Basics of Cryptology – Part 22 (Cryptography – Kerckhoffs' Principle & Modern Cryptographic Goals)
#cryptology, #cryptography, #cryptanalysis, #lecture, #course, #tutorial
In this video, we discuss briefly Kerckhoffs' Principle, which is one of six principles postulated by Auguste Kerckhoffs in 1883 and which is still valid and important for modern cryptography.
After that, we introduce the four main goals of modern cryptographc: confidentiality, (data) integrity, authenticity, and non-repudiation. After that, we will see how we can achieve these goals and demonstrate that using CrypTool 2.
If you are interested in learning the fundaments of cryptology, let me invite you to have a look at our video series about the basics of cryptology, also for beginners: https://youtu.be/jbumW7Ym03o
You can download the latest version of CrypTool 2 from here: https://www.cryptool.org/en/ct2/downloads
Видео Basics of Cryptology – Part 22 (Cryptography – Kerckhoffs' Principle & Modern Cryptographic Goals) канала Cryptography for Everybody
In this video, we discuss briefly Kerckhoffs' Principle, which is one of six principles postulated by Auguste Kerckhoffs in 1883 and which is still valid and important for modern cryptography.
After that, we introduce the four main goals of modern cryptographc: confidentiality, (data) integrity, authenticity, and non-repudiation. After that, we will see how we can achieve these goals and demonstrate that using CrypTool 2.
If you are interested in learning the fundaments of cryptology, let me invite you to have a look at our video series about the basics of cryptology, also for beginners: https://youtu.be/jbumW7Ym03o
You can download the latest version of CrypTool 2 from here: https://www.cryptool.org/en/ct2/downloads
Видео Basics of Cryptology – Part 22 (Cryptography – Kerckhoffs' Principle & Modern Cryptographic Goals) канала Cryptography for Everybody
Показать
Комментарии отсутствуют
Информация о видео
7 сентября 2021 г. 19:29:26
00:23:33
Другие видео канала
Zodiac Killer Ciphers – Let's have a Look at Unicity Distances With Excel10 - Automatic Translation of CrypTool 2 To a New LanguageMy Cryptologic Highlights of 2020Crypto Challenge Contest – Video 1Enigma Machine – Part 1 of 2 – How does it work?Basics of Cryptology – Part 20 (Cryptanalysis – Cost & Fitness Functions - Language Models)Digital File Signatures – How Do They Protect Your Computer?Let's Decipher a Letter of the Silent Film Star Mary Miles Minter That Lead to a ScandalBasics of Cryptology – Part 9 (Modern Cryptography – Block Ciphers – Feistel Ciphers & SDES)The Straddling Checkerboard Cipher ExplainedLet's Decipher Two Encrypted English Postcards – Secret Messages From the Past RevealedBasics of Cryptology – Part 23 (Cryptography – Modern Hybrid Encryption)Break an Encrypted Letter of a Child KillerBasics of Cryptology – Part 17 (Cryptography/Cryptanalysis – Keyspace and Keyspace Size)An Encrypted Description of a Secret Magic Machine in an 18th Century Alchemy BookBasics of Cryptology – Part 14 (Modern Cryptography – Passwords)The Trithemius Cipher and the Tabula Recta – Let's Create and Break ThemA Musical Cipher Challenge – End of 2021 – Win a Crypto BookThe Mexican Army Cipher Disk Explained and BrokenThe Stream Cipher Trivium Explained