Talk at crypto 2011. Authors: Alexander Russell, Hang Dinh, Cristopher Moore. See http://www.iacr.org/cryptodb/data/paper.php?pubkey=23607
Views: 1807
TheIACR
A simple explanation of how prime numbers are used in Public Key Cryptography from ABC1 science program Catalyst
Views: 62609
Simon Pampena
IQC Masters student Stacey Jeffery lectures on the concepts and applications of public key schemes.
Views: 690
Institute for Quantum Computing
Chapter 9: Simple Authentication Protocols
Sections 9.3.2-9.3.3
public key authentication, session key
Class Lecture, 2011
Views: 4007
Mark Stamp
Talk at crypto 2011. Authors: Adam Smith, Sean Hallgren, Fang Song. See http://www.iacr.org/cryptodb/data/paper.php?pubkey=23587
Views: 431
TheIACR
Animation of encryption
For an INDEX to my other YouTube Videos, go to https://simplificationofeverything.blogspot.ch/
Views: 909
Andrew Vecsey
Information Security: Principles and Practice, 2nd edition, by Mark Stamp
Chapter 2: Crypto Basics
Sections 2.3.6-2.3.7
VENONA, codebook cipher, Zimmerman telegram
Class Lecture, 2011
Views: 8034
Mark Stamp
Cris Moore, Professor, Santa Fe Institute
April 13, 2011
Caesar shifted each letter three places in the alphabet. Much of modern computer science was born in the effort to break the Nazi Enigma code, and Cold War spies used code books that fit inside a walnut. Nowadays, the cryptography we depend on every day — for instance, to send our credit card information when we buy something on the Web — relies in turn on the mathematics of prime numbers. But in 1994, Peter Shor discovered that a future quantum computer could crack our cryptosystems by breaking large numbers into their prime factors. Cris will start by describing how these cryptosystems work, and how a quantum computer could break them. (Nothing beyond high-school math, he promises!) He'll end by giving a personal view about whether quantum computers can be built — and what kinds of cryptography could remain secure even if and when they are built.
Views: 5316
Santa Fe Institute
Talk at crypto 2011. Authors: Chris Peikert, Brent Waters, Adam O'Neill. See http://www.iacr.org/cryptodb/data/paper.php?pubkey=23594
Views: 825
TheIACR
See our entire index of CompTIA Security+ videos at http://www.FreeSecurityPlus.com - Our modern privacy requires new methods of encrypting and protecting our data. In this video, you'll learn how the emerging technologies of elliptic curve and quantum cryptography are changing the face of encryption.
Views: 13942
Professor Messer
Gilles Brassard, co-creator of quantum cryptography, discusses whether this new type of encryption will find widespread use "before it's too late." Excerpt from an interview with Brassard at the Institute for Quantum Computing at the University of Waterloo, Canada.
www.iqc.ca
twitter.com/quantumiqc
facebook.com/quantumiqc
Views: 1096
Institute for Quantum Computing
Talk at crypto 2011. Authors: Mihir Bellare, Sriram Keelveedhi. See http://www.iacr.org/cryptodb/data/paper.php?pubkey=23599
Views: 436
TheIACR
See our entire index of CompTIA Security+ videos at http://www.FreeSecurityPlus.com - We often use hardware to handle the resource-heavy encryption process. In this video, you'll learn about trusted platform modules, hardware security modules, USB encryption, and hardware-based hard drive encryption.
Views: 30326
Professor Messer
IQC Maters student Stacey Jeffery lectures on the concepts and applications of classical cryptography.
Views: 7677
Institute for Quantum Computing
IQC Masters student Stacey Jeffery lectures on the concepts and importance of authentication in crypto systems.
Views: 999
Institute for Quantum Computing
Professor Dan Boneh is offering a free, online class on Cryptography starting January 2012.
http://www.crypto-class.org/
Views: 21948
mlClassStaff
IQC masters student Evan Meyer-Scott lectures on the methods of a QKD experiment.
Views: 437
Institute for Quantum Computing
Talk at crypto 2011. Authors: Taizo Shirai, Koichi Sakumoto, Harunaga Hiwatari. See http://www.iacr.org/cryptodb/data/paper.php?pubkey=23604
Views: 566
TheIACR
2 min description of cryptography mindmap video by GG.
Views: 85
Jgilready
See our entire index of CompTIA Security+ videos at http://www.FreeSecurityPlus.com - The generation of digital certificates is a staple of any PKI. In this video, you'll learn how to build a set of public and private keys in GPG.
Views: 10110
Professor Messer
See our entire index of CompTIA Security+ videos at http://www.FreeSecurityPlus.com - Asymmetric encryption technology has redefined our use of encryption with today's technology. In this video, you'll learn how this pair of keys allows use to encrypt, authenticate, manage non-repudiation, and validate our data.
Views: 13831
Professor Messer
See our entire index of CompTIA Security+ videos at http://www.FreeSecurityPlus.com - One of the most popular asymmetric encryption applications of all time is Pretty Good Privacy, and the OpenPGP compliant Gnu Privacy Guard is a commonly used implementation. In this video, you'll learn about both
Views: 19458
Professor Messer
See our entire index of CompTIA Security+ videos at http://www.FreeSecurityPlus.com - We rely on encryption to protect our data across the network. In this video, you'll learn about HTTPS and how we use TLS/SSL to encrypt our network traffic.
Views: 29120
Professor Messer
📖📕 GET THE NEW TINKERNUT BOOK: http://bit.ly/Tinkernutbook 📕📖
This video lays out the steps for creating a very simple encryption and decryption program using free tools. The programming language we will be using is VB Script. See if you can decrypt this text:
wkjlue#vnrro#huxwxi#uxr\
You can find all the code for this program as well as an alternative for Apple computers at the project page:
http://www.tinkernut.com/archives/4193
Views: 100377
Tinkernut
See our entire index of CompTIA Security+ videos at http://www.FreeSecurityPlus.com - The two most common encryption methods are symmetric and asymmetric encryption. In this video, you'll learn the differences and when you might to see these two methods employed to protect your data.
Views: 35283
Professor Messer
See our entire index of CompTIA Security+ videos at http://www.FreeSecurityPlus.com - Cryptographic hashes provide us with features such as authentication, integrity, confidentiality, and non-repudiation. In this video, you'll learn about some of the most popular hashing ciphers.
Views: 20743
Professor Messer
Talk at pkc 2010. Authors: Jean-Charles Faugère, Pierre-Jean Spaenlehauer. See http://www.iacr.org/cryptodb/data/paper.php?pubkey=23421
Views: 310
TheIACR
Advance Cyber Security. Finding the coordinates of P_1+P_2 Point addition. Based on a Cubic curve with one real component
Views: 11655
Israel Reyes
See our entire index of CompTIA Security+ videos at http://www.FreeSecurityPlus.com - Implementing a certificate authority can include both commercial and private certificate authorities. In this video, you'll learn the differences and similarities between a commercial and private CA.
Views: 10095
Professor Messer
Shai Halevi, IBM Research: Fully homomoorphic encryption.
http://www1.biu.ac.il/indexE.php
Views: 3490
barilanuniversity
Tutorial on homomorphic encryption by Shai Halevi, presented at Crypto 2011 in Santa Barbara, CA. Part 1 of 2. Presentation materials available at http://people.csail.mit.edu/shaih/presentations.html
Views: 12511
TheIACR
See our entire index of CompTIA Security+ videos at http://www.FreeSecurityPlus.com - Centralized authentication requires a standard method of providing access from any location and any system. In this video, you'll learn about RADIUS, TACACS, XTACACS, and TACACS+.
Views: 33349
Professor Messer
See our entire index of CompTIA Security+ videos at http://www.FreeSecurityPlus.com - The key recovery is a critical aspect of any PKI. In this video, you'll learn how to create a Key Recovery Agent certificate to use in a Microsoft Active Domain environment.
Views: 8412
Professor Messer
See our entire index of CompTIA Security+ videos at http://www.FreeSecurityPlus.com - The one-time pad is a powerful symmetric encryption mechanism. In this video, you'll learn the history of one-time pads and how you can use a one-time pad to encrypt your secret messages.
Views: 16140
Professor Messer
See our entire index of CompTIA Security+ videos at http://www.FreeSecurityPlus.com - A popular method of protecting data is storing and using it in an encrypted form. In this video, you'll learn about encrypting entire hard drives, databases, individual files, and removable media.
Views: 10454
Professor Messer
Basic Cryptographic Concepts & Encrypting Algorithms - Part 3
1. DIT/09/C1/0002 -- Sharmila P
2. DIT/09/C1/0022 -- C.W. Hemachandra
3. DIT/09/C1/0036 -- A.S.R. Fernando
4. DIT/09/C1/0057 -- L.S.R.A. De Silva
5. DIT/09/C1/0106 -- P.T.C. Peiris
6. DIT/09/C1/0111 -- W.S.V.P.Perera
Programming Language & Design Concepts -- Assignment 2011
Sri Lanka Institute of Information Technology
Views: 150
wsvperera
See our entire index of CompTIA Security+ videos at http://www.FreeSecurityPlus.com - We rely on Certificate Authorities to provide a key component of our Public Key Infrastructures. In this video, you'll learn the role of the CA and policies that build additional trust in your certificates.
Views: 15141
Professor Messer
See our entire index of CompTIA Security+ videos at http://www.FreeSecurityPlus.com - Symmetric encryption is a fundamental method of protecting data. In this video, you'll learn about symmetric ciphers such as RC4, DES, 3DES, AES, Blowfish, and Twofish.
Views: 16555
Professor Messer
See our entire index of CompTIA Security+ videos at http://www.FreeSecurityPlus.com - We are constantly faced with security concerns associated with the massive number of accounts that we have to manage professionally and personally. In this video, you'll learn about managing identities across multiple sites and how you can mitigate the issues that arise from an individual owning so many different accounts.
Views: 10071
Professor Messer
See our entire index of CompTIA Security+ videos at http://www.FreeSecurityPlus.com - Different PKIs are subject to different types of trust models. In this video, you'll learn the many ways to implement trust models in different PKI infrastructures.
Views: 9537
Professor Messer
See our entire index of CompTIA Security+ videos at http://www.FreeSecurityPlus.com - Whole disk encryption takes the idea of data protection to an entirely different level. In this video, you'll learn about whole disk encryption technologies and how they can be used to provide the ultimate level of data protection on your devices.
Views: 10707
Professor Messer
Talk at pkc 2010. Authors: Rosario Gennaro, Jonathan Katz, Hugo Krawczyk, Tal Rabin. See http://www.iacr.org/cryptodb/data/paper.php?pubkey=23403
Views: 231
TheIACR
Another edition of "Lab Matters" with a special guest Uri Rivner, Head of New Technologies, Identity Protection and Verification, RSA Security, where he describes what happened when RSA was hacked with a zero-day vulnerability.
Views: 2882
Securelist
See our entire index of CompTIA Security+ videos at http://www.FreeSecurityPlus.com - The implementation of digital certificates can vary depending on the environment, but the overall process is relatively similar. In this video, you'll see how Microsoft Certificate Services can be used to manage a PKI implementation.
Views: 8579
Professor Messer
See our entire index of CompTIA Security+ videos at http://www.FreeSecurityPlus.com - Authentication factors are many and varied, and the most common authentications usually involve a single factor. In this video, you'll learn about authentication factor types and how single factor provides advantages and disadvantages to the authentication process.
Views: 11658
Professor Messer
Yael Tauman Kalai, Bhavana Kanukurthi, and Amit Sahai
Microsoft Research; Boston University; and University of California (UCLA)
Abstract. A large and growing body of research has sought to secure cryptographic systems against physical attacks. Motivated by a large variety of real-world physical attacks on memory, an important line of work was initiated by Akavia, Goldwasser, and Vaikuntanathan [AGV09] where security is sought under the assumptions that: (1) all memory is leaky, and (2) leakage can be an arbitrarily chosen (efficient) function of the memory.
However, physical attacks on memory are not limited to leakage through side-channels, but can also include active tampering attacks through a variety of physical attacks, including heat and EM radiation. Nevertheless, protection against the analogous model for tampering — where (1) all memory is tamperable, and (2) where the tampering can be an arbitrarily chosen (efficient) function applied to the memory — has remained an elusive target, despite significant effort on tampering-related questions.
In this work, we tackle this question by considering a model where we assume that both of these pairs of statements are true — that all memory is both leaky and (arbitrarily) tamperable. Furthermore, we assume that this leakage and tampering can happen repeatedly and continually (extending the model of [DHLW, BKKV10] in the context of leakage). We construct a signature scheme and an encryption scheme that are provably secure against such attacks, assuming that memory can be updated in a randomized fashion between episodes of tampering and leakage. In both schemes we rely on the linear assumption over bilinear groups.
We also separately consider a model where only continual and repeated tampering (but only bounded leakage) is allowed, and we are able to obtain positive results assuming only that "self-destruct" is possible, without the need for memory updates.
Our results also improve previous results in the continual leakage regime without tampering [DHLW, BKKV10]. Whereas previous schemes secure against continual leakage (of arbitrary bounded functions of the secret key), could tolerate only 1/2-ε leakage-rate between key updates under the linear assumption over bilinear groups, our schemes can tolerate 1-ε leakage-rate between key updates, under the same assumption.
Views: 493
TheIACR