Главная
Study mode:
on
1
Intro
2
Who am I
3
Who deals with crypto
4
Symmetric cryptography
5
Strong cryptography
6
Symmetrical cryptography
7
transposition ciphers
8
sort
9
stream ciphers
10
initialization vectors
11
block ciphers
12
ECB vs CBC
13
Huxleys Penguin
14
symmetric crypto
15
asymmetric crypto
16
browser dues
17
asymmetric hashes
18
password hashing
19
password storage
20
Pseudorandom number generators
21
How do they fail
22
Backdoor
23
Why you should care
Description:
Dive into the world of cryptography with this comprehensive 58-minute conference talk from Bloomcon 2017. Explore the fundamentals of symmetric and asymmetric cryptography, covering topics such as transposition ciphers, stream ciphers, initialization vectors, and block ciphers. Learn about the differences between ECB and CBC modes, and understand the importance of strong cryptography. Discover the intricacies of asymmetric hashes, password hashing, and storage techniques. Examine pseudorandom number generators and their potential vulnerabilities. Gain insights into the significance of cryptography in everyday digital security and understand why it should matter to you.

Cryptography 0 to 128 in 50 Minutes

Add to list
0:00 / 0:00