Cryptography with Python 30: HMAC, Encrypt-then-MAC and GCM

Entire course: ➡️ https://www.youtube.com/playlist?list=PLWjMI9CAmVU4–SmpzgswTvxLkZqC9QWn ⏰ Timestamps for content in this video ⏰ 00:00 Message authentication codes (MAC) 02:29 Hash-based message authentication code (HMAC) 06:21 Authenticated encryption (AE) with Encrypt-then-MAC 09:51 Authenticated encryption with associated data (AEAD) with Galois/Couner Mode (GCM) 🔷🔷 About 🔷🔷 This Fundamental Cryptography in Theory and Python lesson presents message authentication codes […]

Cryptography with Python 29: Authenticity as a security goal

Entire course: ➡️ https://www.youtube.com/playlist?list=PLWjMI9CAmVU4–SmpzgswTvxLkZqC9QWn ⏰ Timestamps for content in this video ⏰ 00:00 Authenticity as a security goal 00:52 Relationship of authenticity with integrity 02:23 Authenticity in the analog world 🔷🔷 About 🔷🔷 This Fundamental Cryptography in Theory and Python lesson presents the concept of authenticity as a security goal by making use of examples […]

Cryptography with Python 28: Implementing SHA-256 in Python #2

Entire course: ➡️ https://www.youtube.com/playlist?list=PLWjMI9CAmVU4–SmpzgswTvxLkZqC9QWn ⏰ Timestamps for content in this video ⏰ 00:00 Implementing the SHA-256 hash computation functions sig0, sig1, Sig0, Sig1 in Python 03:33 Implementing the SHA-256 hash computation functions Ch and Maj in Python 04:24 Implementing the SHA-256 hash computation lookup table K_256 in Python 05:57 Executing the SHA-256 hash value computation […]

Cryptography with Python 27: Implementing SHA-256 in Python #1

Entire course: ➡️ https://www.youtube.com/playlist?list=PLWjMI9CAmVU4–SmpzgswTvxLkZqC9QWn ⏰ Timestamps for content in this video ⏰ 00:00 Introducing NIST FIPS PUB 180-4 as official SHA-256 standardization document 01:15 Setting up the SHA-256 implementation in Python using official NIST test vectors 04:14 Implementing high-level SHA-256 in Python 10:49 Implementing the initial SHA-256 hash values in Python 12:18 Implementing the SHA-256 […]

Cryptography with Python 26: Using MD5, SHA-1, SHA-2, SHA-3 in Python

Entire course: ➡️ https://www.youtube.com/playlist?list=PLWjMI9CAmVU4–SmpzgswTvxLkZqC9QWn ⏰ Timestamps for content in this video ⏰ 00:00 Recap of cryptographic hash functions 01:31 Using MD5 in Python 03:42 Using SHA-1 in Python 04:12 Using SHA-256 in Python 04:46 Using SHA-3-512 in Python 05:15 Demonstrating the insecurity of MD5 with Python 07:37 Demonstrating the insecurity of SHA-1 with Python 09:38 […]

Cryptography with Python 25: Hash function security

Entire course: ➡️ https://www.youtube.com/playlist?list=PLWjMI9CAmVU4–SmpzgswTvxLkZqC9QWn ⏰ Timestamps for content in this video ⏰ 00:00 Hash function security 01:01 Requirements on one-wayness 02:13 Requirements on collision resistance 05:05 Requirements on second pre-image resistance 06:32 Insecurity of MD5 and SHA-1, security of SHA-2 and SHA-3 🔷🔷 About 🔷🔷 This Fundamental Cryptography in Theory and Python lesson presents essential […]

Cryptography with Python 24: Hash function structure and properties

Entire course: ➡️ https://www.youtube.com/playlist?list=PLWjMI9CAmVU4–SmpzgswTvxLkZqC9QWn ⏰ Timestamps for content in this video ⏰ 00:00 Hash function structure 01:07 Necessity of hash function collisions 01:50 Injectivity as desired but impossible property 02:36 Collision resistance property 03:32 Second pre-image resistance property 04:49 One-wayness property 07:08 Cryptographic hash functions 07:37 MD5, SHA-1, SHA-2 and SHA-3 🔷🔷 About 🔷🔷 This […]

Cryptography with Python 23: Integrity as a security goal

Entire course: ➡️ https://www.youtube.com/playlist?list=PLWjMI9CAmVU4–SmpzgswTvxLkZqC9QWn ⏰ Timestamps for content in this video ⏰ 00:00 Integrity as a security goal 01:05 Integrity in the analog world 🔷🔷 About 🔷🔷 This Fundamental Cryptography in Theory and Python lesson presents the concept of integrity as a security goal by making use of examples from the analog world. 📝 Resources […]

Cryptography with Python 22: Implementing a P-256 ECDHE in Python

Entire course: ➡️ https://www.youtube.com/playlist?list=PLWjMI9CAmVU4–SmpzgswTvxLkZqC9QWn ⏰ Timestamps for content in this video ⏰ 00:00 Recap of ECDHE key exchange 00:53 Introducing NIST SP 800-186 as official standardization document of P-256 01:49 Setting up the implementation in Python 06:36 Generating a private key in Python 07:30 Implementing elliptic curve scalar multiplication in Python 09:06 Implementing elliptic curve […]

Cryptography with Python 21: Using EDH and ECDHE in Python

Entire course: ➡️ https://www.youtube.com/playlist?list=PLWjMI9CAmVU4–SmpzgswTvxLkZqC9QWn ⏰ Timestamps for content in this video ⏰ 00:00 Recap of EDH key exchange 01:31 Recap of ECDHE key exchange 02:20 Using EDH key exchange in Python 07:04 Using ECDHE key exchange in Python 🔷🔷 About 🔷🔷 This Fundamental Cryptography in Theory and Python lesson demonstrates, how the key exchanges EDH […]

Cryptography with Python 20: Implementing hybrid RSA-AES encryption in Python

Entire course: ➡️ https://www.youtube.com/playlist?list=PLWjMI9CAmVU4–SmpzgswTvxLkZqC9QWn ⏰ Timestamps for content in this video ⏰ 00:00 Recap of hybrid encryption 01:48 Setting up the hybrid RSA-AES encryption implementation in Python 04:16 Implementing the hybrid RSA-AES encryption process in Python 08:53 Implementing the hybrid RSA-AES decryption process in Python 11:00 Executing the hybrid RSA-AES encryption and decryption 🔷🔷 About […]

Cryptography with Python 19: Hybrid encryption & key exchanges (EC)DHE

Entire course: ➡️ https://www.youtube.com/playlist?list=PLWjMI9CAmVU4–SmpzgswTvxLkZqC9QWn ⏰ Timestamps for content in this video ⏰ 00:00 Hybrid encryption 02:42 Drawback of hybrid encryption 04:33 DHE key exchange 08:41 ECDHE key exchange 🔷🔷 About 🔷🔷 This Fundamental Cryptography in Theory and Python lesson first presents hybrid encryption as a best-of-two-worlds combination of symmetric encryption with asymmetric encryption. The lesson […]
eos
EOS (EOS) 0,775751 1,65%
aave
Aave (AAVE) 82,50 0,52%
the-graph
The Graph (GRT) 0,265740 2,83%
kusama
Kusama (KSM) 26,18 3,33%
waves
Waves (WAVES) 2,24 0,09%
dash
Dash (DASH) 27,28 0,12%
bitcoin
Bitcoin (BTC) 58.764,61 1,23%
ethereum
Ethereum (ETH) 2.856,80 2,12%
cardano
Cardano (ADA) 0,428954 0,74%
tether
Tether (USDT) 0,929451 0,00%
xrp
XRP (XRP) 0,509686 3,55%
solana
Solana (SOL) 141,33 3,98%
polkadot
Polkadot (DOT) 6,70 0,19%
usd-coin
USDC (USDC) 0,929555 0,05%
dogecoin
Dogecoin (DOGE) 0,144348 3,61%
uniswap
Uniswap (UNI) 7,00 0,64%
terra-luna
Terra Luna Classic (LUNC) 0,000101 2,11%
litecoin
Litecoin (LTC) 75,63 0,33%
chainlink
Chainlink (LINK) 13,60 1,85%
bitcoin-cash
Bitcoin Cash (BCH) 442,19 2,12%
algorand
Algorand (ALGO) 0,182289 0,45%
matic-network
Polygon (MATIC) 0,667442 1,80%
stellar
Stellar (XLM) 0,103280 0,51%
cosmos
Cosmos Hub (ATOM) 8,67 1,14%
filecoin
Filecoin (FIL) 5,69 0,79%
tron
TRON (TRX) 0,110661 1,72%
ethereum-classic
Ethereum Classic (ETC) 25,34 0,82%
dai
Dai (DAI) 0,928671 0,03%
tezos
Tezos (XTZ) 0,879274 2,02%
monero
Monero (XMR) 121,79 0,79%