Hacker Reveals Cryptography Secrets: Hashing, Encryption & More 🔐
Discover how hashing, symmetric and asymmetric encryption, VPNs, and popular algorithms like MD5, SHA, AES, and 3DES work—uncover the secrets behind digital security and how hackers exploit them!

David Bombal
69.6K views • Nov 17, 2024

About this video
Do you know what hashing is? Symmetric encryption? Asymmetric encryption? Do you know how VPNs work? What about MD5, SHA, 3DES, DES, AES and other algorithms? Stephen Sims explains.
// Stephen's Sims’ SOCIAL //
X: https://x.com/Steph3nSims
YouTube: https://www.youtube.com/@OffByOneSecurity
Discord: https://discord.com/invite/offbyonesecurity
// Books written by Stephen //
Gray Hat Hacking Series by various authors:
US https://amzn.to/3B1FeIK
UK https://amzn.to/3A920AL
// YouTube video REFERENCE //
How to make millions $$$ hacking Zero Days?? https://youtu.be/LWmy3t84AIo
Buffer Overflow Hacking Tutorial (Bypass Passwords): https://youtu.be/c2BvS2VqDWg
Never access the dark web without doing this: https://youtu.be/7wLLcFMmbpg
// David's SOCIAL //
Discord: https://discord.com/invite/usKSyzb
X: https://www.x.com/davidbombal
Instagram: https://www.instagram.com/davidbombal
LinkedIn: https://www.linkedin.com/in/davidbombal
Facebook: https://www.facebook.com/davidbombal.co
TikTok: http://tiktok.com/@davidbombal
YouTube: https://www.youtube.com/@davidbombal
// MY STUFF //
https://www.amazon.com/shop/davidbombal
// SPONSORS //
Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com
// MENU //
0:00 - Coming up
01:25 - Intro
01:49 - Stephen's Chancel
03:54 - Crypto
05:15 - Lesson Overview
09:11 - Basic Encryption Examples
11:26 - XOR Exclusive OR
15:45 - Encryption with XOR
20:41 - Decryption either XOR
22:29 - Arbitrary Substitution
24:15 - Rotation Cypher
26:06 - Basic Permutation
27:48 - Symmetric Key Cryptography
31:02 - Stream Cyphers
33:51 - What is a Key?
42:25 - The Best Way to Manage the Initialisation Vector?
50:30 - Block Cyphers
58:50 - Asymmetric Key Cryptography
01:03:37 - Generating a Key
01:12:37 - Hashing
01:20:16 - Basic Signing Without a CA
01:24:58 - Steganography
01:30:27 - Conclusion
Disclaimer: This video is for educational purposes only. No actual attack took place on any websites.
Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel!
#cyrpto #hash #password
// Stephen's Sims’ SOCIAL //
X: https://x.com/Steph3nSims
YouTube: https://www.youtube.com/@OffByOneSecurity
Discord: https://discord.com/invite/offbyonesecurity
// Books written by Stephen //
Gray Hat Hacking Series by various authors:
US https://amzn.to/3B1FeIK
UK https://amzn.to/3A920AL
// YouTube video REFERENCE //
How to make millions $$$ hacking Zero Days?? https://youtu.be/LWmy3t84AIo
Buffer Overflow Hacking Tutorial (Bypass Passwords): https://youtu.be/c2BvS2VqDWg
Never access the dark web without doing this: https://youtu.be/7wLLcFMmbpg
// David's SOCIAL //
Discord: https://discord.com/invite/usKSyzb
X: https://www.x.com/davidbombal
Instagram: https://www.instagram.com/davidbombal
LinkedIn: https://www.linkedin.com/in/davidbombal
Facebook: https://www.facebook.com/davidbombal.co
TikTok: http://tiktok.com/@davidbombal
YouTube: https://www.youtube.com/@davidbombal
// MY STUFF //
https://www.amazon.com/shop/davidbombal
// SPONSORS //
Interested in sponsoring my videos? Reach out to my team here: sponsors@davidbombal.com
// MENU //
0:00 - Coming up
01:25 - Intro
01:49 - Stephen's Chancel
03:54 - Crypto
05:15 - Lesson Overview
09:11 - Basic Encryption Examples
11:26 - XOR Exclusive OR
15:45 - Encryption with XOR
20:41 - Decryption either XOR
22:29 - Arbitrary Substitution
24:15 - Rotation Cypher
26:06 - Basic Permutation
27:48 - Symmetric Key Cryptography
31:02 - Stream Cyphers
33:51 - What is a Key?
42:25 - The Best Way to Manage the Initialisation Vector?
50:30 - Block Cyphers
58:50 - Asymmetric Key Cryptography
01:03:37 - Generating a Key
01:12:37 - Hashing
01:20:16 - Basic Signing Without a CA
01:24:58 - Steganography
01:30:27 - Conclusion
Disclaimer: This video is for educational purposes only. No actual attack took place on any websites.
Please note that links listed may be affiliate links and provide me with a small percentage/kickback should you use them to purchase any of the items listed or recommended. Thank you for supporting me and this channel!
#cyrpto #hash #password
Tags and Topics
Browse our collection to discover more content in these categories.
Video Information
Views
69.6K
Likes
2.1K
Duration
01:33:24
Published
Nov 17, 2024
User Reviews
4.7
(13)