Этот материал находится в платной подписке. Оформи премиум подписку и смотри или слушай Cryptography and Hashing Fundamentals in Python and Java, а также все другие курсы, прямо сейчас!
Премиум
  1. Урок 1. 00:02:43
    Introduction
  2. Урок 2. 00:04:47
    What is cryptography?
  3. Урок 3. 00:02:44
    Symmetric encryption
  4. Урок 4. 00:03:17
    Asymmetric encryption
  5. Урок 5. 00:03:34
    What is Caesar cipher?
  6. Урок 6. 00:05:06
    Caesar cipher - encryption and decryption
  7. Урок 7. 00:07:23
    Caesar cipher example
  8. Урок 8. 00:06:04
    Caesar cipher implementation I
  9. Урок 9. 00:03:22
    Caesar cipher implementation II
  10. Урок 10. 00:04:14
    Caesar cipher implementation III
  11. Урок 11. 00:06:23
    Caesar cipher implementation I
  12. Урок 12. 00:03:29
    Caesar cipher implementation II
  13. Урок 13. 00:03:25
    Caesar cipher implementation III
  14. Урок 14. 00:02:37
    Cracking Caesar cipher with brute-force attack
  15. Урок 15. 00:05:24
    Cracking Caesar-cipher with brute-force implementation (Python)
  16. Урок 16. 00:06:45
    Cracking Caesar-cipher with brute-force implementation (Java)
  17. Урок 17. 00:04:21
    What is frequency analysis?
  18. Урок 18. 00:08:11
    Frequency analysis implementation (Python)
  19. Урок 19. 00:08:17
    Frequency analysis implementation (Java)
  20. Урок 20. 00:09:48
    Cracking Caesar-cipher with frequency analysis (Python)
  21. Урок 21. 00:09:26
    Cracking Caesar-cipher with frequency analysis (Java)
  22. Урок 22. 00:04:39
    Detecting english language introduction
  23. Урок 23. 00:08:10
    Detecting english language implementation I (Python)
  24. Урок 24. 00:04:31
    Detecting english language implementation II (Python)
  25. Урок 25. 00:03:55
    Detecting english language implementation III (Python)
  26. Урок 26. 00:06:07
    Detecting english language implementation I (Java)
  27. Урок 27. 00:06:45
    Detecting english language implementation II (Java)
  28. Урок 28. 00:01:49
    Detecting english language implementation III (Java)
  29. Урок 29. 00:03:03
    Language detection with machine learning
  30. Урок 30. 00:04:50
    What is the Vigenere cipher?
  31. Урок 31. 00:02:46
    Vigenere cipher encryption and decryption
  32. Урок 32. 00:05:28
    Vigenere cipher example
  33. Урок 33. 00:04:55
    Vigenere cipher implementation I
  34. Урок 34. 00:07:05
    Vigenere cipher implementation II
  35. Урок 35. 00:05:12
    Vigenere cipher implementation I
  36. Урок 36. 00:05:19
    Vigenere cipher implementation II
  37. Урок 37. 00:03:05
    Kasiski-algorithm introduction I
  38. Урок 38. 00:06:51
    Kasiski-algorithm introduction II
  39. Урок 39. 00:08:32
    Kasiski-algorithm introduction III
  40. Урок 40. 00:03:24
    Kasiski-algorithm introduction IV
  41. Урок 41. 00:06:09
    What is a One Time Pad (OTP)?
  42. Урок 42. 00:10:23
    One time pad and the XOR logical operator
  43. Урок 43. 00:03:37
    One time pad example
  44. Урок 44. 00:13:17
    Random and pseudo-random numbers
  45. Урок 45. 00:04:18
    One time pad implementation I
  46. Урок 46. 00:05:23
    One time pad implementation II
  47. Урок 47. 00:03:02
    One time pad implementation III
  48. Урок 48. 00:04:20
    One time pad implementation I
  49. Урок 49. 00:05:02
    One time pad implementation II
  50. Урок 50. 00:03:23
    One time pad implementation III
  51. Урок 51. 00:08:17
    Cracking one time pad - Shannon's secrecy
  52. Урок 52. 00:07:36
    What is the Data Encryption Standard (DES)?
  53. Урок 53. 00:04:51
    DES cryptosystem theory II
  54. Урок 54. 00:07:06
    DES cryptosystem theory III
  55. Урок 55. 00:08:13
    DES cryptosystem theory IV
  56. Урок 56. 00:08:01
    DES cryptosystem theory V
  57. Урок 57. 00:01:37
    DES cryptosystem theory VI
  58. Урок 58. 00:06:03
    DES cryptosystem implementation I
  59. Урок 59. 00:04:17
    DES cryptosystem implementation II
  60. Урок 60. 00:03:16
    DES cryptosystem implementation III
  61. Урок 61. 00:03:12
    DES cryptosystem implementation IV
  62. Урок 62. 00:04:31
    DES cryptosystem implementation I
  63. Урок 63. 00:10:14
    DES cryptosystem implementation II
  64. Урок 64. 00:04:15
    DES cryptosystem implementation III
  65. Урок 65. 00:01:56
    DES cryptosystem implementation IV
  66. Урок 66. 00:04:03
    Brute-force DES cracking
  67. Урок 67. 00:07:17
    Linear cryptoanalysis
  68. Урок 68. 00:03:16
    Differential cryptoanalysis
  69. Урок 69. 00:03:46
    AES cryptosystem theory I
  70. Урок 70. 00:05:25
    AES cryptosystem theory II
  71. Урок 71. 00:06:14
    AES cryptosystem theory III
  72. Урок 72. 00:08:29
    AES cryptosystem theory IV
  73. Урок 73. 00:06:47
    AES cryptosystem theory V
  74. Урок 74. 00:03:43
    AES cryptosystem implementation I
  75. Урок 75. 00:06:51
    AES cryptosystem implementation II
  76. Урок 76. 00:07:02
    AES cryptosystem implementation III
  77. Урок 77. 00:01:56
    AES cryptosystem implementation IV
  78. Урок 78. 00:04:38
    AES cryptosystem implementation I
  79. Урок 79. 00:04:38
    AES cryptosystem implementation II
  80. Урок 80. 00:05:28
    Shannon's confusion and diffusion
  81. Урок 81. 00:03:19
    Problems with private key cryptosystems
  82. Урок 82. 00:03:13
    Asymmetric cryptosystems basics
  83. Урок 83. 00:02:22
    Random numbers and prime numbers
  84. Урок 84. 00:04:09
    Modular arithmetic fundamentals
  85. Урок 85. 00:09:30
    Finding primes - naive approach (Python)
  86. Урок 86. 00:07:15
    Finding primes - naive approach (Java)
  87. Урок 87. 00:09:52
    Finding primes - advanced algorithms (Python)
  88. Урок 88. 00:10:54
    Finding primes - advanced algorithms (Java)
  89. Урок 89. 00:03:02
    Integer factorization problem
  90. Урок 90. 00:06:00
    Integer factorization implementation (Python)
  91. Урок 91. 00:05:11
    Integer factorization implementation (Java)
  92. Урок 92. 00:02:37
    Discrete logarithm problem
  93. Урок 93. 00:05:13
    Discrete logarithm implementation (Python)
  94. Урок 94. 00:06:50
    Discrete logarithm implementation (Java)
  95. Урок 95. 00:04:51
    Why to use prime numbers at all?
  96. Урок 96. 00:04:09
    Diffie-Hellman key exchange basics
  97. Урок 97. 00:05:10
    Diffie-Hellman key exchange - the algorithm
  98. Урок 98. 00:03:43
    Diffie-Hellman key exchange - example
  99. Урок 99. 00:06:13
    Why to use primes and primitive roots?
  100. Урок 100. 00:05:10
    Diffie-Hellman key exchange algorithm implementation
  101. Урок 101. 00:08:36
    Diffie-Hellman key exchange algorithm implementation 2
  102. Урок 102. 00:04:13
    Cracking Diffie-Hellman cryptosystem
  103. Урок 103. 00:07:14
    Man in the middle attack
  104. Урок 104. 00:05:46
    RSA cryptosystem basics
  105. Урок 105. 00:05:53
    RSA cryptosystem - the algorithm
  106. Урок 106. 00:05:11
    RSA cryptosystem - example
  107. Урок 107. 00:06:09
    Euclidean algorithm (GCD) introduction
  108. Урок 108. 00:03:46
    Euclidean algorithm (GCD) implementation (Python)
  109. Урок 109. 00:04:35
    Euclidean algorithm (GCD) implementation (Java)
  110. Урок 110. 00:04:27
    Modular inverse introduction
  111. Урок 111. 00:04:35
    Modular inverse implementation (Python)
  112. Урок 112. 00:04:19
    Modular inverse implementation (Java)
  113. Урок 113. 00:08:43
    Extended Euclidean algorithm introduction
  114. Урок 114. 00:11:56
    Extended Euclidean algorithm implementation (Python)
  115. Урок 115. 00:07:46
    Extended Euclidean algorithm stack memory visualization
  116. Урок 116. 00:05:42
    RSA cryptosystem implementation I
  117. Урок 117. 00:07:15
    RSA cryptosystem implementation II
  118. Урок 118. 00:05:23
    RSA cryptosystem implementation III
  119. Урок 119. 00:03:20
    RSA cryptosystem implementation IV
  120. Урок 120. 00:02:46
    RSA cryptosystem implementation I
  121. Урок 121. 00:03:55
    RSA cryptosystem implementation II
  122. Урок 122. 00:07:00
    RSA cryptosystem implementation III
  123. Урок 123. 00:03:10
    RSA cryptosystem implementation IV
  124. Урок 124. 00:04:10
    The problem of factorization
  125. Урок 125. 00:02:50
    Why do we need elliptic curve cryptography?
  126. Урок 126. 00:04:20
    What are elliptic curves?
  127. Урок 127. 00:14:03
    Point addition and point doubling
  128. Урок 128. 00:04:31
    Double and add algorithm
  129. Урок 129. 00:03:35
    Elliptic curve discrete logarithm problem
  130. Урок 130. 00:05:49
    Elliptic curve based Diffie-Hellman key exchange algorithm
  131. Урок 131. 00:10:45
    Digital signatures with elliptic curves
  132. Урок 132. 00:03:13
    RSA and elliptic curve cryptography
  133. Урок 133. 00:08:27
    Elliptic curve cryptography (ECC) implementation I
  134. Урок 134. 00:05:52
    Elliptic curve cryptography (ECC) implementation II
  135. Урок 135. 00:04:03
    Elliptic curve cryptography (ECC) implementation III
  136. Урок 136. 00:08:13
    Elliptic curve cryptography (ECC) implementation I
  137. Урок 137. 00:04:47
    Elliptic curve cryptography (ECC) implementation II
  138. Урок 138. 00:04:31
    Elliptic curve cryptography (ECC) implementation III
  139. Урок 139. 00:05:01
    Cracking the elliptic curve cryptosystem
  140. Урок 140. 00:04:49
    What is hashing in cryptography?
  141. Урок 141. 00:05:09
    Properties of hashing
  142. Урок 142. 00:10:57
    The birthday paradox
  143. Урок 143. 00:04:09
    MD5 hashing algorithm implementation
  144. Урок 144. 00:04:02
    SHA256 hashing algorithm implementation
  145. Урок 145. 00:02:50
    SHA512 hashing algorithm implementation
  146. Урок 146. 00:07:11
    MD5 hashing algorithm implementation
  147. Урок 147. 00:04:45
    SHA256 hashing algorithm implementation
  148. Урок 148. 00:06:01
    Applications of cryptographic hashes
  149. Урок 149. 00:05:37
    Bitcoin and Ethereum
  150. Урок 150. 00:08:54
    HTTP, HTTPS and TLS
  151. Урок 151. 00:07:53
    WEP and WPA