This is lecture 2 of the computer security module 2012 at the University of Birmingham. It covers symmetric Key encryption and block cipher modes.
In this lecture we looked at some security protocols, including
o Alice and Bob notation
o Needham-Schroeder Public Key Protocol
Description of PKCS7 from Lecture 4 of the computer security module, Univ. of Birmingham 2012. The rest of the lecture involved a demo of encryption and keystore in Java, which was not record.
A description of hash functions and attacks on hashes.
First 16mins of Lecture 5, covering different access control models.
Lectures from the 2012 Computer Security Module at the University of Birmingham
More stuff from “Computer Security 2012 University of Birmingham”
Heads up: the shoutbox will be retiring soon. It’s tired of working, and can’t wait to relax. You can still send a message to the channel owner, though!
Channels are a simple, beautiful way to showcase and watch videos. Browse more Channels.