Cryptography Basics: Understanding Modes of Operation π (Part 3)
Dive into the third installment of our cryptography series to explore different cryptographic modes of operation. Perfect for beginners looking to deepen their understanding of data security techniques!

Penguin Fortress - Cybersecurity Information
344 views β’ Feb 16, 2023

About this video
This is the third of my videos on an introduction to cryptography. Iβve already covered some of the basic theory theory of cryptography, including an explanation of symmetric vs asymmetric encryption. In this video I am going to look a bit deeper into different modes of operation, in effect different ways that the encryption performed.
This covers
Electronic Code Book Mode (ECB)
Cipher Block Chaining Mode (CBC)
Cipher Feedback Mode (CFB)
Output Feedback Mode (OFB)
Counter Mode (CTR)
Galois / Counter Mode (GCM)
Counter with Cipher Block Chaining Message Authentication Code Mode
explaining how these are used with relevant encryption and decryption algorithms, looking at block and streaming based ciphers.
Part 1 about Cryptography, history and importance:
https://youtu.be/is31vSjddCM
Part 2 about symmetric and asymmetric key algorithms and digital signatures
https://youtu.be/FLpFHMrgWkg
The video includes the importance of cryptography in the CIA security triad.
Cryptography in various states at rest, in use, in transit.
For more details see:
http://www.penguinfortress.com/security/cryptography
Chapters:
00:00 Cryptographic modes of operation
00:43 List of common encryption modes of operation
01:06 Electronic Code Book Mode (ECB)
02:12 Cipher Block Chaining Mode (CBC)
03:17 Cipher Feedback Mode (CFB)
04:34 Output Feedback Mode (OFB)
05:16 Counter Mode (CTR)
06:20 Galois / Counter Mode (GCM)
07:13 Counter with Cipher Block Chaining Message Authentication Code Mode
07:44 Summary
This covers
Electronic Code Book Mode (ECB)
Cipher Block Chaining Mode (CBC)
Cipher Feedback Mode (CFB)
Output Feedback Mode (OFB)
Counter Mode (CTR)
Galois / Counter Mode (GCM)
Counter with Cipher Block Chaining Message Authentication Code Mode
explaining how these are used with relevant encryption and decryption algorithms, looking at block and streaming based ciphers.
Part 1 about Cryptography, history and importance:
https://youtu.be/is31vSjddCM
Part 2 about symmetric and asymmetric key algorithms and digital signatures
https://youtu.be/FLpFHMrgWkg
The video includes the importance of cryptography in the CIA security triad.
Cryptography in various states at rest, in use, in transit.
For more details see:
http://www.penguinfortress.com/security/cryptography
Chapters:
00:00 Cryptographic modes of operation
00:43 List of common encryption modes of operation
01:06 Electronic Code Book Mode (ECB)
02:12 Cipher Block Chaining Mode (CBC)
03:17 Cipher Feedback Mode (CFB)
04:34 Output Feedback Mode (OFB)
05:16 Counter Mode (CTR)
06:20 Galois / Counter Mode (GCM)
07:13 Counter with Cipher Block Chaining Message Authentication Code Mode
07:44 Summary
Video Information
Views
344
Likes
3
Duration
8:13
Published
Feb 16, 2023
Related Trending Topics
LIVE TRENDSRelated trending topics. Click any trend to explore more videos.