Загрузка страницы

Let's Create a Secure AES-Encrypted Video Chat Noone Can Decipher

#cryptology, #cryptography, #cryptanalysis

In this video, we show how to create a secure (AES-encrypted) video (and audio) chat using CrypTool 2. We use two different methods to establish a common secret key:

1) Pre-shard key (based on a password) using PKCS5
2) Establishing a common secret using Diffie-Hellman key exchange

We first discuss why communication should be end-to-end encrypted over the Internet. Then, we show the basic ideas of (1) and (2). Finally, we live demonstrate how to create a chat using AES with two different computers. We also dicuss briefly, why diffie-hellman is "not enough" to actually create a secure communication between two parties.

If you want to know how the Diffie-Hellman key exchange actually works, please have a look at my video about that: https://youtu.be/2Uz9hdhcFv8

To see all videos in the "Basics of Cryptology" series, use this playlist: https://www.youtube.com/playlist?list=PLMuvAbyIl0PT6zaRVpK0FCSNMgwAOckTt

If you are interested in details about CrypTool 2, you may have a look at this video here, which gives a short introduction: https://www.youtube.com/watch?v=dELT2-Vgsr8&t=853s

You may download the latest version of CrypTool 2 from here: https://www.cryptool.org/en/ct2/downloads

Видео Let's Create a Secure AES-Encrypted Video Chat Noone Can Decipher канала Cryptography for Everybody
Показать
Комментарии отсутствуют
Введите заголовок:

Введите адрес ссылки:

Введите адрес видео с YouTube:

Зарегистрируйтесь или войдите с
Информация о видео
2 октября 2020 г. 14:44:07
00:14:06
Другие видео канала
Zodiac Killer Ciphers – Let's have a Look at Unicity Distances With ExcelZodiac Killer Ciphers – Let's have a Look at Unicity Distances With Excel10 -  Automatic Translation of CrypTool 2 To a New Language10 - Automatic Translation of CrypTool 2 To a New Language04 - Internationalization of the Component (CrypTool 2 Development Series)04 - Internationalization of the Component (CrypTool 2 Development Series)My Cryptologic Highlights of 2020My Cryptologic Highlights of 2020Crypto Challenge Contest – Video 1Crypto Challenge Contest – Video 1Basics of Cryptology – Part 2 (Cryptanalysis – Terminology & Classical Ciphers)Basics of Cryptology – Part 2 (Cryptanalysis – Terminology & Classical Ciphers)Basics of Cryptology – Part 20 (Cryptanalysis – Cost & Fitness Functions - Language Models)Basics of Cryptology – Part 20 (Cryptanalysis – Cost & Fitness Functions - Language Models)Digital File Signatures – How Do They Protect Your Computer?Digital File Signatures – How Do They Protect Your Computer?Basics of Cryptology – Part 22 (Cryptography – Kerckhoffs' Principle & Modern Cryptographic Goals)Basics of Cryptology – Part 22 (Cryptography – Kerckhoffs' Principle & Modern Cryptographic Goals)Let's Decipher a Letter of the Silent Film Star Mary Miles Minter That Lead to a ScandalLet's Decipher a Letter of the Silent Film Star Mary Miles Minter That Lead to a ScandalBasics of Cryptology – Part 9 (Modern Cryptography – Block Ciphers – Feistel Ciphers & SDES)Basics of Cryptology – Part 9 (Modern Cryptography – Block Ciphers – Feistel Ciphers & SDES)The Straddling Checkerboard Cipher ExplainedThe Straddling Checkerboard Cipher ExplainedLet's Decipher Two Encrypted English Postcards – Secret Messages From the Past RevealedLet's Decipher Two Encrypted English Postcards – Secret Messages From the Past RevealedLet's Break My Self-Made Cryptographic Challenges From HistoCrypt 2019Let's Break My Self-Made Cryptographic Challenges From HistoCrypt 2019Basics of Cryptology – Part 23 (Cryptography – Modern Hybrid Encryption)Basics of Cryptology – Part 23 (Cryptography – Modern Hybrid Encryption)Break an Encrypted Letter of a Child KillerBreak an Encrypted Letter of a Child KillerBasics of Cryptology – Part 17 (Cryptography/Cryptanalysis – Keyspace and Keyspace Size)Basics of Cryptology – Part 17 (Cryptography/Cryptanalysis – Keyspace and Keyspace Size)An Encrypted Description of a Secret Magic Machine in an 18th Century Alchemy BookAn Encrypted Description of a Secret Magic Machine in an 18th Century Alchemy BookBasics of Cryptology – Part 14 (Modern Cryptography – Passwords)Basics of Cryptology – Part 14 (Modern Cryptography – Passwords)The Trithemius Cipher and the Tabula Recta – Let's Create and Break ThemThe Trithemius Cipher and the Tabula Recta – Let's Create and Break ThemA Musical Cipher Challenge – End of 2021 – Win a Crypto BookA Musical Cipher Challenge – End of 2021 – Win a Crypto Book
Яндекс.Метрика