I really wish I could have seen this before long time ago. I spent much time gathering information on the topic, what you give in this video is so logical on the content arrangement and easy to understand. I know it needs people have to be a real master to give a lesson that are easily absorbed. Greatest content I'v ever seen on network.. Thanks so much.
Being thorough and learning by experience tend to produce deeper understanding. Here, the questions and the answers are being presented. Learning on your own teaches you how to learn to ask the right questions to solve problems which embeds it deeper into your mind/memory. This is how it is for me anyway. Other people could be different. I like videos like this to recap on concepts but it would have been cool to have seen this years ago like a fire hydrant of knowledge to the brain that, while hard to recall/remember, will do so as you are learning the concepts at the pace of autodidact exploration.
HE IS STANFORD UNIVERSITY PROFESSOR AND GIVING US AROUND 17 HOUR LECTURE FOR FREEE THIS MAN IS GREAT GOD BLESS THE TEAM PROVINDIND THIS AWESOME COURSE FOR FREE
************************TIME STAMP*************************************** INTRODUCTION 0:00:00 Course Overview 0:10:34 what is Cryptography 0:26:26 History of Cryptography 0:45:16 Discrete Probability (Crash Course) ( part 1 ) 1:03:23 Discrete Probability (crash Course) (part 2) STREAM CIPHERS 1:17:13 information theoretic security and the one time pad 1:35:46 Stream Ciphers and pseudo random generators 1:55:34 Attacks on stream ciphers and the one time pad 2:18:48 Real-world stream ciphers 2:38:26 PRG Security Definitions 3:03:20 Semantic Security 3:18:51 Stream Ciphers are semantically Secure (optional) BLOCK CIPHERS 3:29:46 skip this lecture (repeated) 4:02:25 What are block ciphers 4:19:10 The Data Encryption Standard 4:41:09 Exhaustive Search Attacks 5:00:51 More attacks on block ciphers 5:16:54 The AES block cipher 5:30:28 Block ciphers from PRGs USING BLOCK CIPHERS 5:42:12 Review- PRPs and PRFs 5:53:43 Modes of operation- one time key 6:00:57 Security of many-time key 6:23:47 Modes of operation- many time key(CBC) 6:40:00 Modes of operation- many time key(CTR) MESSAGE INTEGRITY 6:49:20 Message Authentication Codes 7:04:36 MACs Based on PRFs 7:14:34 CBC-MAC and NMAC 7:34:15 MAC Padding 7:42:55 PMAC and the Carter-wegman MAC COLLISION RESISTANCE 7:58:21 Introduction 8:09:15 Generic birthday attack Course material ▶▶ drive.google.com/file/d/1FZVCZW4abso4iKR_e82EZvgDpsQUsHuP/view?usp=sharing Recommended Reading ▶▶The Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography amzn.to/3aCdFIV ▶▶The Code Breaker amzn.to/3dNEA6t If you realllly enjoy my content, you're welcome to support me and my channel with a small donation via PayPal Link to PayPal donation www.paypal.me/nerdslesson
Could some one explain the "perfect secrecy"? How OTP becomes "perfect secrecy" (1:34:30) if from 1:28:40 I understood that for perfect secrecy one with C and K can get different messages M0 or M1. But in OTP with C and K you always get the same M 🤯
till now watched 2 hours of video and i must say it is amazing! wow i want to become block chain developer so i thought why not start with cryptography course. Sir you are amazing!.
Wait predicting random bits quantaties... So 0 and 1 right? Like up and down? As in up spin and down spin of electrons. So this is basically the same process as predicting the spins of quantum particles. So cryptography is basically analogoues to quantum physics?
Hi thanks for this course, Just i have a note in 36:06 min we Know that : A-B-C-D...X-Y-Z 0-1-2-3...23-24-25 so for letter "w" in m,we should to move it the value that corresponds to the first letter in the Key "C",so we should be move the "w"twice,Then we have "y" in the cipher text.Please correct me if i'm wrong,i'm just a beginner,thank you
okay, so here is how i have found this quality channel: 1. install channel blocker browser extension 2. hide everything that is too basic or/and has too many views 3. hide and dislike everything unrelated to computer science 4. refresh youtube landing page and repeat 2 and 3 until you find it honestly, that's a little bit too much work to find something of value on youtube today. well, at least we can make sense of youtube algo and figure out how to find quality content
Totaly agree with you :) Though curious, what make you realise it's good quality content? (Instead of a bootcampish shorter hands on course for example)
Hey, just someone who is kinda inexperienced in cyber security yet, d'you think I should study cryptography as someone interested in this field? Just looking for genuine advice.
I am reading Katz and Lindell’s book on cryptography. Is this course based on it? I am already an hour and twenty minutes into it and it seems to be similar.
One question please when Alice and bob decide a key and they share that with each other then why attacker can see or deduct the key. Means if the key is send to each other it must be in there chat so attacker can easily read that. Can you please clear that
What do you mean by generally break codes? Isn't that literally whats the attacking side on cyber security's all about? And which codes btw? There are more than just crypto codes
I'm 3 min in and already he is teaching us incorrect material. When defining Data in Motion he states "HTTPS, the protocol is actually called SSL and sometimes called TLS..." are you kidding me? Paleeze, try to secure your data packets with SSL and see what happens! I'll give this guy another 15-20 min before running away! //UPDATE// 13 min in, I think this guy struggles with applying theory and concepts to their proper name. Now hes describing the use of private keys and digital signatures and anonymity and integrity... Yes asynchronous and PKI can be confusing, but, terminology are non-negotiable. Bottom Line: His content appears correct, his terminology is waaaaaay off. But, free is free, just know you have been warned! ...Can't watch this any longer
I really wish I could have seen this before long time ago. I spent much time gathering information on the topic, what you give in this video is so logical on the content arrangement and easy to understand. I know it needs people have to be a real master to give a lesson that are easily absorbed. Greatest content I'v ever seen on network.. Thanks so much.
Being thorough and learning by experience tend to produce deeper understanding. Here, the questions and the answers are being presented. Learning on your own teaches you how to learn to ask the right questions to solve problems which embeds it deeper into your mind/memory. This is how it is for me anyway. Other people could be different. I like videos like this to recap on concepts but it would have been cool to have seen this years ago like a fire hydrant of knowledge to the brain that, while hard to recall/remember, will do so as you are learning the concepts at the pace of autodidact exploration.
@@aethrya
What did your practical work consist of in the subject?
HE IS STANFORD UNIVERSITY PROFESSOR AND GIVING US AROUND 17 HOUR LECTURE FOR FREEE
THIS MAN IS GREAT GOD BLESS THE TEAM PROVINDIND THIS AWESOME COURSE FOR FREE
Fellow Vegan. I am so grateful for these videos!
************************TIME STAMP***************************************
INTRODUCTION
0:00:00 Course Overview
0:10:34 what is Cryptography
0:26:26 History of Cryptography
0:45:16 Discrete Probability (Crash Course) ( part 1 )
1:03:23 Discrete Probability (crash Course) (part 2)
STREAM CIPHERS
1:17:13 information theoretic security and the one time pad
1:35:46 Stream Ciphers and pseudo random generators
1:55:34 Attacks on stream ciphers and the one time pad
2:18:48 Real-world stream ciphers
2:38:26 PRG Security Definitions
3:03:20 Semantic Security
3:18:51 Stream Ciphers are semantically Secure (optional)
BLOCK CIPHERS
3:29:46 skip this lecture (repeated)
4:02:25 What are block ciphers
4:19:10 The Data Encryption Standard
4:41:09 Exhaustive Search Attacks
5:00:51 More attacks on block ciphers
5:16:54 The AES block cipher
5:30:28 Block ciphers from PRGs
USING BLOCK CIPHERS
5:42:12 Review- PRPs and PRFs
5:53:43 Modes of operation- one time key
6:00:57 Security of many-time key
6:23:47 Modes of operation- many time key(CBC)
6:40:00 Modes of operation- many time key(CTR)
MESSAGE INTEGRITY
6:49:20 Message Authentication Codes
7:04:36 MACs Based on PRFs
7:14:34 CBC-MAC and NMAC
7:34:15 MAC Padding
7:42:55 PMAC and the Carter-wegman MAC
COLLISION RESISTANCE
7:58:21 Introduction
8:09:15 Generic birthday attack
Course material
▶▶ drive.google.com/file/d/1FZVCZW4abso4iKR_e82EZvgDpsQUsHuP/view?usp=sharing
Recommended Reading
▶▶The Code Book: The Science of Secrecy from Ancient Egypt to Quantum Cryptography
amzn.to/3aCdFIV
▶▶The Code Breaker amzn.to/3dNEA6t
If you realllly enjoy my content, you're welcome to support me and my channel with a small donation via PayPal
Link to PayPal donation www.paypal.me/nerdslesson
Can you pin the timestamps. ...Thx
can i have your email address!?
Thank you so much for this 🙏. I'm really excited about the applications of cryptography, both present and future. Such a wonderful field of study!
stumbled upon this video while browsing vids for my class. This is an absolute GEM please keep uploading sir!
Thank you for this course! It's the best one I've found on the topic.
Awesome course - there is no excuse in America or the world for not knowing.. Everything is literally on the web.. and it is FREE... wow..
Could some one explain the "perfect secrecy"? How OTP becomes "perfect secrecy" (1:34:30) if from 1:28:40 I understood that for perfect secrecy one with C and K can get different messages M0 or M1. But in OTP with C and K you always get the same M 🤯
K at former timestamp referred to the random variable k
Wow I am so blessed to have found this amazing resource. THANK YOU!
till now watched 2 hours of video and i must say it is amazing! wow
i want to become block chain developer so i thought why not start with cryptography course.
Sir you are amazing!.
Did you finish it? Where are you now in the block chain learning? I too have the same goals you mentioned so I started with this video.
@@abhishekpal7291 no i have not finished it infact did not do do more than 2 hours, i will do after sometime.
@@paragggoyal1552 oh ok👍
same here but I'm learning this for cybersecurity and hacking
@@WtfAnupamsame
Thanks sir for giving valuable content
Thank you Nerd's lesson for this course.
Great information. Thanks for sharing with us your knowledge and experience on this topic. I liked the video and subscribed to the channel.
That was exactly what I'm looking for
Thanks a million!
Wait predicting random bits quantaties... So 0 and 1 right?
Like up and down?
As in up spin and down spin of electrons.
So this is basically the same process as predicting the spins of quantum particles.
So cryptography is basically analogoues to quantum physics?
@Nerd's lesson please share the material link because i am unable to access the previous one
This is awesome, I'm a software developer but looking to expand my knowledge and found this huge gold nugget!
Glad it was helpful!
@@Nerdslesson
200%! Thank you so much for very high quality content 😊
Hi thanks for this course,
Just i have a note in 36:06 min
we Know that :
A-B-C-D...X-Y-Z
0-1-2-3...23-24-25
so for letter "w" in m,we should to move it the value that corresponds to the first letter in the Key "C",so we should be move the "w"twice,Then we have "y" in the cipher text.Please correct me if i'm wrong,i'm just a beginner,thank you
yeah i was thinking same did you find it why he did so, is it correct ?
Finished this part and can say it was very smooth and easy to understand. Helped me a lot to catch up with my course (not Stanford)
oh wow. I wish i could say the same but you must have some background in this or programming.
@@marlak4203 why do you need a programming background to understand Cryptography?
@@WtfAnupam No i was asking if the person did.
Sorry, forgot to put the question mark on the end.
@@WtfAnupam you need to have a little bit of background to understand this course properly.
@@th3smurf692 noooooooooooo
kindly update the drive links to the course material as they are not working
Thanks for letting me know, the link has been updated :
drive.google.com/file/d/1Oy3Vr_aL0vaT1M9NOcPwJriHB512k42V/view?usp=sharing
kindly update the drive link for cryptography 2 also!@@Nerdslesson
Awesome 😎 🎻🎻🎻🎻🎻
Thank you ❤️
Thank you for putting this out into the world, you are doing an incredible service
Wonderful course by a great cryptanalist. Thnaks for sharing
okay, so here is how i have found this quality channel:
1. install channel blocker browser extension
2. hide everything that is too basic or/and has too many views
3. hide and dislike everything unrelated to computer science
4. refresh youtube landing page and repeat 2 and 3 until you find it
honestly, that's a little bit too much work to find something of value on youtube today.
well, at least we can make sense of youtube algo and figure out how to find quality content
Totaly agree with you :)
Though curious, what make you realise it's good quality content? (Instead of a bootcampish shorter hands on course for example)
We crackin the cicada 3301 with this one
Thank you for sharing that to us, very helpful
hi nerd. thnks for providing us such a knowledgeful content
Great lecture. Thanks a lot.
Hey, just someone who is kinda inexperienced in cyber security yet, d'you think I should study cryptography as someone interested in this field? Just looking for genuine advice.
Yes , I myself finished this couple of days ago and i didn't regret it.....
Hope it helps you out too🙃
I am reading Katz and Lindell’s book on cryptography. Is this course based on it? I am already an hour and twenty minutes into it and it seems to be similar.
Thanks for the reference!
isn't pr[] at 55:51 is 7/16 instead of 1/2?
Is a certain level of math knowledge assumed, or is it taught as part of this?
I just asked this question, I believe there's a discrete math part here...let's see...I just started....how far are you???
04:25:05 It's Xor Li-1 not Li
in 3:28:20, why does Adversary A output both m1 and m2?
Did you find an answer?
@@אהלןסהלן no ):
Great
Thank you so much 🙏
What math is required here? I studied math but did not graduate so I don't cover all math.
Good lesson 👏👌
2:42:28
How is #00(x) - n/4 calculated.?
Thank you, thank you, thank you!
great lecture
Thanks
Very helpful
if you dont mind can you record on higher quality. other than thata the vid is great. thanks pal
30 mins gone, it feels magical since I am not aware of inside details
Sir make one video on detail analysis of blockchain.plzz
Great Presentation
This course is awesome but only 12,000 views?
Hi , the link of the material course doesn't work
The link has been updated : drive.google.com/file/d/1Oy3Vr_aL0vaT1M9NOcPwJriHB512k42V/view?usp=sharing
@@Nerdslesson thank you so much
Thanks a lot
One question please when Alice and bob decide a key and they share that with each other then why attacker can see or deduct the key. Means if the key is send to each other it must be in there chat so attacker can easily read that. Can you please clear that
is cryptography helpful just to leanr how to generally break codes even if i dont care about cyber security?
no
What do you mean by generally break codes? Isn't that literally whats the attacking side on cyber security's all about?
And which codes btw? There are more than just crypto codes
where's the second part dude ?
What about the Math part.?
Is this course taught in 2021?
Google Link is broken, please fix 🙏🏻 Thanks for the video!
Can u upload blockchain videos again sir plssss
My good friend I just want you to know I am high as fuck right now and you my friend are a good man for helping me grasp an understanding in this.
same bro. high asf
sir, I have certain queries and doubts , can you please help me out ?!
Did you get your queries answered?
I'm 3 min in and already he is teaching us incorrect material. When defining Data in Motion he states "HTTPS, the protocol is actually called SSL and sometimes called TLS..." are you kidding me? Paleeze, try to secure your data packets with SSL and see what happens!
I'll give this guy another 15-20 min before running away!
//UPDATE//
13 min in, I think this guy struggles with applying theory and concepts to their proper name. Now hes describing the use of private keys and digital signatures and anonymity and integrity... Yes asynchronous and PKI can be confusing, but, terminology are non-negotiable.
Bottom Line: His content appears correct, his terminology is waaaaaay off. But, free is free, just know you have been warned!
...Can't watch this any longer
Just a time stamp for myself: 3:24:29
Did you manage to finish part 1 sara?🤔
@@אהלןסהלן I did
57:32
i hate new yotube ui on browser
👊😎
46:15
10:37 44:00
😅❤
Taylor Linda Martinez Scott Jones Christopher
Perez Sharon Brown Dorothy White Steven
Is this legit? Any CS major here?
yes it is
Dude is a Stanford lecturer, researcher, and Gödel prize winner. I don't think you can find a better source here.