Autoplay
Autocomplete
Previous Lesson
Complete and Continue
Embedded Systems Cryptography & Encryption
Welcome
Course Overview and Learning Objectives
Tools and Resources Needed
Overview of the NUCLEO-F411 Development Board (1:48)
Section summary
Imperative Of Encryption in Embedded Systems
The Case for Encryption in Embedded Devices (7:38)
Overview Of Security Features in STM32 (5:50)
Key Properties of Security (3:01)
Threat Analysis
Overview of the Main Threats (7:14)
Data Integrity in Embedded Systems (8:49)
Assets, Threats and Vulnerabilities (4:01)
The 4-Step Process Of Threat Analysis (3:03)
CaseStudy- Threat Analysis for a Smart Thermostat Device (6:04)
Setting Up
Downloading CubeIDE (2:34)
Getting the right Package and Setting Up the Project Tree (21:19)
Installing CubeIDE (2:38)
Testing the Project Setup (15:54)
Getting the Required Documentation (7:41)
Developing some System Drivers for Implementing Real World Examples
Programming: Enabling the Floating Point Unit (18:00)
Programming: Developing the UART Driver-Analyzing the Documentation (11:35)
Programming: Developing the UART Driver- Listing out the Steps (4:00)
Programming: Developing the UART Driver- Implementing the Init. Function (22:13)
Programming: Developing the UART Driver- Implementing the Write Function (5:39)
Programming: Developing the UART Driver- Testing (6:39)
Programming: Developing the System Timebase- Analyzing the Documentation (8:28)
Programming: Developing the System Timebase- Implementing the Init. Function (9:52)
Programming: Developing the System Timebase- Implementing other Functions (12:15)
Programmming: Developing the System Timebase-Testing (5:34)
Programming: Developing the System BSP- Listing out the Required Functions (7:55)
Programming: Developing the System BSP- Implementing the LED Driver (5:01)
Programming: Developing the System BSP- Implementing the Push Button Driver (4:00)
Programming: Developing the System BSP- Testing (3:35)
Programming: Developing the System ADC Driver-Analyzing the Documentation (5:21)
Programming: Developing the System ADC Driver- Listing out the Steps (5:27)
Programming: Developing the System ADC Driver- Implementing the Init. Function (13:21)
Programming: Developing the System ADC Driver- Implementing the ADC Read Function (14:05)
Foundational Concepts of Cryptography
Some Common Terms in Cryptography (3:28)
The Cipher (3:08)
The Ceasar Cipher
The Ceasar Cipher (8:26)
The ROT13 Cipher (2:57)
Programming: Updating the Workspace (2:39)
Programming: Developing the Ceasar Cipher Encryption Function (19:18)
Programming: Developing the Ceasar Cipher Decryption Function (9:11)
Programming: Encrypting and Decrypting Integers with Ceasar Cipher (22:06)
Programming: Cracking the Ceasar Cipher (13:54)
The MonoAlphabetic Cipher
The MonoAlphabetic Cipher (2:54)
Programming: Developing the MonoAlphabetic Cipher Encryption Function (12:04)
Programming: Developing the MonoAlphabetic Cipher Decryption Function (8:18)
The PolyAlphabetic Cipher
Understanding PolyAlphabetic Ciphers (5:33)
Programming: Developing the Vigenere Cipher Encryption Function (13:29)
Programming: Developing the Vigenere Cipher Decryption Function (16:32)
Programming: Improving the Vigenere Cipher (9:53)
The Multiplicative Cipher
The Multiplicative Cipher (5:22)
Programming: The Multiplicative Cipher Encryption Function (12:00)
Programming: The Multiplicative Cipher Decryption Function (9:17)
Developing a Host Application for Receiving and Decrypting Transmitted Data
Setting Up Python (6:37)
Setting Up VSCode (8:16)
Programming: Developing The Ceasar Cipher Encryption Algorithm in Python (9:48)
Programming: Developing The Ceasar Cipher Decryption Algorithm (6:56)
Programming: Testing the Ceasar Cipher (4:16)
Programming: Decrypting Communication Data from Firmware to Host (15:22)
Programming: Developing The Monoalphabetic Encryption Algorithm (3:58)
Programming: Developing The Monoalphabetic Decryption Algorithm (2:39)
Programming: Testing The Monoalphabetic Cipher (3:57)
Programming: Monoalphabetic Cipher- Decrypting Communication Data from Firmware to Host (11:02)
Course Update
Course Update
Teach online with
The MonoAlphabetic Cipher
Lesson content locked
If you're already enrolled,
you'll need to login
.
Enroll in Course to Unlock