Загрузка страницы

My Cryptologic Highlights of 2020

#cryptology, #cryptography, #cryptanalysis

In This video, I present my personal cryptologic highlights of this year 2020:
1) Facts about this YouTube channel
2) CrypTool 2 Highlights 2020
3) Solved Ciphertext Zodiac Z-340 Message
4) My Cryptanalysis Highlight - Letters from Maximilian II
5) My Book Collection Highlight Gaspar Schott’s Schola Steganographica

Also, I give a short idea what we will see next year on this YouTube channel :-)

Here are some links mentioned in the video:
- heise news: https://www.heise.de/security/meldung/Fuer-angehende-Verschluesselungsexperten-E-Learning-Software-CrypTool-2-ist-da-4696193.html
- David Oranchak's Zodiac video: https://www.youtube.com/watch?v=-1oQLPRE21o
- The DECRYPT project: www.de-crypt.org
- Gaspar Schott book on cryptobooks: https://cryptobooks.org/book/541

If you are interested in learning the basics of cryptology, you should also have a look at our video series about basics of cryptology – also for beginners: https://youtu.be/jbumW7Ym03o

You may download the latest version of CrypTool 2 from here: https://www.cryptool.org/en/ct2/downloads

Видео My Cryptologic Highlights of 2020 канала Cryptography for Everybody
Показать
Комментарии отсутствуют
Введите заголовок:

Введите адрес ссылки:

Введите адрес видео с YouTube:

Зарегистрируйтесь или войдите с
Информация о видео
24 декабря 2020 г. 20:58:10
00:13:23
Другие видео канала
Zodiac Killer Ciphers – Let's have a Look at Unicity Distances With ExcelZodiac Killer Ciphers – Let's have a Look at Unicity Distances With Excel04 - Internationalization of the Component (CrypTool 2 Development Series)04 - Internationalization of the Component (CrypTool 2 Development Series)Crypto Challenge Contest – Video 1Crypto Challenge Contest – Video 1Basics of Cryptology – Part 2 (Cryptanalysis – Terminology & Classical Ciphers)Basics of Cryptology – Part 2 (Cryptanalysis – Terminology & Classical Ciphers)Enigma Machine – Part 1 of 2 – How does it work?Enigma Machine – Part 1 of 2 – How does it work?Basics of Cryptology – Part 20 (Cryptanalysis – Cost & Fitness Functions - Language Models)Basics of Cryptology – Part 20 (Cryptanalysis – Cost & Fitness Functions - Language Models)Digital File Signatures – How Do They Protect Your Computer?Digital File Signatures – How Do They Protect Your Computer?Basics of Cryptology – Part 22 (Cryptography – Kerckhoffs' Principle & Modern Cryptographic Goals)Basics of Cryptology – Part 22 (Cryptography – Kerckhoffs' Principle & Modern Cryptographic Goals)Let's Decipher a Letter of the Silent Film Star Mary Miles Minter That Lead to a ScandalLet's Decipher a Letter of the Silent Film Star Mary Miles Minter That Lead to a ScandalBasics of Cryptology – Part 9 (Modern Cryptography – Block Ciphers – Feistel Ciphers & SDES)Basics of Cryptology – Part 9 (Modern Cryptography – Block Ciphers – Feistel Ciphers & SDES)The Straddling Checkerboard Cipher ExplainedThe Straddling Checkerboard Cipher ExplainedLet's Decipher Two Encrypted English Postcards – Secret Messages From the Past RevealedLet's Decipher Two Encrypted English Postcards – Secret Messages From the Past RevealedLet's Break My Self-Made Cryptographic Challenges From HistoCrypt 2019Let's Break My Self-Made Cryptographic Challenges From HistoCrypt 2019Basics of Cryptology – Part 23 (Cryptography – Modern Hybrid Encryption)Basics of Cryptology – Part 23 (Cryptography – Modern Hybrid Encryption)Break an Encrypted Letter of a Child KillerBreak an Encrypted Letter of a Child KillerBasics of Cryptology – Part 17 (Cryptography/Cryptanalysis – Keyspace and Keyspace Size)Basics of Cryptology – Part 17 (Cryptography/Cryptanalysis – Keyspace and Keyspace Size)An Encrypted Description of a Secret Magic Machine in an 18th Century Alchemy BookAn Encrypted Description of a Secret Magic Machine in an 18th Century Alchemy BookBasics of Cryptology – Part 14 (Modern Cryptography – Passwords)Basics of Cryptology – Part 14 (Modern Cryptography – Passwords)The Trithemius Cipher and the Tabula Recta – Let's Create and Break ThemThe Trithemius Cipher and the Tabula Recta – Let's Create and Break ThemA Musical Cipher Challenge – End of 2021 – Win a Crypto BookA Musical Cipher Challenge – End of 2021 – Win a Crypto Book
Яндекс.Метрика