Search results “Cryptool rsa demonstration ideas”
File Decryption RSA AES with Known PIN Code using CrypTool
Décryptage de fichier "crypt_file.hex" (RSA-512) avec l'outil CrypTool (ver 1.4.31 beta.05 en) Outils utilisés: - CrypTool (CrypTool 1.4.31 Beta 05 - English version) lien: www.cryptool.org/en/download-ct1-en - Fichier crypté: http://bit.ly/T0MeYS (juste un exemple simple) - Camtasia Studio (pour faire ce vidéo) Contact: Mail: [email protected] Site Web: www.freewaysclub.org
Views: 8583 MAK Khaldi
Delphi - RSA-1024 Encryption
Delphi - RSA-1024 Encryption In this episode, we will be showing you how you can generate and use RSA 1024 Keys in Delphi to encrypt text with a public key and decrypt your text with the private key. Blog / Source code Download http://jugoo.co.uk/2018/03/delphi-rsa-1024-encryption-example-video-lockbox3/ So we will start off with a pre-made RSA unit and the Rad studios Delphi add-on LockBox3, This will be a great example for beginners and hobbyist coders from all ages from kids to adults, with the simplified pre-made units the easy to use function can be understood by anyone.
[Java] Demo DES & RSA Encryption
Demo DES & RSA Encryption Download: https://www.mediafire.com/?cgttoub06vp9c2b JRE 7: http://www.oracle.com/technetwork/java/javase/downloads/java-se-jre-7-download-432155.html Contact me by email: [email protected] or https://www.facebook.com/all4u1089
Views: 2054 Xuân Thành Phạm
Uninstall RSA-1024 encrypt Quickly With Effective Instructions
This video deserves to be watched out thoroughly since it includes working instructions regarding the complete removal of RSA-1024 encrypt from the PC. You might also like paying visit here - http://www.cleaningpcvirus.com/how-to-delete-rsa-1024-encrypt-restore-encrypted-system-files
Views: 1754 CPV Team
Simple Encryption Tool Demo
A quick demo of a tool for encrypting a message with a monoalphabetic substitution cipher, for use with a number theory class that will involve the basics of encryption.
Views: 157 David Metzler
Experiment 11 - JCrypTool
Just watch the shit. CREDITS - AKILESH SAMA
Views: 1108 John Vector
If you find our videos helpful you can support us by buying something from amazon. https://www.amazon.com/?tag=wiki-audio-20 CrypTool CrypTool is an open source e-learning tool illustrating cryptographic and cryptanalytic concepts.CrypTool implements more than 300 algorithms. =======Image-Copyright-Info======== License: Creative Commons Attribution-Share Alike 2.5 (CC BY-SA 2.5) LicenseLink: http://creativecommons.org/licenses/by-sa/2.5 Author-Info: JohSpaeth Image Source: https://en.wikipedia.org/wiki/File:Ct_1.4.30_en.png =======Image-Copyright-Info======== -Video is targeted to blind users Attribution: Article text available under CC-BY-SA image source in video https://www.youtube.com/watch?v=WMtawXD2-WI
Views: 178 WikiAudio
Application Algorithme RSA
Application Algorithme RSA
Views: 134 abdelhek ensaad
How to Explain Post-Quantum Cryptography to a Middle School Student - Klaus Schmeh at 44CON 2018
One of the hottest topics in current crypto research is Post-Quantum Cryptography. This branch of cryptography addresses asymmetric crypto systems that are not prone to quantum computers. Virtually all asymmetric crypto systems currently in use (Diffie-Hellman, RSA, DSA, and Elliptic Curve Crypto Systems) are not Post-Quantum. They will be useless, once advanced quantum computers will be available. Quantum computer technology has made considerable progress in recent years, with major organisations, like Google, NSA, and NASA, investing in it. Post-Quantum Cryptography uses advanced mathematical concepts. Even if one knows the basics of current asymmetric cryptography (integer factorisation, discrete logarithms, …), Post-Quantum algorithms are hard to understand. The goal of this presentation is to explain Post-Quantum Cryptography in a way that is comprehensible for non-mathematicians. Five families of crypto systems (as good as all known Post-Quantum algorithms belong to these) will be introduced: Lattice-based systems: The concept of lattice-based asymmetric encryption will be explained with a two-dimensional grid (real-world implementations use 250 dimensions and more). Some lattice-based ciphers (e.g., New Hope) make use of the Learning with Error (LWE) concept. I will demonstrate LWE encryption in a way that is understandable to somebody who knows Gaussian elimination (this is taught at middle school). Other lattice-based systems (especially NTRU) use truncated polynomials, which I will also explain in a simple way. Code-based systems: McEliece and a few other asymmetric ciphers are based on error correction codes. While teaching the whole McEliece algorithm might be too complex for a 44CON presentation, it is certainly possible to explain error correction codes and the main McEliece fundamentals. Non-commutative systems: There are nice ways to explain non-commutative groups and the crypto systems based on these, using everyday-life examples. Especially, twisting a Rubik’s Cube and plaiting a braid are easy-to-understand group operations a crypto system can be built on. Multivariate systems: Multivariate crypto can be explained to somebody who knows Gaussian elimination. Hash-based signatures: If properly explained, Hash-based signatures are easier to understand than any other asymmetric crypto scheme. I will explain these systems with cartoons, drawings, photographs, a Rubik’s Cube and other items. In addition, I will give a short introduction to quantum computers and the current Post-Quantum Crypto Competition (organised by US authority NIST). For more from 44CON and tickets visit 44CON Website: https://44con.com ---=== Contact ===--- YouTube: https://youtube.com/c/44contv Website: https://44con.com Twitter: https://twitter.com/44con LinkedIn: https://www.linkedin.com/groups/44Con-3886577 Facebook: https://www.facebook.com/44CON ---=== Music Credits ===--- Island - by MBB: https://soundcloud.com/mbbofficial (https://twitter.com/mbbmusic) Grind - by Andrew Huang - YouTube Music Library
Cryptool 2: Substitution mit Häufigkeitsanalyse entschlüsseln
Anhand eines Beispieltext wird ein Angriff auf einen monoalphabetisch verschlüsselten Text ausgeführt. Es wird die Häufigkeitsanalyse benutzt, gemischt mit einem Wörterbuchangriff.
Views: 758 Sylvia Lange
[M19] Cryptography - CrypTool
HERE IT IS POSSIBLE TO DOWNLOAD SOFTWARE https://yadi.sk/d/1sOY9jmY3NGmaK It is possible andhttps://mega.nz/#F!1yQUwaZb!AP7PVj0sZgJKiDrvo2ZHog Help can also be obtained on http://ouo.io/1aFvc All information topic here Visual c ++ redistributable required to work. http://ouo.io/5QNKbH
Views: 42 Myra Kapustin
Implement RSA Algorithm in VB.NET 2013
RSA (Rivest, Shamir, Adleman), Developed in 1977 Source Code Here: https://github.com/gomanajah/RSA
Views: 178 Goma Najah
Demonstrate RSA Encrypt and Decrypt Tool C#
I written this small and simple tool RSA encrypt and decrypt for learn purpose. Read more about how to create it on my blog: https://minhthuongeh.wordpress.com/2018/01/07/cong-cu-ma-hoa-rsa-don-gian/ Author: Vo Tinh Thuong Email: [email protected] Blog: https://minhthuongeh.wordpress.com Web: https://votinhthuong.net
Views: 93 Vo Tinh Thuong
DES Encryption using OpenSSL
Screencast of performing DES encryption using OpenSSL on Ubuntu Linux. Commands/files user: openssl, /dev/urandom, xxd. Created by Steven Gordon on 27 January 2012 at Sirindhorn International Institute of Technology, Thammasat University, Thailand.
Views: 15254 Steven Gordon
AES Rijndael Cipher - Visualization
A video of flash animation of the cipher used for AES encryption process. Disclaimer: I did the work of creating video from flash animation. Credit of flash animation goes to its author. At the moment, I do not have a link to the source for flash animation.
Views: 116691 AAA
RSA-1024 File Virus Ransomware Removal
This video will show you how to remove RSA-1024 File Virus Ransomware from you computer. If you still need help we have a detailed guide to help you with all the steps: https://howtoremove.guide/rsa-1024-encryption-virus-ransomware-removal/ RSA-1024 algorithm
Views: 275 HowToRemove.guide
Crypto Complete Video Success Story
http://www.LinomaSoftware.com/Crypto Interview with Giuliano Franciscovic with National Telewire (http://www.telewire.com/) at the COMMON User's Conference in Anaheim about his experience with Linoma Software's encryption tool, Crypto Complete. For more information, visit http://www.LinomaSoftware.com.
Views: 128 LinomaSoftware
decryption https RSA
Views: 257 Eric Xu
Autentificacion RSA
Views: 60 Jose Gonzalez
Encrypt, Decrypt, Shred Your Files with EasyKrypt Data Protection Software
http://www.easykrypt.com The EasyKrypt software application makes it easy to encrypt, decrypt or shred your files by simply dragging them to the appropriate hot-spot. Be safe. Be smart. With advanced data protection from EasyKrypt.
Views: 160 EasyKrypt
Animation of RIJNDEAL CIPHER : AES Encryption algorithm
This animation is made by Mr. Enrique Zabala. This is verison 4 made for CrypTool. This video is made for students so that they can donwload it and can learn this algorithm.
Views: 14295 HowTo
Public Key Cryptography: Diffie-Hellman Key Exchange (short version)
This is a segment of this full video: https://www.youtube.com/watch?v=YEBfamv-_do Diffie-Hellman key exchange was one of the earliest practical implementations of key exchange within the field of cryptography. It relies on the discrete logarithm problem. This test clip will be part of the final chapter of Gambling with Secrets!
Views: 453928 Art of the Problem
How To Encrypt Decrypt Text Using Cryptographic Web Tool
this video is created for http://cryptool.shareme.in/
Views: 1395 OmniMobile2011
Python Tutorial: PyCrypto AES Encryption/Decryption
In this tutorial I will show you the most basic encryption/decryption program for AES (Advanced Encryption Standard) using PyCrypto and Python 3. Check out my website at www.thepyportal.com for my blog, source code, tutorials, and references. Oh and don't forget the lonely Like button up there!
Views: 26798 Zach King
Windows 10 RSA
Views: 5254 zub zer0
Crypto Lab:  Hashing
Lab here: http://asecuritysite.com/crypto
Views: 2920 Bill Buchanan OBE
installation of jcrypt tool part 1
A video showing how to install Jcrypt tool , which is the lab exercise for diploma computer science final year students , watch , like, subscribe and wait for more video...
How do I remove BitCrypt2 virus and Recover Files
Have been attacked with bitcrypt2 / BitCrypt v2.0 (bug fixed) virus? Computer infected with a new version of bitcrypt called bitcrypt v2.0 ? All your files have been encrypted by BitCrypt 2 virus? What is BitCrypt2 file? BitCrypt2 is a new version of BitCrypt, a new ransomware which encrypted all pictures on the machine it infected, and asked the user to pay a ransom to get the files back. This BitCrypt2 virus leaves the following message on the infected computers : BitCrypt v2.0 (bug fixed) English Attention!!! Your BitCrypt ID: WIN-xxx-8741xxx All necessary files on your PC ( photos, documents, data bases and other) were encoded with a unique RSA-1024 key. Decoding of your files is only possible by a special programm that is unique for each BitCrypt ID. Specialists from computer repair services and anti-virus labs won't be able to help you. In order to receive the program decryptor you need to follow this link http:// www.bitcrypt.cc and read the instructions. If current link doesn't work but you need to restore files please follow the directions: 1. Try to open link kphijmuo2x5expag.tor2web.com. If you failed proceed to step 2. 2. Download and install tor browser http:// www.torproject.org/projects/torbrowser.html. 3. After installation, start tor browser and put in the following address kphijmuo2x5expag.onion Remember, the faster you act the more chances to recover your files undamaged. How to remove BitCrypt2 virus? How to how to "decrypt" files encrypted by BitCrypt 2 virus? Step1: Reboot your computer into Safe Mode. Step2: Follow the video, good luck for you :) More help at:http://blog.teesupport.com/how-to-remove-uninstall-bitcrypt/ Watch More virus removal videos at:https://www.youtube.com/user/MrRemoveVirus
Views: 15943 Mr. RemoveVirus
Use Java program to generate a 1024-bit RSA keypair(使用Java產生1024-bit的RSA金鑰對 )
http://anwendeng.blogspot.tw/2014/10/java1024-bitrsa.html 使用Java產生1024-bit的RSA金鑰對,用到BigInteger, SecureRandom等Class
Views: 1343 An-Wen Deng
OpenSSL Tutorials #4: RSA key Creation and Encryption/Decryption
This show how to cipher a plain text and how to decipher the crypted text
Views: 6542 Openssl
RSA Algorithm concept and Example
Enroll to Full Course: https://goo.gl/liK0Oq Networks#4: The video explains the RSA Algorithm (public key encryption) Concept and Example along with the steps to generate the public and private keys. The video also provides a simple example on how to calculate the keys and how to encrypt and decrypt the messages. For more, visit http://www.EngineeringMentor.com. FaceBook: https://www.facebook.com/EngineeringMentor. Twitter: https://www.twitter.com/Engi_Mentor
Views: 165622 Skill Gurukul
[M19] Cryptography - Hash Calc
Next http://youtu.be/VTVRV03bPAk = Summary below = Module 01 - Phases of Penetration Testing * The 5 Phases of Penetration Testing http://youtu.be/uQrrSMXAujM Module 02 - Footprinting * Introduction http://youtu.be/8buGxgHxGnw * Whiteboard http://youtu.be/bw1CBD2GkKM * AnyWho http://youtu.be/G7mC3q07jek * nsLookup http://youtu.be/tRh0ngHXLZA * Path Analyzer Pro http://youtu.be/rIKNapdyoMQ * Ping http://youtu.be/wJDuOjnr2AM Module 03 - Scanning * Introduction http://youtu.be/w7QnSUGs10w * Whiteboard http://youtu.be/yxwQ8Ejsi7c * DNS Enumeration http://youtu.be/fvtPz7oa79E * DNS Overview and Zone Transfers http://youtu.be/oIptO0B6tlw * hPing3 http://youtu.be/KKRXf0gONAk * nikTo http://youtu.be/QWl5IQpjPYU * Performing a nMap scan http://youtu.be/zc5m0I6vpeA * Web Data Extraction http://youtu.be/9w-TXWQ-GFY Module 04 - Enumeration * Introduction http://youtu.be/CzRZOInKWMs * Whiteboard http://youtu.be/zinRkzQs2lY * GetAcct http://youtu.be/YzYAt3gvFcE * nbtStat http://youtu.be/NkafHmFqRPk * netDiscover http://youtu.be/A4REMvk5cYY * NetUse http://youtu.be/8ID7kXPmXjs * Null Session http://youtu.be/5i21VwUv1zI * Password List http://youtu.be/PWA1EZoeFqM * PsTools http://youtu.be/etM-YhlelDs * smbClient http://youtu.be/3sQVLSAf2Ls * SuperScan http://youtu.be/VXggfeAnh4U Module 05 - System Hacking * Introduction http://youtu.be/97Pnidm0mSk * Whiteboard http://youtu.be/AMUNiwqX19Y * ADS Spy http://youtu.be/E1l3JEmuPqA * How is Alternate Data Stream used to hack http://youtu.be/p_U8TrR1AK4 * Link Control Protocol http://youtu.be/aqz9NGElW04 * pwdump http://youtu.be/MjTMFS0TdfI * sethC http://youtu.be/RbdjED-cQOk * snow http://youtu.be/aCaH5zvs6XI * x.exe http://youtu.be/YWezjrEhv-E Module 06 - Trojans * Introduction http://youtu.be/y0tHtnZIUYQ * Whiteboard http://youtu.be/0UZOcgZOHUg * fPort http://youtu.be/fUO6V1wMHyY * ICMPserv http://youtu.be/-LpMonzRZ88 * MD5 http://youtu.be/qWC6NuKItLs * netStat http://youtu.be/In6cwOAvnH4 * PRCView http://youtu.be/GACOCDLKQcw * TcpView http://youtu.be/IWVjTORNE7E * Tini http://youtu.be/wQ4AGVFKjGU Module 07 - Viruses & Worms * Introduction http://youtu.be/8kgxoe_A-zQ * Whiteboard http://youtu.be/cK8-Tm_81mQ * bintext 1/2 http://youtu.be/3nCNEzaopB0 * bintext 2/2 http://youtu.be/_gYiRGg7sPY * DelME http://youtu.be/akbO89YwsrU * Internet Worm Maker Thing http://youtu.be/oCri9EbPpLA * JPS http://youtu.be/ynrO3QmsT_o Module 08 - Sniffing Traffic * Introduction http://youtu.be/HQYip9pFkcw * Whiteboard http://youtu.be/qLsH-NaiCVk * Driftnet http://youtu.be/6jV0uYZJSfg * macof http://youtu.be/xGrzcxObF64 * SMAC http://youtu.be/a5BFng9xy-E * tshark http://youtu.be/fNf80veMjVI * urlsnarf http://youtu.be/5DC22if9faE * WebSpy http://youtu.be/-CkSEnrUmbM Module 09 - Social Engineering * Introduction http://youtu.be/axV6WCTWyNs * Whiteboard http://youtu.be/JlcUMfvPti8 Module 10 - Denial of Service * Introduction http://youtu.be/5N-_F28tnig * Whiteboard http://youtu.be/eOUwOQdMp3U * hping3 http://youtu.be/K4_Ag-CgfEM * LOIC http://youtu.be/DPDwd5Ay2d4 Module 11 - Session Hijacking * Introduction http://youtu.be/MKGYTQsIPWs * Whiteboard http://youtu.be/qQtf3amzwJM * Ferret http://youtu.be/NiZlmTLgaLw * Hamster http://youtu.be/yx_jDMqdB10 Module 12 - Hacking Web Servers * Introduction http://youtu.be/cqB7rpBAal8 * Whiteboard http://youtu.be/m94oP96q3rE * dirbuster http://youtu.be/2tOQC68hAcQ * WPScan http://youtu.be/p6k3ozYY-NM Module 13 - Web Applications * Introduction http://youtu.be/t6jJTKqreE0 * Whiteboard http://youtu.be/5VSVKIEnEE8 * burpSuite http://youtu.be/rh2pvWcsLIY * HTTPRecon http://youtu.be/xBBHtS-dwsM * IDServe http://youtu.be/7qb9p_Hs6wo * nikTo http://youtu.be/xOliB8koo9I * VirusTotal http://youtu.be/3q5xYX_EhHE * wget http://youtu.be/kCmUipDn-Uc Module 14 - SQL Injection * Introduction http://youtu.be/9uwG0SEfd94 * Whiteboard http://youtu.be/PmRKHTSpWS8 * BlindElephant http://youtu.be/gzVdMd6l_js * phpID http://youtu.be/uZdHDNXMQkE * sqlmap http://youtu.be/SfpmPxMyJLA Module 15 - Wireless * Introduction http://youtu.be/QtMeTVNmeM4 * Whiteboard http://youtu.be/fbWWnRkuAnw * airodump-ng http://youtu.be/98bFAqzGfdI * airomon http://youtu.be/dNqIybLB0Q0 * Kismet http://youtu.be/Qvd0Hh6FQPM Module 16 - Mobile Hacking * Introduction http://youtu.be/VMoIGWXNhow * Whiteboard http://youtu.be/Ms3q3Qi2kBQ Module 17 - IDS, Firewalls & Honeypots * Introduction http://youtu.be/7oaagKAvu4U * Whiteboard http://youtu.be/WOw6hbX7jlk Module 18 - Buffer Overflows * Introduction http://youtu.be/3TW_XAJbxdI * Whiteboard http://youtu.be/YjSmGTYv4WY * make, compile, run http://youtu.be/aT3OPCBJSTM * stack http://youtu.be/0jQHKtJc_uI Module 19 - Cryptography * Core Principles of Cryptography http://youtu.be/guCfp2tI704 * Whiteboard http://youtu.be/tmoHJbghBoQ * Advanced Encryption Package http://youtu.be/08ZvcjDUf20 * CrypTool http://youtu.be/kH8UY7f2TQM * Hash Calc http://youtu.be/qDxGoRuVQwk * HashMyFiles http://youtu.be/VTVRV03bPAk Source http://bit.ly/1J6jhd1
Views: 1589 Nicolas Quenault
Encryption and Decryption using Soft Cleaner Safe
Encryption and decryption process using Soft Cleaner Safe, detailed short video. Encrypt any file with data protection. Encrypt with a direct password or encrypt with the Same PC. http://www.softcleaner.in/safe
Views: 162 satheeshsoft
Rc4 Basics Presentation (2)
Full Video Details: http://www.securitytube.net/video/79
Views: 26793 TheSecurityTube
AES Coding tutorial
Hey! In this tutorial i will show you how to code an AES Encryption service. This is very easy and also easier than MD5 coding. AES is also more safe, you know why? Because other MD5 decrpyptors cannot decrypt AES encryption! The ''AES ENC' encryption service is also developed by me but i dont show how to make that, its private. I only show how to use it. Link to AES ENC will come soon... also link to VDH-SOFT - AES will come soon... p.s. Want a security system on your website or encryption services CONTACT ME! Contact: Website: www.vdh-soft.zxq.net E-mail 1: [email protected] E-mail 2:[email protected]
aes crypt
Views: 793 TechnicalAnswers
Easily Encrypt and Decrypt any selected text with a password using secure AES Algorithm
Please watch: "IPv6 and Multiuser Lab showing wan connection using cisco packet tracer" https://www.youtube.com/watch?v=qq9r_A94lh4 -~-~~-~~~-~~-~- Easily Encrypt and Decrypt any selected text with a password using secure AES Algorithm.You just have to select an encrypted or unencrypted text in your web browser and encrypt decrypt it using just a righ click.Encryption decryption is also available on cryptfire.com.
Views: 253 slashrootdotin
Rc4 Simulation Using C
Full Video Details: http://www.securitytube.net/video/39
Views: 6584 TheSecurityTube
Tutoriel Crypté et Décrypté des fichiers avec "FileWall" [Tuto|Fr|1080p|60FPS]
Télécharger FileWall : http://goo.gl/z6VjdV ou http://goo.gl/eAAaoN -Télécharger Winrar (Pas obligatoire) : -(x32) : http://goo.gl/S9J9Tv -(x64) : http://goo.gl/G0sTu2 Information : FileWall facilite le cryptage/décryptage des fichiers. Il utilise, par défaut, un algorithme de cryptage AES 128 bits. Pour crypter/décrypter un fichier rien de plus simple : effectuez un clic droit, sélectionnez FileWall puis "Encryption". Il ne vous reste plus qu'à saisir un mot de passe et à le confirmer. Format : Portable (.ZIP) Langue : Anglais Poid : 2.87 Mo Configuration minimale : Windows XP/Vista/7/8/8.1 ----------------------------------------- -► Le Cryptage AES c'est quoi ? : http://goo.gl/cfBlTE -► Partenaire : http://formadeo.tv/ -► Facebook : http://goo.gl/pG0oH9
Views: 7831 Max Tutoriel
利用密碼學教學軟體模擬Vernam OTP
密碼學教學軟體cryptool 2安裝後,簡易測試模擬完美無法破解的Vernam密碼 OTP (One-Time Pad)單次密碼本http://anwendeng.blogspot.tw/2015/10/vernam-otp.html
Views: 544 An-Wen Deng
Email encryption_0003.wmv
Encrypt Gmail using GPG4WIN & Firefox FireGPG plugin. The versions are little out of date, but you can figure out.........I find a good help at: www.instructables.com/id/Encrypt-your-Gmail-Email/
Views: 1289 QuaziDozan
How to decrypt Nemucod Trojan's .CRYPTED Ransomware
How to decrypt Nemucod Trojan's .CRYPTED Ransomware Bleeping computer: https://www.bleepingcomputer.com/news/security/decryptor-released-for-the-nemucod-trojans-crypted-ransomware/
Views: 6027 Joeteck
DES   Visualization
Views: 172 thalitana
Elliptic Curve Cryptography Tutorial - Understanding ECC through the Diffie-Hellman Key Exchange
Learn more advanced front-end and full-stack development at: https://www.fullstackacademy.com Elliptic Curve Cryptography (ECC) is a type of public key cryptography that relies on the math of both elliptic curves as well as number theory. This technique can be used to create smaller, faster, and more efficient cryptographic keys. In this Elliptic Curve Cryptography tutorial, we build off of the Diffie-Hellman encryption scheme and show how we can change the Diffie-Hellman procedure with elliptic curve equations. Watch this video to learn: - The basics of Elliptic Curve Cryptography - Why Elliptic Curve Cryptography is an important trend - A comparison between Elliptic Curve Cryptography and the Diffie-Hellman Key Exchange
Views: 26163 Fullstack Academy
AES Rijndael Cipher explained as a Flash animation
Many years ago I came across a clickable flash animation that explained how the Rijndael cipher works. And even though Rijndael is pure, complex math, the animated visualizations made the whole process so crystal clear that I had to bend down to the floor afterwards to pick up my dropped jaw. Since then I know how powerful animated visualizations can be, even (or rather especially) for abstract and/or complex topics. When I started my Go blog, I knew I had to use animations because they are worth a thousand words. I did the same in my Go videos that you can find over here in my channel, and also in my Go course. This video is a recoding of the flash animation while I click through it. The flash animation is still available at formaestudio.com (link below), but no sane browser would agree to play any flash content anymore, so a video capture is the best we can get. I hope the pace of clicking through the steps is just right for you. NOTE: The video has no audio part. This is not a bug, the Flash animation simply had no sounds. The Rijndael Animation (and another Flash program called Rijndael Inspector): http://www.formaestudio.com/rijndaelinspector/ (c) Enrique Zabala. License terms: "Both these programs are free of use." (I guess that publishing a video of the animation is covered by these terms.) My blog: https://appliedgo.net My course: https://appliedgo.com/p/mastergo
Views: 46865 AppliedGo