This is lecture 2 of the computer security module 2012 at the University of Birmingham. It covers symmetric Key encryption and block cipher modes.
In this lecture we looked at some security protocols, including
o Alice and Bob notation
o Needham-Schroeder Public Key Protocol
Description of PKCS7 from Lecture 4 of the computer security module, Univ. of Birmingham 2012. The rest of the lecture involved a demo of encryption and keystore in Java, which was not record.
A description of hash functions and attacks on hashes.
First 16mins of Lecture 5, covering different access control models.
Lectures from the 2012 Computer Security Module at the University of Birmingham
More stuff from “Computer Security 2012 University of Birmingham”
Channels are a simple, beautiful way to showcase and watch videos. Browse more Channels.
TM + © 2015 Vimeo, LLC. All rights reserved.
Made with k in NYC.
Your content preferences apply to any Vimeo videos you view. Learn more about content preferences in our FAQ.