Professor Wolf's Cryptography Playlist (Condensed Edit)
Thank you to Professor Wolf for this amazing playlist. Once I finished my Intro to Crypto class I needed to pay it forward with this edit. Subscribe to his ...
About this video
Thank you to Professor Wolf for this amazing playlist. Once I finished my Intro to Crypto class I needed to pay it forward with this edit.
Subscribe to his channel: https://www.youtube.com/@Professorial_Wolf
Thank you to Professor Wolf for this amazing playlist. Once I finished my Intro to Crypto class I needed to pay it forward with this edit.
Subscribe to his channel: https://www.youtube.com/@Professorial_Wolf
Chapters:
0:00 - Intro
0:05 - Bifid Cipher, Playfair, Homophonic Substitution Cipher
1:47 - Ceasar Coding, Scrambled Alphabet, Vigenère Cipher
3:20 - Morse Code, Fractionated Morse Code, Pig Pen Code
5:13 - Combinations, Permutations, Set-Theory
6:52 - One Time Pad, Data, Hexadecimal
9:00 - Data Integrity, Reed Solomon
9:29 - Huffman Coding, Lempel Viz Welsh
10:19 - Little Endian, Big Endian
11:01 - Integers, Rational Numbers, Real Numbers, Prime Numbers, Natural N...
11:47 - Binary Math XOR, OR, AND
14:25 - Cryptography, Cryptanalysis, Cryptology, Cleartext, Ciphertext
14:43 - Mod, Shift-Operators, Pseudo Random, True Random
16:39 - MonoAlphabetic, Polyalphabetic
17:23 - Enigma Machine, Asymmetric Encryption, Symmetric Encryption
18:08 - Frequency analysis
18:29 - Diffie-Hellman, Perfect Forward Secrecy, Elliptic Curve Diffie-Hellman
20:30 - ECB, CBC, CFB, OFB, CTR
25:08 - PGP, Stream, Block Encryption
26:32 - IV, Substitution, Transformation, Diffusion
28:35 - Padding, DES, 3DES
29:24 - Entropy, Encryption, Decryption, Encoding
30:28 - AES, IDEA, RC2, RC5, RC6
32:39 - Skipjack, BlowFish, TwoFish, Camilla, XTEA
34:35 - Hashing
35:39 - Hash collision, Preimage Attack, Birthday Attack
37:49 - Salt, Bcrypt
40:15 - Rainbow Table, HMAC, APR1
42:01 - LDAP, PHPass, Cisco Hashes
43:19 - PBKDF2, Noncryptographic hash, Password strength, Cloud ...
44:47 - CBC-MAC CCM, Windows hashing, Linux hashing
45:57 - Public Key Infrastructure and Digital Certificates
50:32 - CIA Triad and PKI
51:14 - PKCS#5, #7, #10, #12, CA Hierarchy
53:58 - One, Two Way Authentication, EndtoEnd and Intermediate Authentication
55:04 - Cert types, Digital Certificate stages, states of revocation
56:54 - Tunnel, Transport, AH, ESP
58:52 - IPSEC Phases
1:01:11 - IKE, TOR
1:02:34 - key escrow, nobus, AES weakness
1:03:28 - Cryptocracking
1:05:27 - Light-weight cryptography
1:05:57 - Bitcoin, Ethereum
1:08:11 - WEP, WEP+TKIP
1:09:44 - RC4, WPA, WPA2, Wireless protocols
1:11:25 - ChaCha20, A5 cipher
1:12:05 - Cryptography Assessment 1-10
1:22:02 - Cryptography Assessment 11-20
1:31:41 - Cryptography Assessment 21-30
1:41:00 - Cryptography Assessment 31-40
1:57:24 - Cryptography Assessment 41-50
2:10:52 - Cryptography Assessment 51-60
2:22:21 - CryptoGameShow
Video Information
Views
37
Total views since publication
Likes
2
User likes and reactions
Duration
03:03:01
Video length
Published
Oct 8, 2025
Release date
Quality
hd
Video definition
About the Channel
Related Trending Topics
LIVE TRENDSThis video may be related to current global trending topics. Click any trend to explore more videos about what's hot right now!
THIS VIDEO IS TRENDING!
This video is currently trending in Turkey under the topic 'bursa deprem'.