Professor Wolf's Cryptography Playlist (Condensed Edit)

Thank you to Professor Wolf for this amazing playlist. Once I finished my Intro to Crypto class I needed to pay it forward with this edit. Subscribe to his ...

Misery! Media37 views03:03:01

About this video

Thank you to Professor Wolf for this amazing playlist. Once I finished my Intro to Crypto class I needed to pay it forward with this edit. Subscribe to his channel: https://www.youtube.com/@Professorial_Wolf Thank you to Professor Wolf for this amazing playlist. Once I finished my Intro to Crypto class I needed to pay it forward with this edit. Subscribe to his channel: https://www.youtube.com/@Professorial_Wolf Chapters: 0:00 - Intro 0:05 - Bifid Cipher, Playfair, Homophonic Substitution Cipher 1:47 - Ceasar Coding, Scrambled Alphabet, Vigenère Cipher 3:20 - Morse Code, Fractionated Morse Code, Pig Pen Code 5:13 - Combinations, Permutations, Set-Theory 6:52 - One Time Pad, Data, Hexadecimal 9:00 - Data Integrity, Reed Solomon 9:29 - Huffman Coding, Lempel Viz Welsh 10:19 - Little Endian, Big Endian 11:01 - Integers, Rational Numbers, Real Numbers, Prime Numbers, Natural N... 11:47 - Binary Math XOR, OR, AND 14:25 - Cryptography, Cryptanalysis, Cryptology, Cleartext, Ciphertext 14:43 - Mod, Shift-Operators, Pseudo Random, True Random 16:39 - MonoAlphabetic, Polyalphabetic 17:23 - Enigma Machine, Asymmetric Encryption, Symmetric Encryption 18:08 - Frequency analysis 18:29 - Diffie-Hellman, Perfect Forward Secrecy, Elliptic Curve Diffie-Hellman 20:30 - ECB, CBC, CFB, OFB, CTR 25:08 - PGP, Stream, Block Encryption 26:32 - IV, Substitution, Transformation, Diffusion 28:35 - Padding, DES, 3DES 29:24 - Entropy, Encryption, Decryption, Encoding 30:28 - AES, IDEA, RC2, RC5, RC6 32:39 - Skipjack, BlowFish, TwoFish, Camilla, XTEA 34:35 - Hashing 35:39 - Hash collision, Preimage Attack, Birthday Attack 37:49 - Salt, Bcrypt 40:15 - Rainbow Table, HMAC, APR1 42:01 - LDAP, PHPass, Cisco Hashes 43:19 - PBKDF2, Noncryptographic hash, Password strength, Cloud ... 44:47 - CBC-MAC CCM, Windows hashing, Linux hashing 45:57 - Public Key Infrastructure and Digital Certificates 50:32 - CIA Triad and PKI 51:14 - PKCS#5, #7, #10, #12, CA Hierarchy 53:58 - One, Two Way Authentication, EndtoEnd and Intermediate Authentication 55:04 - Cert types, Digital Certificate stages, states of revocation 56:54 - Tunnel, Transport, AH, ESP 58:52 - IPSEC Phases 1:01:11 - IKE, TOR 1:02:34 - key escrow, nobus, AES weakness 1:03:28 - Cryptocracking 1:05:27 - Light-weight cryptography 1:05:57 - Bitcoin, Ethereum 1:08:11 - WEP, WEP+TKIP 1:09:44 - RC4, WPA, WPA2, Wireless protocols 1:11:25 - ChaCha20, A5 cipher 1:12:05 - Cryptography Assessment 1-10 1:22:02 - Cryptography Assessment 11-20 1:31:41 - Cryptography Assessment 21-30 1:41:00 - Cryptography Assessment 31-40 1:57:24 - Cryptography Assessment 41-50 2:10:52 - Cryptography Assessment 51-60 2:22:21 - CryptoGameShow

Video Information

Views
37

Total views since publication

Likes
2

User likes and reactions

Duration
03:03:01

Video length

Published
Oct 8, 2025

Release date

Quality
hd

Video definition

Related Trending Topics

LIVE TRENDS

This video may be related to current global trending topics. Click any trend to explore more videos about what's hot right now!

THIS VIDEO IS TRENDING!

This video is currently trending in Turkey under the topic 'bursa deprem'.

Share This Video

SOCIAL SHARE

Share this video with your friends and followers across all major social platforms. Help spread the word about great content!