#Security of #Information #Systems #Course - Lecture 3 : Cryptography - Hashing - Ciphering
SECourses
#IT #IoT #Hacking #Internet #Computer #Cyber #Attack #Injection #Attacks #Course Hello everyone. My name is Furkan Gözükara, and I am a Computer Engineer Ph.D. Assistant Professor at the Software Engineering department.
Invite link of the Discord channel of the course is : https://discord.gg/6Mrb8MwteQ
In this course, we will learn general overview and some in depth information about how to secure online information systems.
Security of online systems and IT is a whole area of profession. You can become expert of this area and find very well paying jobs.
Security of Information Systems Full Course Playlist : https://www.youtube.com/playlist?list=PL_pbwdIyffslM_o92NwkaUzD7C6Fekx26
GitHub repository of the course : https://github.com/FurkanGozukara/Security-of-Information-Systems-CSE413-2020
Discord channel link of the course : https://discord.gg/6Mrb8MwteQ How to use Discord : https://youtu.be/AEwPtYiLvsQ
This course does not require you to have any knowledge about programming in any programming language.
However, if you want to start learning programming or develop your other Software Engineering related skills you can watch our below full courses:
[1] Introduction to Programming Full Course with C# playlist : https://www.youtube.com/playlist?list=PL_pbwdIyffskoSXySh0MdiayPJsBZ7m2o
[2] Object Oriented Programming Full Course with C# playlist : https://www.youtube.com/playlist?list=PL_pbwdIyffsnH3XJb66FDIHh1yHwWC26I
[3] Artificial Intelligence (AI) and Machine Learning (ML) Full Course with C# Examples playlist: https://www.youtube.com/playlist?list=PL_pbwdIyffskVschrADCL6KEnL_nqDtgD
[4] Software Engineering Full Course playlist : https://www.youtube.com/playlist?list=PL_pbwdIyffslgxMVyXhnHiSn_EWTvx1G-
[5] Security of Information Systems Full Course playlist : https://www.youtube.com/playlist?list=PL_pbwdIyffslM_o92NwkaUzD7C6Fekx26
[6] (Turkish) Bilgisayar Becerileri Tam Ders playlist : https://www.youtube.com/playlist?list=PL_pbwdIyffsmyE2e909ea1MXLcMb8MenG
Lecture 3 :
** Cryptography
- The security pyramid
- What is cryptology?
- Terminology
- Model of symmetric cryptosystem
- Caesar cipher
- Numerical encoding of the alphabet
- Shift cipher
- Exhaustive search
- Substitution cipher - example
- Enigma
- Enigma key list
- Practical complexity for attacking Enigma
- Attacking ENIGMA
- Cryptanalysis: Attacking Cryptosystems
- Brute-Force Attack (or Exhaustive Key Search)
- Attack models:
- Does secure ciphers exist?
- ETCRRM
- White House Crypto Room 1960s
- Producing key tape for the one-time pad
- Symmetric encryption
- Stream Cipher vs. Block Cipher
- Symmetric stream cipher
- Linear feedback shift register (LFSR)
- Symmetric block cipher
- Itrerated block cipher design
- Substitution-Permutation network (SPN):
- Data Encryption Standard (DES)
- DES architecture
- EFF DES-cracker
- DES Status
- Advanced Encryption Standard
- Rijndael round function
- Rijndael encryption
- Block Ciphers: Modes of Operation
- Use a secure mode!
- Integrity Check Functions
- Hash functions
- Applications of hash functions
- Hash functions (message digest functions)
- Properties of hash functions
- Frequently used hash functions
- Hash collision
- Collision attack
- Brute force attack
- Understanding Password Hash Salting
- Why Salts Make Cracking More Difficult
- Why Strong Passwords are Important
- How Crackable Is a Given Password
- Rainbow password tables
- MD5 , SHA-1 ,SHA-256 , SHA-384 , SHA-512 , RIPEMD-16
Auto timed subtitle : OK ... https://www.youtube.com/watch?v=T4pPmx2q99M
599095532 Bytes