Basics of Cryptology – Part 15 (Modern Cryptanalysis – Rainbow Tables)
#cryptology, #cryptography, #cryptanalysis, #lecture, #course, #tutorial
In this video, we show the basics of cryptology (cryptology = cryptography and cryptanalysis).
This video here gives an introduction to rainbow tables. Rainbow tables are data structures for the efficient search of pre-images of cryptographic hash functions. We show how rainbow tables are generated and how to search in rainbow tables (e.g. for a password).
To see all videos in the "Basics of Cryptology" series, use this playlist: https://www.youtube.com/playlist?list=PLMuvAbyIl0PT6zaRVpK0FCSNMgwAOckTt
If you are interested in details about CrypTool 2, you may have a look at this video here, which gives a short introduction: https://www.youtube.com/watch?v=dELT2-Vgsr8
Finally, you may download the latest version of CrypTool 2 here: https://www.cryptool.org/en/ct2/downloads
Видео Basics of Cryptology – Part 15 (Modern Cryptanalysis – Rainbow Tables) канала Cryptography for Everybody
In this video, we show the basics of cryptology (cryptology = cryptography and cryptanalysis).
This video here gives an introduction to rainbow tables. Rainbow tables are data structures for the efficient search of pre-images of cryptographic hash functions. We show how rainbow tables are generated and how to search in rainbow tables (e.g. for a password).
To see all videos in the "Basics of Cryptology" series, use this playlist: https://www.youtube.com/playlist?list=PLMuvAbyIl0PT6zaRVpK0FCSNMgwAOckTt
If you are interested in details about CrypTool 2, you may have a look at this video here, which gives a short introduction: https://www.youtube.com/watch?v=dELT2-Vgsr8
Finally, you may download the latest version of CrypTool 2 here: https://www.cryptool.org/en/ct2/downloads
Видео Basics of Cryptology – Part 15 (Modern Cryptanalysis – Rainbow Tables) канала Cryptography for Everybody
Показать
Комментарии отсутствуют
Информация о видео
16 августа 2020 г. 19:34:10
00:12:12
Другие видео канала
The Grandpré Cipher ExplainedThe Simplified Advanced Encryption Standard (S-AES) ExplainedDigital File Signatures – How Do They Protect Your Computer?ElsieFour – A Low-Tech Cipher Inspired by RC 4How To Install and Use CrypTool 2 in LinuxCrypTool 2 Highlights of the Last Three Years – CrypTool Symposium 2023 in MunichHuffman Code Explained – An Optimal Prefix CodeThe British Typex Cipher Machine ExplainedThe GRANIT/160 Cipher Explained – A GDR Stasi Spy CipherDeciphering Mary Stuart's Lost Letters – A Talk Given by George LasryThe Bazeries Cipher Explained – A Classical Cipher Based on Substitution and TranspositionThe Four-Square Cipher ExplainedThe Stream Cipher Trivium ExplainedThe Josse Cipher – A French Army Cipher from the late 19th CenturyThe Trifid Cipher ExplainedEasily Share Your Contact via a QR Code – How to Create vCards with CrypTool 2The Bifid Cipher ExplainedThe Book Cipher Explained – Encryption & Decryption Using a BookThe Soviet/Russian Block Cipher GOST Magma ExplainedThree Years Cryptography for EverybodyThe Syllabary Cipher Explained