Популярное

Музыка Кино и Анимация Автомобили Животные Спорт Путешествия Игры Юмор

Интересные видео

2025 Сериалы Трейлеры Новости Как сделать Видеоуроки Diy своими руками

Топ запросов

смотреть а4 schoolboy runaway турецкий сериал смотреть мультфильмы эдисон
dTub
Скачать

Cryptography: Crash Course Computer Science #33

John Green

Hank Green

vlogbrothers

Crash Course

crashcourse

education

computing

computers

crash course computer science

compsci

cryptography

codebreaking

enigma

allan turing

encryption

decryption

cipher

des

res

key exchange

https

diffie-hellman

private key

rsa

public key

Автор: CrashCourse

Загружено: 26 окт. 2017 г.

Просмотров: 895 373 просмотра

Описание:

Today we’re going to talk about how to keep information secret, and this isn’t a new goal. From as early as Julius Caesar’s Caesar cipher to Mary, Queen of Scots, encrypted messages to kill Queen Elizabeth in 1587, theres has long been a need to encrypt and decrypt private correspondence. This proved especially critical during World War II as Allan Turing and his team at Bletchley Park attempted to decrypt messages from Nazi Enigma machines, and this need has only grown as more and more information sensitive tasks are completed on our computers. So today, we’re going to walk you through some common encryption techniques such as the Advanced Encryption Standard (AES), Diffie-Hellman Key Exchange, and RSA which are employed to keep your information safe, private, and secure.

Note: In October of 2017, researchers released a viable hack against WPA2, known as KRACK Attack, which uses AES to ensure secure communication between computers and network routers. The problem isn't with AES, which is provably secure, but with the communication protocol between router and computer. In order to set up secure communication, the computer and router have to agree through what's called a "handshake". If this handshake is interrupted in just the right way, an attacker can cause the handshake to fault to an insecure state and reveal critical information which makes the connection insecure. As is often the case with these situations, the problem is with an implementation, not the secure algorithm itself. Our friends over at Computerphile have a great video on the topic:    • Krack Attacks (WiFi WPA2 Vulnerabilit...  

Produced in collaboration with PBS Digital Studios:    / pbsdigitalstudios  

Want to know more about Carrie Anne?
https://about.me/carrieannephilbin

The Latest from PBS Digital Studios:    • All PBS Digital Studios videos  

Want to find Crash Course elsewhere on the internet?
Facebook -   / youtubecrash.  .
Twitter -   / thecrashcourse  
Tumblr -   / thecrashcourse  
Support Crash Course on Patreon:   / crashcourse  
CC Kids:    / crashcoursekids  

Cryptography: Crash Course Computer Science #33

Поделиться в:

Доступные форматы для скачивания:

Скачать видео mp4

  • Информация по загрузке:

Скачать аудио mp3

Похожие видео

Machine Learning & Artificial Intelligence: Crash Course Computer Science #34

Machine Learning & Artificial Intelligence: Crash Course Computer Science #34

Lecture 1: Introduction to Cryptography by Christof Paar

Lecture 1: Introduction to Cryptography by Christof Paar

Early Computing: Crash Course Computer Science #1

Early Computing: Crash Course Computer Science #1

Secret Codes: A History of Cryptography (Part 1)

Secret Codes: A History of Cryptography (Part 1)

7 Cryptography Concepts EVERY Developer Should Know

7 Cryptography Concepts EVERY Developer Should Know

Гитлер, безумие человека (Вторая мировая война)

Гитлер, безумие человека (Вторая мировая война)

Как работала машина

Как работала машина "Энигма"?

A.I. ‐ Humanity's Final Invention?

A.I. ‐ Humanity's Final Invention?

The Final Barrier to (Nearly) Infinite Energy

The Final Barrier to (Nearly) Infinite Energy

AES: How to Design Secure Encryption

AES: How to Design Secure Encryption

© 2025 dtub. Все права защищены.



  • Контакты
  • О нас
  • Политика конфиденциальности



Контакты для правообладателей: [email protected]