Lesson 01: Introduction to Data Science
Taylor Gibson
Lesson 01: Introduction to Data Science
7:01
Lesson 29: BabyBlock
Taylor Gibson
Lesson 29: BabyBlock
19:14
Lesson 28: The ADFGVX cipher
Taylor Gibson
Lesson 28: The ADFGVX cipher
12:39
Lesson 27: Introduction to Block Ciphers
Taylor Gibson
Lesson 27: Introduction to Block Ciphers
10:06
Lesson 26: CSS Encryption
Taylor Gibson
Lesson 26: CSS Encryption
15:18
Lesson 25: LFSR Sum Stream Cipher
Taylor Gibson
Lesson 25: LFSR Sum Stream Cipher
17:58
Lesson 24: Known Plaintext Attack on LFSR
Taylor Gibson
Lesson 24: Known Plaintext Attack on LFSR
8:49
Lesson 22: Introduction to Stream Ciphers
Taylor Gibson
Lesson 22: Introduction to Stream Ciphers
14:12
Lesson 21: Character Encoding for Digital Communication
Taylor Gibson
Lesson 21: Character Encoding for Digital Communication
12:39
Lesson 20: Binary Operations
Taylor Gibson
Lesson 20: Binary Operations
12:56
Lesson 19: Positional Number Systems
Taylor Gibson
Lesson 19: Positional Number Systems
16:31
Lesson 18: Mechanical Cipher Machines
Taylor Gibson
Lesson 18: Mechanical Cipher Machines
20:27
Lesson 17: Index of Coincidence
Taylor Gibson
Lesson 17: Index of Coincidence
12:20
Lesson 16: The Kasiski Test
Taylor Gibson
Lesson 16: The Kasiski Test
12:58
Lesson 15: Autokey and One Time Pad
Taylor Gibson
Lesson 15: Autokey and One Time Pad
21:37
Lesson 14: The Vigènere Cipher
Taylor Gibson
Lesson 14: The Vigènere Cipher
8:20
Lesson 13: Tabula Recta
Taylor Gibson
Lesson 13: Tabula Recta
12:24
Lesson 12: Chi Squared Scoring
Taylor Gibson
Lesson 12: Chi Squared Scoring
13:21
Lesson 11: Lists and Bar Charts
Taylor Gibson
Lesson 11: Lists and Bar Charts
21:29
Lesson 10: Frequency Analysis
Taylor Gibson
Lesson 10: Frequency Analysis
14:02
Lesson 09: Introduction to Cryptanalysis
Taylor Gibson
Lesson 09: Introduction to Cryptanalysis
18:00
Lesson 08: Functions
Taylor Gibson
Lesson 08: Functions
17:05
Lesson 07: The Euclidean Algorithm
Taylor Gibson
Lesson 07: The Euclidean Algorithm
25:54
Lesson 06: Multiplicative Ciphers
Taylor Gibson
Lesson 06: Multiplicative Ciphers
17:51
Lesson 05: Loops for Ciphers
Taylor Gibson
Lesson 05: Loops for Ciphers
23:08
Lesson 04: Caesar Cipher
Taylor Gibson
Lesson 04: Caesar Cipher
14:30
Lesson 02: Intro to Python
Taylor Gibson
Lesson 02: Intro to Python
18:28
Lesson 03b: Python Strings
Taylor Gibson
Lesson 03b: Python Strings
13:32
Lesson 03a: The Railfence Cipher
Taylor Gibson
Lesson 03a: The Railfence Cipher
4:19
Lesson 01: Intro to Cryptography
Taylor Gibson
Lesson 01: Intro to Cryptography
13:46
Lesson 32: The RSA Algorithm
Taylor Gibson
Lesson 32: The RSA Algorithm
15:20
Lesson 31a: Cracking the KidRSA cipher
Taylor Gibson
Lesson 31a: Cracking the KidRSA cipher
12:57
Lesson 31: Introduction to Public Key Cryptography (KidRSA)
Taylor Gibson
Lesson 31: Introduction to Public Key Cryptography (KidRSA)
16:54
Lesson 30: The Key Exchange Problem
Taylor Gibson
Lesson 30: The Key Exchange Problem
14:11
Operations with Binary Numbers
Taylor Gibson
Operations with Binary Numbers
7:13
Representing Text as Binary
Taylor Gibson
Representing Text as Binary
11:04
Positional Number Systems
Taylor Gibson
Positional Number Systems
12:28
Determining Vigenère Keywords When You Know the Length
Taylor Gibson
Determining Vigenère Keywords When You Know the Length
5:13
Using the Index of Coincidence to Determine Vigenère Keyword Length
Taylor Gibson
Using the Index of Coincidence to Determine Vigenère Keyword Length
5:50
Kasiski Test
Taylor Gibson
Kasiski Test
10:56
Index of Coincidence
Taylor Gibson
Index of Coincidence
12:24
Programming the Tabula Recta
Taylor Gibson
Programming the Tabula Recta
8:47
The Autokey Cipher
Taylor Gibson
The Autokey Cipher
5:11
The Vigenère Cipher
Taylor Gibson
The Vigenère Cipher
6:27
The Tabula Recta
Taylor Gibson
The Tabula Recta
8:44
The Trithemius Cipher
Taylor Gibson
The Trithemius Cipher
5:16
Python Dictionaries
Taylor Gibson
Python Dictionaries
14:34
Chi-Squared Scoring
Taylor Gibson
Chi-Squared Scoring
10:45
Introduction to Frequency Analysis
Taylor Gibson
Introduction to Frequency Analysis
6:59
Intro to Cryptanalysis
Taylor Gibson
Intro to Cryptanalysis
3:48
Programming the text_block Function
Taylor Gibson
Programming the text_block Function
9:04
Programming the text_clean Function
Taylor Gibson
Programming the text_clean Function
9:04
Programming the Rail Fence cipher
Taylor Gibson
Programming the Rail Fence cipher
18:21
Multiplicative Cipher
Taylor Gibson
Multiplicative Cipher
11:30
Modular Arithmetic
Taylor Gibson
Modular Arithmetic
8:46
Caesar Cipher
Taylor Gibson
Caesar Cipher
4:04
Keyword Substitution Ciphers
Taylor Gibson
Keyword Substitution Ciphers
9:13
String Operations in Python
Taylor Gibson
String Operations in Python
9:30
Logging into NCSSM DataHub
Taylor Gibson
Logging into NCSSM DataHub
10:07
Atbash Cipher
Taylor Gibson
Atbash Cipher
1:34
Route Cipher
Taylor Gibson
Route Cipher
2:49
Rail Fence Ciphers
Taylor Gibson
Rail Fence Ciphers
4:18
Introduction to Cryptography
Taylor Gibson
Introduction to Cryptography
7:05
Miniterm 2018: Utah National Parks
Taylor Gibson
Miniterm 2018: Utah National Parks
7:05