Главная
Study mode:
on
1
Introduction
2
symmetric keys
3
module overview
4
challenge
5
lab
6
Roadmap
7
Physical Certificates
8
Example
9
Parallel Computing
10
Competition
11
Geforce cards
12
Bitcoin mining
13
Types of symmetric keys
14
Stream ciphers
15
WiFi
16
Padding
17
Methods
18
Ltronic
19
CBC
20
ES
Description:
Explore symmetric key cryptography concepts in this comprehensive lecture covering key entropy, generators, encryption methods (AES, Twofish, 3DES, RC4, ChaCha20), stream and block encryption, modes (ECB/CBC/OFB), and salting/IV. Delve into physical certificates, parallel computing, Bitcoin mining, and WiFi security. Access additional resources and hands-on materials through the provided GitHub repository to enhance your understanding of e-security fundamentals.

E-Security Week 2 - Symmetric Key

Bill Buchanan OBE
Add to list