Secret Key Cryptography, Video Edition

Secret Key Cryptography, Video Edition

English | MP4 | AVC 1280×720 | AAC 44KHz 2ch | 109 Lessons (16h 51m) | 2.56 GB

Explore the fascinating and rich world of Secret Key cryptography! This book provides practical methods for encrypting messages, an interesting and entertaining historical perspective, and an incredible collection of ciphers and codes—including 30 unbreakable methods.

In Secret Key Cryptography: Ciphers, from simple to unbreakable you will:

  • Measure the strength of your ciphers and learn how to guarantee their security
  • Construct and incorporate data-compression codes
  • Generate true random numbers in bulk
  • Construct huge primes and safe primes
  • Add an undetectable backdoor to a cipher
  • Defeat hypothetical ultracomputers that could be developed decades from now
  • Construct 30 unbreakable ciphers

Secret Key Cryptography gives you a toolbox of cryptographic techniques and Secret Key methods. The book’s simple, non-technical language is easy to understand and accessible for any reader, even without the advanced mathematics normally required for cryptography. You’ll learn how to create and solve ciphers, as well as how to measure their strength. As you go, you’ll explore both historic ciphers and groundbreaking new approaches—including a never-before-seen way to implement the uncrackable One-Time Pad algorithm.

Whoever you are, this book is for you! History buffs will love seeing the evolution of sophisticated cryptographic methods, hobbyists will get a gentle introduction to cryptography, and engineers and computer scientists will learn the principles of constructing secure ciphers. Even professional cryptographers will find a range of new methods and concepts never published before.

From the Roman empire’s Caesar cipher to the WWII Enigma machine, secret messages have influenced the course of history. Today, Secret Key cryptography is the backbone of all modern computing infrastructure. Properly designed, these algorithms are efficient and practical. Some are actually unbreakable, even using supercomputers or quantum technology!

Secret Key Cryptography teaches you how to create Secret Key ciphers, ranging from simple pen-and-paper methods to advanced techniques used in modern computer-based cryptography. It reveals both historic examples and current innovations. You’ll learn how to efficiently encrypt large files with fast stream ciphers, discover alternatives to AES encryption, and avoid strong-looking but weak ciphers. Simple language and fun-to-solve mini-ciphers make learning serious concepts easy and engaging.

What’s Inside

  • Construct 30 unbreakable ciphers
  • Measure the strength of your ciphers and guarantee their security
  • Add an undetectable backdoor to a cipher
  • Defeat hypothetical ultracomputers of the future
Table of Contents

1 Introduction
2 What is cryptography
3 Types of cryptography
4 Mechanical vs. digital
5 Why choose Secret Key
6 Preliminary concepts
7 Number bases
8 Prime numbers
9 Cryptographer’s toolbox
10 Transposition
11 Chained digit generator
12 Substitution ciphers
13 Simple substitution
14 Mixing the alphabet
15 Nomenclators
16 The Kasiski method
17 Index of Coincidence
18 Solving a polyalphabetic cipher
19 Solving a general polyalphabetic cipher
20 Running key
21 Simulated rotor machines
22 Three-rotor machine
23 Countermeasures
24 Interrupted key
25 Bigram and trigram substitution
26 Adding null bits
27 Transposition
28 Columnar transposition
29 Double columnar transposition
30 Key transposition Part 1
31 Key transposition Part 2
32 Jefferson Wheel Cypher
33 Ciphertext-only solution
34 Fractionation
35 Solving a Playfair cipher
36 Three Square
37 Bifid
38 Diagonal bifid
39 Rectangular grids
40 Cyclic 8×N
41 Variable-length fractionation
42 Periodic lengths
43 Post tag systems
44 Different-length tags
45 Text compression
46 Arithmetic coding
47 Adaptive arithmetic coding
48 Block ciphers
49 Double DES
50 Matrix multiplication
51 Fixed vs. keyed substitution
52 Involutory block cipher
53 Ripple ciphers
54 Block chaining
55 Chaining mode summary
56 Principles for secure encryption
57 Confusion
58 Correlation coefficient
59 Base-26 linearity
60 Base-256 linearity
61 Adding a backdoor
62 Condensed linearity
63 Constructing an S-box
64 Diffusion
65 Saturation Part 1
66 Saturation Part 2
67 Stream ciphers
68 Multiplicative congruential generator Part 1
69 Multiplicative congruential generator Part 2
70 Linear congruential generator
71 Chained addition generator
72 Mersenne Twister
73 Estimating the period
74 Combining generators Part 1
75 Combining generators Part 2
76 True random numbers
77 Refreshing the random bytes
78 Hash functions
79 One-time pad
80 Key supply
81 Diffie-Hellman key exchange
82 Constructing large primes, new Part 1
83 Constructing large primes, new Part 2
84 Matrix methods
85 Transposition matrix
86 Hill cipher, computer versions
87 Large integer multiplication
88 Solving a linear congruence
89 Laddering
90 Large integer ciphers
91 Multiplication modulo P
92 Rings
93 Matrices over a ring
94 Finding an invertible matrix
95 Three pass protocol
96 Discrete logarithm
97 Factoring
98 Matrix three pass protocol
99 Maximum order
100 Solving bilinear equations
101 Two-sided three pass protocol
102 Codes
103 Quantum computers
104 Error correction
105 Equations
106 Minimization
107 Ultracomputers
108 Ultrasubstitution cipher US-A
109 Epilogue

Homepage