Thư viện An ninh - Bảo mật
-
Nghiên cứu cho thấy rằng DES đã được sử dụng rộng rãi trong các ứng dụng bảo mật, tuy nhiên khả năng bị tấn công bởi các kỹ thuật tấn công hiện đại đã khiến cho thuật toán này trở nên lỗi thời và không còn đảm bảo tính bảo mật cao trong các ứng dụng hiện đại. Để cải thiện tính bảo mật của DES, các thuật toán mã hóa khác như Triple DES, Blowfish và AES đã được phát triển.
7p
vijiraiya
19-05-2025
2
1
Download
-
Lecture Cryptography: Cryptography Applications (Part 2) explores modern applications of cryptography in blockchain systems. It covers secure transactions, consensus mechanisms, and network architecture. This lecture illustrates how cryptography underpins the security and trust of decentralized platforms. Please refer to the lecture for more details!
46p
hoatrongguong03
15-05-2025
2
1
Download
-
Lecture Cryptography: Cryptography Applications (Part 1) introduces real-world applications of cryptographic principles in authentication, key negotiation, and secure protocols. Topics include SSL/TLS, IPSec, SSH, and Kerberos. The lecture emphasizes practical implementation in networks and systems. Please refer to the lecture for more details!
62p
hoatrongguong03
15-05-2025
1
1
Download
-
Lecture Cryptography: Authentication (Part 3) continues the exploration of message authentication and hash functions. The lecture reinforces key cryptographic tools to prevent tampering and verify message legitimacy. It provides practical perspectives on implementing secure communications. Please refer to the lecture for more details!
32p
hoatrongguong03
15-05-2025
1
1
Download
-
Lecture Cryptography: Authentication (Part 2) continues with hash functions and message authentication codes. The lecture highlights how cryptographic hashes play a role in verifying data integrity and origin. It also presents practical tools used to ensure authenticity in digital communications. Please refer to the lecture for more details!
36p
hoatrongguong03
15-05-2025
1
1
Download
-
Lecture Cryptography: Authentication (Part 1) introduces digital signature concepts and signature schemes including ElGamal and Schnorr methods. It explores motivations for authentication and standard practices in digital identity verification. This lecture emphasizes the role of trust and integrity in communication. Please refer to the lecture for more details!
47p
hoatrongguong03
15-05-2025
1
1
Download
-
Lecture Cryptography: Asymmetric Ciphers (Part 3) extends into advanced asymmetric systems, including logarithm-based encryption and elliptic curve cryptography. It also introduces quantum-resistant algorithms, emphasizing future-oriented cryptographic security. This lecture highlights ongoing innovations in public-key systems. Please refer to the lecture for more details!
42p
hoatrongguong03
15-05-2025
1
1
Download
-
Lecture Cryptography: Modern Asymmetric Ciphers (Part 2) introduces core public-key algorithms such as the ElGamal cipher and Diffie-Hellman key exchange. These methods are critical for secure communication in decentralized environments. The lecture emphasizes their mathematical foundations and security properties. Please refer to the lecture for more details!
22p
hoatrongguong03
15-05-2025
1
1
Download
-
Lecture Cryptography: Modern Asymmetric Ciphers (Part 1) transitions to asymmetric cryptography, offering a review of stream ciphers, DES, and AES. The lecture sets the groundwork for more complex public-key cryptography systems. It also touches on potential enhancements like dynamic AES. Please refer to the lecture for more details!
44p
hoatrongguong03
15-05-2025
3
1
Download
-
Lecture Cryptography: Modern Symmetric Ciphers (Part 2) delves into the Advanced Encryption Standard (AES) and modes of operation. The lecture explains how AES improves upon previous methods and introduces multiple techniques for secure encryption processing. It also examines how data can be handled in different cipher modes. Please refer to the lecture for more details!
74p
hoatrongguong03
15-05-2025
1
1
Download