Block Cipher Modes of Operation - Theory and Practice

Presenter: Jim Platania Abstract: "We all rely on block ciphers to safely transmit and store all kinds of information. These cipher algorithms (including AE...

SecPgh•103 views•57:20

🔥 Related Trending Topics

LIVE TRENDS

This video may be related to current global trending topics. Click any trend to explore more videos about what's hot right now!

THIS VIDEO IS TRENDING!

This video is currently trending in Singapore under the topic 'itoto system 12'.

About this video

Presenter: Jim Platania Abstract: "We all rely on block ciphers to safely transmit and store all kinds of information. These cipher algorithms (including AES) encrypt and decrypt fixed-size blocks of data, one by one; as such their designs abstract from any notions of block 'inter-relatedness'. But a perceivable inter-relatedness of encrypted blocks could betray the true shape of their contents, possibly rendering the encryption useless. This is where modes of operation intervene, on the multi-block level, either upholding or breaking the security of many blocks of data. We'll walk through four modes of operation, examining their origins, how they work, what they do best, and where they fall short."

Video Information

Views
103

Total views since publication

Likes
1

User likes and reactions

Duration
57:20

Video length

Published
Jan 14, 2018

Release date

Quality
hd

Video definition

Tags and Topics

This video is tagged with the following topics. Click any tag to explore more related content and discover similar videos:

Tags help categorize content and make it easier to find related videos. Browse our collection to discover more content in these categories.