Basics of Cryptology – Part 6 (Modern Cryptography – Block Ciphers – SPN Ciphers)
#cryptology, #cryptography, #cryptanalysis In this video, we show the basics of cryptology (cryptology = cryptography and cryptanalysis).
This particular video shows in detail how modern symmetric substutition permutation networks (SPN), which are block ciphers, are built and work.
First, we discuss in detail the internal workings of SPN ciphers, like S-boxes, P-boxes, and XOR operations and their requirements. After that, we discuss two toy SPN ciphers [1,2] (32bit and 64bit), which are also implemented in CT2.
Then, we show both toy ciphers in CT2 and "play" with its inputs (plaintext, round keys).
To see all videos in the "Basics of Cryptology" series, use this playlist: https://www.youtube.com/playlist?list=PLMuvAbyIl0PT6zaRVpK0FCSNMgwAOckTt
If you are interested in details about CrypTool 2, you may have a look at this video here, which gives a short introduction: https://www.youtube.com/watch?v=dELT2-Vgsr8
Finally, you may download the latest version of CrypTool 2 here: https://www.cryptool.org/en/ct2/downloads
[1] Knudsen, Lars R. and Robshaw, Matthew – The Block Cipher Companion, Springer, 2011, https://www.springer.com/de/book/9783642173417
[2] Muharrem Tolga Sakall et. al., DIFFERENTIAL CRYPTANALYSIS FOR A 3-ROUND SPN, 2005, https://pdfs.semanticscholar.org/dee2/23a06f16f6d6939b363d56b6af5a2c9edbee.pdf
Видео Basics of Cryptology – Part 6 (Modern Cryptography – Block Ciphers – SPN Ciphers) канала Cryptography for Everybody
This particular video shows in detail how modern symmetric substutition permutation networks (SPN), which are block ciphers, are built and work.
First, we discuss in detail the internal workings of SPN ciphers, like S-boxes, P-boxes, and XOR operations and their requirements. After that, we discuss two toy SPN ciphers [1,2] (32bit and 64bit), which are also implemented in CT2.
Then, we show both toy ciphers in CT2 and "play" with its inputs (plaintext, round keys).
To see all videos in the "Basics of Cryptology" series, use this playlist: https://www.youtube.com/playlist?list=PLMuvAbyIl0PT6zaRVpK0FCSNMgwAOckTt
If you are interested in details about CrypTool 2, you may have a look at this video here, which gives a short introduction: https://www.youtube.com/watch?v=dELT2-Vgsr8
Finally, you may download the latest version of CrypTool 2 here: https://www.cryptool.org/en/ct2/downloads
[1] Knudsen, Lars R. and Robshaw, Matthew – The Block Cipher Companion, Springer, 2011, https://www.springer.com/de/book/9783642173417
[2] Muharrem Tolga Sakall et. al., DIFFERENTIAL CRYPTANALYSIS FOR A 3-ROUND SPN, 2005, https://pdfs.semanticscholar.org/dee2/23a06f16f6d6939b363d56b6af5a2c9edbee.pdf
Видео Basics of Cryptology – Part 6 (Modern Cryptography – Block Ciphers – SPN Ciphers) канала Cryptography for Everybody
Показать
Комментарии отсутствуют
Информация о видео
17 апреля 2020 г. 14:16:12
00:26:23
Другие видео канала
Basics of Cryptology – Part 1 (Cryptography – Terminology & Classical Ciphers)Asymmetric Encryption - Simply explainedCISSP Domain 3 Cryptography: Difference Between ECB, CBC, CFB, OFB, and CTR ModesCryptography Lesson #1 - Block CiphersSymmetric Key Cryptography | Stream Cipher & Block Cipher Explained | Network Security | SimplilearnWhat are Digital Signatures and How Do They Work?Short Introduction to CrypTool 2BEST SCIENCE GADGETS/TOYS THAT WILL MAKE YOU SAY WOW!Basics of Cryptology – Part 4 (Modern Cryptanalysis – Shannon's Entropy and Brute-Force Attack)Break the Zodiac Killer's Z-408 Cipher (Homophonic Substitution Cipher)What is digital signature?Learning Cryptography: PicoCTF 2017 [16] SubstitutionSymphony of Science - the Quantum World!The Data Encryption Standard (DES) Cipher Explained – How Does it Work?Scytale Cipher Encryption - CISSPTriple DESSoftware Engineering: Crash Course Computer Science #16Avalanche Effect in CryptographyHow TOR Works- ComputerphileAdditive cipher|Additive cipher in cryptography|Shift cipher encryption and decryption