Cryptology
-
Secret Sharing using Chinese Remainder Theory (CRT)
In this video Professor Bill Buchanan explains the concept of Secret Sharing with ‘Chinese Remainder Theorem (CRT)’.
Read More » -
Cryptography with Python! XOR
Tutorial introducing the XOR function and its use in cryptography. Learn how to use the XOR function within Python.
Read More » -
Hashing Algorithms and Security
Hashing Algorithms are used to ensure file authenticity, but how secure are they and why do they keep changing?
Read More » -
Authenticated Key Exchange – Discrete Logs and Elliptic Curve methods
In this video Professor Bill Buchanan explains ‘Authenticated Key Exchange’.
Read More » -
Encryption Key Wrapping
In this video Professor Bill Buchanan OBE explains the concept of Encryption Key Wrapping.
Read More » -
Encrypted Key Exchange (EKE) – Discrete Logs and Elliptic Curve methods
In this video Professor Bill Buchanan explains Ecrypted Key Exchange (EKE).
Read More » -
Key Exchange Methods
In this video, Professor Bill Buchanan explains key exchange methods, communication which will happen through a shared key.
Read More » -
Introduction to Public Key Encryption
In this video, Professor Bill Buchanan talks about one of the most popular algorithms, ‘Public Key Encryption.
Read More »