Cryptography Simplified: Professor Wolf’s Top Playlist 🔐
Discover the essential cryptography lessons from Professor Wolf’s curated playlist. Perfect for beginners and enthusiasts alike—subscribe and deepen your understanding of crypto!

Misery! Media
37 views • Oct 8, 2025

About this video
Thank you to Professor Wolf for this amazing playlist. Once I finished my Intro to Crypto class I needed to pay it forward with this edit.
Subscribe to his channel: https://www.youtube.com/@Professorial_Wolf
Thank you to Professor Wolf for this amazing playlist. Once I finished my Intro to Crypto class I needed to pay it forward with this edit.
Subscribe to his channel: https://www.youtube.com/@Professorial_Wolf
Chapters:
0:00 - Intro
0:05 - Bifid Cipher, Playfair, Homophonic Substitution Cipher
1:47 - Ceasar Coding, Scrambled Alphabet, Vigenère Cipher
3:20 - Morse Code, Fractionated Morse Code, Pig Pen Code
5:13 - Combinations, Permutations, Set-Theory
6:52 - One Time Pad, Data, Hexadecimal
9:00 - Data Integrity, Reed Solomon
9:29 - Huffman Coding, Lempel Viz Welsh
10:19 - Little Endian, Big Endian
11:01 - Integers, Rational Numbers, Real Numbers, Prime Numbers, Natural N...
11:47 - Binary Math XOR, OR, AND
14:25 - Cryptography, Cryptanalysis, Cryptology, Cleartext, Ciphertext
14:43 - Mod, Shift-Operators, Pseudo Random, True Random
16:39 - MonoAlphabetic, Polyalphabetic
17:23 - Enigma Machine, Asymmetric Encryption, Symmetric Encryption
18:08 - Frequency analysis
18:29 - Diffie-Hellman, Perfect Forward Secrecy, Elliptic Curve Diffie-Hellman
20:30 - ECB, CBC, CFB, OFB, CTR
25:08 - PGP, Stream, Block Encryption
26:32 - IV, Substitution, Transformation, Diffusion
28:35 - Padding, DES, 3DES
29:24 - Entropy, Encryption, Decryption, Encoding
30:28 - AES, IDEA, RC2, RC5, RC6
32:39 - Skipjack, BlowFish, TwoFish, Camilla, XTEA
34:35 - Hashing
35:39 - Hash collision, Preimage Attack, Birthday Attack
37:49 - Salt, Bcrypt
40:15 - Rainbow Table, HMAC, APR1
42:01 - LDAP, PHPass, Cisco Hashes
43:19 - PBKDF2, Noncryptographic hash, Password strength, Cloud ...
44:47 - CBC-MAC CCM, Windows hashing, Linux hashing
45:57 - Public Key Infrastructure and Digital Certificates
50:32 - CIA Triad and PKI
51:14 - PKCS#5, #7, #10, #12, CA Hierarchy
53:58 - One, Two Way Authentication, EndtoEnd and Intermediate Authentication
55:04 - Cert types, Digital Certificate stages, states of revocation
56:54 - Tunnel, Transport, AH, ESP
58:52 - IPSEC Phases
1:01:11 - IKE, TOR
1:02:34 - key escrow, nobus, AES weakness
1:03:28 - Cryptocracking
1:05:27 - Light-weight cryptography
1:05:57 - Bitcoin, Ethereum
1:08:11 - WEP, WEP+TKIP
1:09:44 - RC4, WPA, WPA2, Wireless protocols
1:11:25 - ChaCha20, A5 cipher
1:12:05 - Cryptography Assessment 1-10
1:22:02 - Cryptography Assessment 11-20
1:31:41 - Cryptography Assessment 21-30
1:41:00 - Cryptography Assessment 31-40
1:57:24 - Cryptography Assessment 41-50
2:10:52 - Cryptography Assessment 51-60
2:22:21 - CryptoGameShow
Subscribe to his channel: https://www.youtube.com/@Professorial_Wolf
Thank you to Professor Wolf for this amazing playlist. Once I finished my Intro to Crypto class I needed to pay it forward with this edit.
Subscribe to his channel: https://www.youtube.com/@Professorial_Wolf
Chapters:
0:00 - Intro
0:05 - Bifid Cipher, Playfair, Homophonic Substitution Cipher
1:47 - Ceasar Coding, Scrambled Alphabet, Vigenère Cipher
3:20 - Morse Code, Fractionated Morse Code, Pig Pen Code
5:13 - Combinations, Permutations, Set-Theory
6:52 - One Time Pad, Data, Hexadecimal
9:00 - Data Integrity, Reed Solomon
9:29 - Huffman Coding, Lempel Viz Welsh
10:19 - Little Endian, Big Endian
11:01 - Integers, Rational Numbers, Real Numbers, Prime Numbers, Natural N...
11:47 - Binary Math XOR, OR, AND
14:25 - Cryptography, Cryptanalysis, Cryptology, Cleartext, Ciphertext
14:43 - Mod, Shift-Operators, Pseudo Random, True Random
16:39 - MonoAlphabetic, Polyalphabetic
17:23 - Enigma Machine, Asymmetric Encryption, Symmetric Encryption
18:08 - Frequency analysis
18:29 - Diffie-Hellman, Perfect Forward Secrecy, Elliptic Curve Diffie-Hellman
20:30 - ECB, CBC, CFB, OFB, CTR
25:08 - PGP, Stream, Block Encryption
26:32 - IV, Substitution, Transformation, Diffusion
28:35 - Padding, DES, 3DES
29:24 - Entropy, Encryption, Decryption, Encoding
30:28 - AES, IDEA, RC2, RC5, RC6
32:39 - Skipjack, BlowFish, TwoFish, Camilla, XTEA
34:35 - Hashing
35:39 - Hash collision, Preimage Attack, Birthday Attack
37:49 - Salt, Bcrypt
40:15 - Rainbow Table, HMAC, APR1
42:01 - LDAP, PHPass, Cisco Hashes
43:19 - PBKDF2, Noncryptographic hash, Password strength, Cloud ...
44:47 - CBC-MAC CCM, Windows hashing, Linux hashing
45:57 - Public Key Infrastructure and Digital Certificates
50:32 - CIA Triad and PKI
51:14 - PKCS#5, #7, #10, #12, CA Hierarchy
53:58 - One, Two Way Authentication, EndtoEnd and Intermediate Authentication
55:04 - Cert types, Digital Certificate stages, states of revocation
56:54 - Tunnel, Transport, AH, ESP
58:52 - IPSEC Phases
1:01:11 - IKE, TOR
1:02:34 - key escrow, nobus, AES weakness
1:03:28 - Cryptocracking
1:05:27 - Light-weight cryptography
1:05:57 - Bitcoin, Ethereum
1:08:11 - WEP, WEP+TKIP
1:09:44 - RC4, WPA, WPA2, Wireless protocols
1:11:25 - ChaCha20, A5 cipher
1:12:05 - Cryptography Assessment 1-10
1:22:02 - Cryptography Assessment 11-20
1:31:41 - Cryptography Assessment 21-30
1:41:00 - Cryptography Assessment 31-40
1:57:24 - Cryptography Assessment 41-50
2:10:52 - Cryptography Assessment 51-60
2:22:21 - CryptoGameShow
Video Information
Views
37
Likes
2
Duration
03:03:01
Published
Oct 8, 2025