-
Урок 1.
00:02:43
Introduction
-
Урок 2.
00:04:47
What is cryptography?
-
Урок 3.
00:02:44
Symmetric encryption
-
Урок 4.
00:03:17
Asymmetric encryption
-
Урок 5.
00:03:34
What is Caesar cipher?
-
Урок 6.
00:05:06
Caesar cipher - encryption and decryption
-
Урок 7.
00:07:23
Caesar cipher example
-
Урок 8.
00:06:04
Caesar cipher implementation I
-
Урок 9.
00:03:22
Caesar cipher implementation II
-
Урок 10.
00:04:14
Caesar cipher implementation III
-
Урок 11.
00:06:23
Caesar cipher implementation I
-
Урок 12.
00:03:29
Caesar cipher implementation II
-
Урок 13.
00:03:25
Caesar cipher implementation III
-
Урок 14.
00:02:37
Cracking Caesar cipher with brute-force attack
-
Урок 15.
00:05:24
Cracking Caesar-cipher with brute-force implementation (Python)
-
Урок 16.
00:06:45
Cracking Caesar-cipher with brute-force implementation (Java)
-
Урок 17.
00:04:21
What is frequency analysis?
-
Урок 18.
00:08:11
Frequency analysis implementation (Python)
-
Урок 19.
00:08:17
Frequency analysis implementation (Java)
-
Урок 20.
00:09:48
Cracking Caesar-cipher with frequency analysis (Python)
-
Урок 21.
00:09:26
Cracking Caesar-cipher with frequency analysis (Java)
-
Урок 22.
00:04:39
Detecting english language introduction
-
Урок 23.
00:08:10
Detecting english language implementation I (Python)
-
Урок 24.
00:04:31
Detecting english language implementation II (Python)
-
Урок 25.
00:03:55
Detecting english language implementation III (Python)
-
Урок 26.
00:06:07
Detecting english language implementation I (Java)
-
Урок 27.
00:06:45
Detecting english language implementation II (Java)
-
Урок 28.
00:01:49
Detecting english language implementation III (Java)
-
Урок 29.
00:03:03
Language detection with machine learning
-
Урок 30.
00:04:50
What is the Vigenere cipher?
-
Урок 31.
00:02:46
Vigenere cipher encryption and decryption
-
Урок 32.
00:05:28
Vigenere cipher example
-
Урок 33.
00:04:55
Vigenere cipher implementation I
-
Урок 34.
00:07:05
Vigenere cipher implementation II
-
Урок 35.
00:05:12
Vigenere cipher implementation I
-
Урок 36.
00:05:19
Vigenere cipher implementation II
-
Урок 37.
00:03:05
Kasiski-algorithm introduction I
-
Урок 38.
00:06:51
Kasiski-algorithm introduction II
-
Урок 39.
00:08:32
Kasiski-algorithm introduction III
-
Урок 40.
00:03:24
Kasiski-algorithm introduction IV
-
Урок 41.
00:06:09
What is a One Time Pad (OTP)?
-
Урок 42.
00:10:23
One time pad and the XOR logical operator
-
Урок 43.
00:03:37
One time pad example
-
Урок 44.
00:13:17
Random and pseudo-random numbers
-
Урок 45.
00:04:18
One time pad implementation I
-
Урок 46.
00:05:23
One time pad implementation II
-
Урок 47.
00:03:02
One time pad implementation III
-
Урок 48.
00:04:20
One time pad implementation I
-
Урок 49.
00:05:02
One time pad implementation II
-
Урок 50.
00:03:23
One time pad implementation III
-
Урок 51.
00:08:17
Cracking one time pad - Shannon's secrecy
-
Урок 52.
00:07:36
What is the Data Encryption Standard (DES)?
-
Урок 53.
00:04:51
DES cryptosystem theory II
-
Урок 54.
00:07:06
DES cryptosystem theory III
-
Урок 55.
00:08:13
DES cryptosystem theory IV
-
Урок 56.
00:08:01
DES cryptosystem theory V
-
Урок 57.
00:01:37
DES cryptosystem theory VI
-
Урок 58.
00:06:03
DES cryptosystem implementation I
-
Урок 59.
00:04:17
DES cryptosystem implementation II
-
Урок 60.
00:03:16
DES cryptosystem implementation III
-
Урок 61.
00:03:12
DES cryptosystem implementation IV
-
Урок 62.
00:04:31
DES cryptosystem implementation I
-
Урок 63.
00:10:14
DES cryptosystem implementation II
-
Урок 64.
00:04:15
DES cryptosystem implementation III
-
Урок 65.
00:01:56
DES cryptosystem implementation IV
-
Урок 66.
00:04:03
Brute-force DES cracking
-
Урок 67.
00:07:17
Linear cryptoanalysis
-
Урок 68.
00:03:16
Differential cryptoanalysis
-
Урок 69.
00:03:46
AES cryptosystem theory I
-
Урок 70.
00:05:25
AES cryptosystem theory II
-
Урок 71.
00:06:14
AES cryptosystem theory III
-
Урок 72.
00:08:29
AES cryptosystem theory IV
-
Урок 73.
00:06:47
AES cryptosystem theory V
-
Урок 74.
00:03:43
AES cryptosystem implementation I
-
Урок 75.
00:06:51
AES cryptosystem implementation II
-
Урок 76.
00:07:02
AES cryptosystem implementation III
-
Урок 77.
00:01:56
AES cryptosystem implementation IV
-
Урок 78.
00:04:38
AES cryptosystem implementation I
-
Урок 79.
00:04:38
AES cryptosystem implementation II
-
Урок 80.
00:05:28
Shannon's confusion and diffusion
-
Урок 81.
00:03:19
Problems with private key cryptosystems
-
Урок 82.
00:03:13
Asymmetric cryptosystems basics
-
Урок 83.
00:02:22
Random numbers and prime numbers
-
Урок 84.
00:04:09
Modular arithmetic fundamentals
-
Урок 85.
00:09:30
Finding primes - naive approach (Python)
-
Урок 86.
00:07:15
Finding primes - naive approach (Java)
-
Урок 87.
00:09:52
Finding primes - advanced algorithms (Python)
-
Урок 88.
00:10:54
Finding primes - advanced algorithms (Java)
-
Урок 89.
00:03:02
Integer factorization problem
-
Урок 90.
00:06:00
Integer factorization implementation (Python)
-
Урок 91.
00:05:11
Integer factorization implementation (Java)
-
Урок 92.
00:02:37
Discrete logarithm problem
-
Урок 93.
00:05:13
Discrete logarithm implementation (Python)
-
Урок 94.
00:06:50
Discrete logarithm implementation (Java)
-
Урок 95.
00:04:51
Why to use prime numbers at all?
-
Урок 96.
00:04:09
Diffie-Hellman key exchange basics
-
Урок 97.
00:05:10
Diffie-Hellman key exchange - the algorithm
-
Урок 98.
00:03:43
Diffie-Hellman key exchange - example
-
Урок 99.
00:06:13
Why to use primes and primitive roots?
-
Урок 100.
00:05:10
Diffie-Hellman key exchange algorithm implementation
-
Урок 101.
00:08:36
Diffie-Hellman key exchange algorithm implementation 2
-
Урок 102.
00:04:13
Cracking Diffie-Hellman cryptosystem
-
Урок 103.
00:07:14
Man in the middle attack
-
Урок 104.
00:05:46
RSA cryptosystem basics
-
Урок 105.
00:05:53
RSA cryptosystem - the algorithm
-
Урок 106.
00:05:11
RSA cryptosystem - example
-
Урок 107.
00:06:09
Euclidean algorithm (GCD) introduction
-
Урок 108.
00:03:46
Euclidean algorithm (GCD) implementation (Python)
-
Урок 109.
00:04:35
Euclidean algorithm (GCD) implementation (Java)
-
Урок 110.
00:04:27
Modular inverse introduction
-
Урок 111.
00:04:35
Modular inverse implementation (Python)
-
Урок 112.
00:04:19
Modular inverse implementation (Java)
-
Урок 113.
00:08:43
Extended Euclidean algorithm introduction
-
Урок 114.
00:11:56
Extended Euclidean algorithm implementation (Python)
-
Урок 115.
00:07:46
Extended Euclidean algorithm stack memory visualization
-
Урок 116.
00:05:42
RSA cryptosystem implementation I
-
Урок 117.
00:07:15
RSA cryptosystem implementation II
-
Урок 118.
00:05:23
RSA cryptosystem implementation III
-
Урок 119.
00:03:20
RSA cryptosystem implementation IV
-
Урок 120.
00:02:46
RSA cryptosystem implementation I
-
Урок 121.
00:03:55
RSA cryptosystem implementation II
-
Урок 122.
00:07:00
RSA cryptosystem implementation III
-
Урок 123.
00:03:10
RSA cryptosystem implementation IV
-
Урок 124.
00:04:10
The problem of factorization
-
Урок 125.
00:02:50
Why do we need elliptic curve cryptography?
-
Урок 126.
00:04:20
What are elliptic curves?
-
Урок 127.
00:14:03
Point addition and point doubling
-
Урок 128.
00:04:31
Double and add algorithm
-
Урок 129.
00:03:35
Elliptic curve discrete logarithm problem
-
Урок 130.
00:05:49
Elliptic curve based Diffie-Hellman key exchange algorithm
-
Урок 131.
00:10:45
Digital signatures with elliptic curves
-
Урок 132.
00:03:13
RSA and elliptic curve cryptography
-
Урок 133.
00:08:27
Elliptic curve cryptography (ECC) implementation I
-
Урок 134.
00:05:52
Elliptic curve cryptography (ECC) implementation II
-
Урок 135.
00:04:03
Elliptic curve cryptography (ECC) implementation III
-
Урок 136.
00:08:13
Elliptic curve cryptography (ECC) implementation I
-
Урок 137.
00:04:47
Elliptic curve cryptography (ECC) implementation II
-
Урок 138.
00:04:31
Elliptic curve cryptography (ECC) implementation III
-
Урок 139.
00:05:01
Cracking the elliptic curve cryptosystem
-
Урок 140.
00:04:49
What is hashing in cryptography?
-
Урок 141.
00:05:09
Properties of hashing
-
Урок 142.
00:10:57
The birthday paradox
-
Урок 143.
00:04:09
MD5 hashing algorithm implementation
-
Урок 144.
00:04:02
SHA256 hashing algorithm implementation
-
Урок 145.
00:02:50
SHA512 hashing algorithm implementation
-
Урок 146.
00:07:11
MD5 hashing algorithm implementation
-
Урок 147.
00:04:45
SHA256 hashing algorithm implementation
-
Урок 148.
00:06:01
Applications of cryptographic hashes
-
Урок 149.
00:05:37
Bitcoin and Ethereum
-
Урок 150.
00:08:54
HTTP, HTTPS and TLS
-
Урок 151.
00:07:53
WEP and WPA