Understanding Semantic Security & the One-Time Pad 🔐

Explore the fundamentals of semantic security, the one-time pad, and how they ensure perfect information-theoretic security in cryptography. Learn about ciphertext indistinguishability and key concepts in week 2b of Information Security.

Aleksander Essex8.5K views14:30

About this video

Information Security - Week 2b In this video: the one-time pad, information theoretic security, semantic security, ciphertext indistinguishability, chosen-plaintext attack games, and more. Undergraduate course on networking security and cryptography taught by Aleksander Essex, Ph.D., P.Eng., Associate professor of Software Engineering, Associate Chair (Graduate), Department of Electrical and Computer Engineering, Western University, Canada Website: https://essex.cc Twitter: https://twitter.com/aleksessex Semantic Security reference text: Introduction to Modern Cryptography By Jonathan Katz, Yehuda Lindell Second Edition, Published by Chapman and Hall/CRC, 2014 ISBN 9781466570269 https://www.routledge.com/Introduction-to-Modern-Cryptography/author/p/book/9781466570276 Course topics include: Confidentiality, authenticity, integrity, ciphers, plaintext, ciphertext, encryption, decryption, keys, key generation function, uniform random, semantic security, bits of security, brute force, Kerckhoff's principle, semantic security, ciphertext indistinguishability, IND-CPA, INC-CCA, block ciphers, message padding, PKCS 7, modes of operation, initialization vector, pseudo-random permutation, counter mode, cipher block chaining, electronic codebook mode, counter mode, CBC, ECB, CTR, Advanced Encryption Standard, AES, hash functions, random oracles, pre-image resistance, collision resistance, SHA-1, SHA-256, SHA3, SHA-513, MD5, message authentication codes, MACs, Galois counter mode, GCM, AEC-GCM, public-key cryptography, Diffie-Hellman, public-key agreement, Elliptic curve Diffie-Hellman, DHE, ECDHE, digital signatures, ECDSA, RSA signatures, PKCS v1.5, digital certificates, X.509, public-key infrastructure, PKI, certificate pinning, certificate revocation, CRL, trust store, Transport Layer Security, TLS, TLS 1.2, TLS 1.3, HTTP over TLS, HTTPS Secure Shell, SSH, ciphersuite, client hello, server hello, VPNs, TOR, 802.11, wifi encryption, client authentication, passwords, password hashing, password lengths, single sign-on, federated identity ---- Music: Arp Bounce - Geographer Support by RFM - NCM: https://bit.ly/2xGHypM Slide template: Slidesgo including Flaticons with infographics & images by Freepik

Tags and Topics

This video is tagged with the following topics. Click any tag to explore more related content and discover similar videos:

Tags help categorize content and make it easier to find related videos. Browse our collection to discover more content in these categories.

4.6

1 user review

Write a Review

0/1000 characters

User Reviews

0 reviews

Be the first to comment...

Video Information

Views
8.5K

Total views since publication

Likes
232

User likes and reactions

Duration
14:30

Video length

Published
Sep 23, 2020

Release date

Quality
hd

Video definition

Related Trending Topics

LIVE TRENDS

This video may be related to current global trending topics. Click any trend to explore more videos about what's hot right now!

THIS VIDEO IS TRENDING!

This video is currently trending in Morocco under the topic 'météo demain'.

Share This Video

SOCIAL SHARE

Share this video with your friends and followers across all major social platforms including X (Twitter), Facebook, Youtube, Pinterest, VKontakte, and Odnoklassniki. Help spread the word about great content!