Symmetric Key Cryptography: Cryptographic Techniques
This is the fifth in a series about cryptography; an extremely important aspect of computer science and cyber security. It reviews how the XOR logical opera...
🔥 Related Trending Topics
LIVE TRENDSThis video may be related to current global trending topics. Click any trend to explore more videos about what's hot right now!
THIS VIDEO IS TRENDING!
This video is currently trending in Thailand under the topic 'สภาพอากาศ'.
About this video
This is the fifth in a series about cryptography; an extremely important aspect of computer science and cyber security. It reviews how the XOR logical operation can be used to encrypt at the bit level in symmetric key cryptography, then shows how this can be combined with permutation steps to create an even stronger cipher. It mentions a number of principles used in modern day block ciphers such as DES and AES, including the Feistel cipher, block ciphers, block chaining, the use of multiple sub keys and multiple encryption rounds.
Video Information
Views
4.4K
Total views since publication
Likes
99
User likes and reactions
Duration
11:02
Video length
Published
Mar 9, 2019
Release date
Quality
hd
Video definition
About the Channel
Tags and Topics
This video is tagged with the following topics. Click any tag to explore more related content and discover similar videos:
#Cryptography #Plain text #Cipher text #Encryption #Decryption #XOR #Exclusive OR #Logic #Logic gate #Binary #Bits #ASCII #Code #Block cipher #Feistel cipher #Block chaining #Symmetric key #DES #AES #Data Encryption Standard #Advanced Encryption Standard #Substitution #Permutation #Spreadsheet #VBA #Excel VBA #Cyber Security #Cyber #Computer Science #GCSE #A Level
Tags help categorize content and make it easier to find related videos. Browse our collection to discover more content in these categories.