Join Lisa Bock for an in-depth discussion in this video Challenge: Coding with the Enigma, part of Learning Cryptography and Network Security.
(upbeat music) … - [Instructor] I met this web page, … the Computer Museum of America … where it talks about the Enigma Machine. … I'll scroll down and you can read the story … about the Enigma, but what we want to do is take a look … at the Enigma Machine, I'll right click and view image. … And then once there, … I want to just point out a couple things. … Right up at the top, that's called the rotors … and we will be manipulating the rotors. … Then down below on the lower part, … which looks like a typewriter, … these are the stickers, which is the switchboard. … Now we're not going to do anything with the stickers … but let's see how this works. … We'll go to this webpage, the Enigma Machine simulator. … Now there are others, but I found this to be user-friendly. … Now, once I'm here, … we're going to manipulate what we call the rotors. … As you can see the plain text, … and what we're going to do is take this out … and I'm going to type password. … Now down below, as I manipulate the rotors …
Author
Released
1/4/2021Skill Level Beginner
Duration
Views
Related Courses
-
Introduction to Quantum Cryptography
with Jonathan Reichental32m 47s Intermediate -
Ethical Hacking: Cryptography
with Stephanie Domas1h 1m Intermediate
-
Introduction
-
Keeping information safe1m 9s
-
What you need to know1m 12s
-
-
1. Safeguarding the Network
-
Compare network attacks4m 49s
-
2. Dissecting Symmetric Encryption
-
Developing DES5m 18s
-
Work with AES5m 31s
-
3. Exploring Asymmetric Encryption
-
Using digital signatures1m 29s
-
Managing keys using PKI3m 38s
-
Navigating certificates4m 17s
-
4. Reviewing Hash Algorithms
-
Diving into hash algorithms4m 54s
-
Understanding passwords4m 4s
-
-
5. Applying Cryptography
-
Providing email privacy3m 11s
-
Safeguarding cryptography2m 40s
-
6. Securing the Internet Protocol
-
Conclusion
-
Next steps1m 30s
-
- Mark as unwatched
- Mark all as unwatched
Are you sure you want to mark all the videos in this course as unwatched?
This will not affect your course history, your reports, or your certificates of completion for this course.
CancelTake notes with your new membership!
Type in the entry box, then click Enter to save your note.
1:30Press on any video thumbnail to jump immediately to the timecode shown.
Notes are saved with you account but can also be exported as plain text, MS Word, PDF, Google Doc, or Evernote.
Share this video
Embed this video
Video: Challenge: Coding with the Enigma