cryptography (ECC) implementation III
  • Урок 139. 00:05:01
    Cracking the elliptic curve cryptosystem
  • Урок 140. 00:04:49
    What is hashing in cryptography?
  • Урок 141. 00:05:09
    Properties of hashing
  • Урок 142. 00:10:57
    The birthday paradox
  • Урок 143. 00:04:09
    MD5 hashing algorithm implementation
  • Урок 144. 00:04:02
    SHA256 hashing algorithm implementation
  • Урок 145. 00:02:50
    SHA512 hashing algorithm implementation
  • Урок 146. 00:07:11
    MD5 hashing algorithm implementation
  • Урок 147. 00:04:45
    SHA256 hashing algorithm implementation
  • Урок 148. 00:06:01
    Applications of cryptographic hashes
  • Урок 149. 00:05:37
    Bitcoin and Ethereum
  • Урок 150. 00:08:54
    HTTP, HTTPS and TLS
  • Урок 151. 00:07:53
    WEP and WPA