- published: 30 Jul 2012
- views: 22127
- author: ArtOfTheProblem
16:31

Public Key Cryptography: RSA Encryption Algorithm
RSA Public Key Encryption Algorithm. How & why it works. Introduces Euler's Theorem, Euler...
published: 30 Jul 2012
author: ArtOfTheProblem
Public Key Cryptography: RSA Encryption Algorithm
RSA Public Key Encryption Algorithm. How & why it works. Introduces Euler's Theorem, Euler's Phi function, prime factorization, modular exponentiation & time complexity. Link to factoring graph: www.khanacademy.org
- published: 30 Jul 2012
- views: 22127
- author: ArtOfTheProblem
9:22

Encryption and HUGE numbers - Numberphile
Banks, Facebook, Twitter and Google use epic numbers - based on prime factors - to keep ou...
published: 09 Dec 2012
author: numberphile
Encryption and HUGE numbers - Numberphile
Banks, Facebook, Twitter and Google use epic numbers - based on prime factors - to keep our Internet secrets. This is RSA public-key encryption. This video features Dr James Grime (singingbanana.com Message from James: "Thanks to Dr Chris Hughes of the University of York who showed me how to find the RSA public key from my browser, and showed me how awesome they look when you print them out." Regarding the keys used for encryption: x, y prime Encode key E shares no factors with (x-1)(y-1) Decode key is D with E*D - 1 a multiple of (x-1)(y-1) The brown paper from this video can be purchased on ebay: www.ebay.co.uk Thanks to Drew Mokris for the animation: www.spinnerdisc.com Website: www.numberphile.com Numberphile on Facebook: www.facebook.com Numberphile tweets: twitter.com Videos by Brady Haran A run-down of Brady's channels: periodicvideos.blogspot.co.uk
- published: 09 Dec 2012
- views: 156798
- author: numberphile
42:05

Hak5 - Encryption 101, Hak5 1115
Encryption 101 begins with understanding the terminology and mechanisms. This week we're b...
published: 30 May 2012
author: Hak5Darren
Hak5 - Encryption 101, Hak5 1115
Encryption 101 begins with understanding the terminology and mechanisms. This week we're breaking down encryption in the context of SSH - from symmetric and asymmetric to block and stream ciphers. All that and more, this time on Hak5. If you're into Hak5 you'll love our new show by hosts Darren Kitchen and Shannon Morse. Check out www.revision3.com Whether you're a beginner or a pro, www.revision3.com is essential viewing for current and aspiring hackers, computer enthusiasts, and IT professionals. With a how-to approach to all things Information Technology, HakTip breaks down the core concepts, tools, and techniques of Linux, Wireless Networks, Systems Administration, and more. And let's not forget to mention that you can follow us on www.twitter.com and www.facebook.com revision3.com to the show and get all your Hak5 goodies, including the infamous wifi-pineapple over at hakshop.com . If you have any questions or suggestions please feel free to contact us at feedback@hak5.org.
- published: 30 May 2012
- views: 13132
- author: Hak5Darren
3:51

Make Your Own Encryption Program
This video lays out the steps for creating a very simple encryption and decryption program...
published: 10 Dec 2011
author: gigafide
Make Your Own Encryption Program
This video lays out the steps for creating a very simple encryption and decryption program using free tools. The programming language we will be using is VB Script. See if you can decrypt this text: wkjlue#vnrro#huxwxi#uxr\ You can find all the code for this program as well as an alternative for Apple computers at the project page: www.tinkernut.com
- published: 10 Dec 2011
- views: 29867
- author: gigafide
5:43

Don't encrypt passwords
Encryption passwords is bad. Try hashing them with a little bit of salt on top. Confused a...
published: 12 Jan 2012
author: InfosecCynic
Don't encrypt passwords
Encryption passwords is bad. Try hashing them with a little bit of salt on top. Confused about the terminology - maybe i can clear your confusion with the use of a shoe, a box and a pen & paper. Don't forget to like the video if its been of any use to you. As always, I'm easy to stalk. www.J4vv4D.com Facebook.com/J4vv4D twitter: @J4vv4D youtube.com/infoseccynic
- published: 12 Jan 2012
- views: 8822
- author: InfosecCynic
16:36

Gambling with Secrets: 8/8 (RSA Encryption)
RSA Encryption - How & why it works. Euclid, Euler, Cocks and much more...
published: 29 Jul 2012
author: ArtOfTheProblem
Gambling with Secrets: 8/8 (RSA Encryption)
RSA Encryption - How & why it works. Euclid, Euler, Cocks and much more
- published: 29 Jul 2012
- views: 10316
- author: ArtOfTheProblem
7:05

Intro to AES Encryption - Part 1
In part 1 of 5, Patrick Townsend, Founder & CTO of Townsend Security, discusses AES Encryp...
published: 28 Jan 2009
author: TownsendSecurity
Intro to AES Encryption - Part 1
In part 1 of 5, Patrick Townsend, Founder & CTO of Townsend Security, discusses AES Encryption, why it is important, and where to get it.
- published: 28 Jan 2009
- views: 28812
- author: TownsendSecurity
10:25

HOW TO: Hack Encrypted Wireless Network (WEP & WPA)
This tutorial will show you how to hack WEP and WPA/2 encryption on a Wi-Fi Network using ...
published: 21 Jul 2010
author: CompuTechSweden
HOW TO: Hack Encrypted Wireless Network (WEP & WPA)
This tutorial will show you how to hack WEP and WPA/2 encryption on a Wi-Fi Network using a Linux kernel, like BackTrack. NOTE: For educational purposes only! I take no responsibility for using this method in real life! Downloads: All Commands (PDF): fredrik-alm.se A WPA-Wordlist (TXT / 106 MB) fredrik-alm.se BackTrack 5 (ISO): www.backtrack-linux.org Extra: Recommended WiFi dongle for Wi-Fi Hacking: hakshop.com
- published: 21 Jul 2010
- views: 165591
- author: CompuTechSweden
13:52

Ep14 - Protecting Your Data With Encryption
www.techchop.com - In this episode, Paul shows us how to encrypt our data from the file le...
published: 01 Mar 2012
author: techchop
Ep14 - Protecting Your Data With Encryption
www.techchop.com - In this episode, Paul shows us how to encrypt our data from the file level to the entire hard drive as well as email, IM, and VoIP encryption. Are you ready 007?
- published: 01 Mar 2012
- views: 18904
- author: techchop
2:38

Appeal Teodelit on a language encryption
Video message on the encrypted language from Ziria (My full extraterrestrial name: TEODELI...
published: 09 Jan 2013
author: Spouses Irradia
Appeal Teodelit on a language encryption
Video message on the encrypted language from Ziria (My full extraterrestrial name: TEODELIT IRRADIA IEURONEREKA ERKERRAS) For all of you who are already familiar with our history ... Now, I'm looking for any suggestions from people in the US roommate. I will consider all your options. I even still have time until May 2013! However, I want to draw your attention to: The most preferred would be the search for roommate in VIRGINIA (USA), because in the future I'm going to move to NORTHERN VIRGINIA for permanent residence. However, I repeat - this is the preferred option, but not mandatory. I am willing to consider ANY options, all cities and states in the US for a my temporary place of residence! I look forward to the response of people willing to help me with finding roommate in the United States.! All those wishing to help - please contact me by email: Irradia1986@yahoo.com With the exact subject title, so I immediately drew attention to you (as I came to the post office a lot of different messages!) Love and Light to all! Ziria.
- published: 09 Jan 2013
- views: 173
- author: Spouses Irradia
20:45

How to Super Encrypt your secret Data, pics,videos Hide it so well,no one will find it
Tired of your wife / girlfriend looking at your old pictures, videos? Here is one way how ...
published: 07 Jan 2013
author: XOOMdotWS
How to Super Encrypt your secret Data, pics,videos Hide it so well,no one will find it
Tired of your wife / girlfriend looking at your old pictures, videos? Here is one way how to hide it in the way that she will never find out.
- published: 07 Jan 2013
- views: 10
- author: XOOMdotWS
10:53

How to Encrypt and Decrypt MD5's
JackkTutorials shows you how to Encrypt and Decrypt MD5 Hashes using PasswordsPro Quick Li...
published: 08 Sep 2011
author: JackkTutorials
How to Encrypt and Decrypt MD5's
JackkTutorials shows you how to Encrypt and Decrypt MD5 Hashes using PasswordsPro Quick Links ------------------- md5encryption.com www.insidepro.com www.hashhack.com Check out some of these links ------------------------------------------------- Facebook: www.facebook.com Blog: www.jackktutorials.co.cc Contact Me ------------------ Youtube: www.youtube.com Email: J4ckTutorials@gmail.com Please Comment, Like and Subscribe if you like this tutorial. I upload Tutorials every Tuesday!
- published: 08 Sep 2011
- views: 12739
- author: JackkTutorials
22:00

3 - 2 - The Data Encryption Standard -Cryptography-Professor Dan Boneh
If you are interest on more free online course info, welcome to: opencourseonline.com Prof...
published: 16 Apr 2012
author: OpenCourseOnline
3 - 2 - The Data Encryption Standard -Cryptography-Professor Dan Boneh
If you are interest on more free online course info, welcome to: opencourseonline.com Professor Dan Boneh is offering a free online course on Cryptography starting in March 12, 2012. www.coursera.org
- published: 16 Apr 2012
- views: 4945
- author: OpenCourseOnline
Vimeo results:
10:18

The Thomas Beale Cipher
Based on a true legend of the famous unsolved code.
The film contains 16 hidden messages ...
published: 24 Jan 2011
author: Andrew S Allen
The Thomas Beale Cipher
Based on a true legend of the famous unsolved code.
The film contains 16 hidden messages that hold clues to the characters' secrets. Eight are fairly easy requiring only a close eye. Six are moderately difficult using various encryption methods. Two are extremely difficult requiring a genius mind to decrypt.
Follow the film
http://www.facebook.com/thomasbealecipher
More about the film,
http://www.thomasbealecipher.com
Distributed by Short of the Week,
http://www.shortoftheweek.com
2:30

Cryptocat Adventure!
Alice and Bob learn how Cryptocat can make their online lives more private....
published: 13 Mar 2012
author: Nadim Kobeissi
Cryptocat Adventure!
Alice and Bob learn how Cryptocat can make their online lives more private.
1:20

iTwin : Unlimited Capacity Secure USB Device
Introducing the world's first plug and play secure remote file access USB device. Availabl...
published: 08 Dec 2010
author: iTwinCast
iTwin : Unlimited Capacity Secure USB Device
Introducing the world's first plug and play secure remote file access USB device. Available from www.itwin.com Effectively, it's like an unlimited capacity USB flash drive. Simple and secure connection between any two online computers, anywhere in the world.
Access the complete hard drive of your remote machine from any computer anywhere. Before, connecting two computers used to be so complicated. Now it's as simple as plugging in the two ends of a cable, without the cable. Simply plug the two halves of iTwin into any two online computers and you're sharing. Copy, back-up or remotely edit files on one computer from the other. In either direction.
1:26

TNS Reaver Pro Demo
A demonstration of Tactical Network Solutions' commercial Reaver Pro product cracking a WP...
published: 06 Jan 2012
author: Tactical Network Solutions
TNS Reaver Pro Demo
A demonstration of Tactical Network Solutions' commercial Reaver Pro product cracking a WPA-encrypted wireless network.
See http://www.tacnetsol.com/products for more details.
Music:
"Time"
by Hidden Logic Presents Luminary
on Armada Music
Youtube results:
54:26

TechWiseTV 119: Next Generation Encryption
Secure communication includes encryption, message authentication, key establishment, digit...
published: 16 Aug 2012
author: Cisco
TechWiseTV 119: Next Generation Encryption
Secure communication includes encryption, message authentication, key establishment, digital signatures and hashing. Over the past 30 years, public key cryptography has become a mainstay for secure communications over the Internet and throughout many other forms of communications. They form the basis for key management and authentication for IP encryption (IKE/IPSEC), web traffic (SSL/TLS) and secure electronic mail.For digital signatures, public key cryptography is used to authenticate the origin of data and protect the integrity of that data. Attend a workshop to learn more: bit.ly
- published: 16 Aug 2012
- views: 2443
- author: Cisco
75:44

VoIP Encryption in a Surveillance Society
March 7, 2007 lecture by Phillip Zimmermann for the Stanford University Computer Systems C...
published: 14 May 2008
author: StanfordUniversity
VoIP Encryption in a Surveillance Society
March 7, 2007 lecture by Phillip Zimmermann for the Stanford University Computer Systems Colloquium (EE 380). Phil talks about how the debate on the use of crypto has shifted since the 1990s, when it was a clash between civil liberties and law enforcement - in the 1990s, the crypto debate was about averting omniscience in governments, but today the encrypted VoIP debate may be about averting omniscience in criminals. EE 380 | Computer Systems Colloquium: www.stanford.edu Stanford Computer Systems Laboratory: csl.stanford.edu Stanford Center for Professional Development: scpd.stanford.edu Stanford University Channel on YouTube: www.youtube.com
- published: 14 May 2008
- views: 6428
- author: StanfordUniversity
6:16

!!! Real Backtrack 5 R3 Hacking Wireless Encryption WEP w Gerix Wifi Cracker-ng Real !!!
www.facebook.com Gerix Wifi Cracker NG (New Generation), a really complete GUI for Aircrac...
published: 23 Sep 2012
author: beastmode19888
!!! Real Backtrack 5 R3 Hacking Wireless Encryption WEP w Gerix Wifi Cracker-ng Real !!!
www.facebook.com Gerix Wifi Cracker NG (New Generation), a really complete GUI for Aircrack-NG which includes useful extras. Completely re-written in Python + QT, automates all the different techniques to attack Access Points and Wireless Routers.
- published: 23 Sep 2012
- views: 9071
- author: beastmode19888
15:17

MCTS 70-680: Encrypting File System (EFS)
The Encrypting File System (EFS) is used in Windows to encrypt files so they cannot be rea...
published: 23 Oct 2011
author: itfreetraining
MCTS 70-680: Encrypting File System (EFS)
The Encrypting File System (EFS) is used in Windows to encrypt files so they cannot be read even using an offline attack. In order to ensure you can always access encrypted files, Windows allows a DRA to be created. A DRA is anther user that can access any files encrypted. This video looks at how the encrypted file system works and how to configure a DRA. 03:11 demo on how to encrypt files 05:52 exporting the EFS certificate using cipher /r:filename 06:22 Configuring a DRA using group policy HKEY\Computer configuration\Windows Settings\Security Settings\Public Key Polices\Encrypting file system How EFS works A file is encrypted with a symmetric key. This is the same style of algorithm used to secure compressed files like zip. The same password or key is used to encrypt the file as decrypt the file. The symmetric key is randomized for each file and thus you need some where to store all these symmetric keys. The easiest place to store the symmetric key is in the file itself. That way if the file is moved to a different computer or hard disk the key is always present with the file. In order to make sure that the symmetric key is stored in the file can't be read, the symmetric key is encrypted using an EFS certificate. An EFS certificate is generated for the user when they encrypt there first file or by running the command cipher /k. In a domain environment you can also configure a certificate authority to create and manage these certificates. This essentially means the ...
- published: 23 Oct 2011
- views: 7563
- author: itfreetraining