THIS IS SO HELPFUL I am really grateful for your videos
@nizarealissa60786 ай бұрын
........This saved me ......i can finally comprehend things
@tsunningwah34718 ай бұрын
弓弓
@tsunningwah34716 ай бұрын
zhina
@tsunningwah34718 ай бұрын
月
@donaldciappara11 ай бұрын
I am impressed with the simplicity of this explanation, explaining such a complex subject. I have a query regarding the diagram shown at 10:17 of the video, it seems that the XOR function is not being well computed in the second set, 01 XOR 00 is not equal to 00. The error is rippling through the process. This is my interpretation, subject to correction.
on 1:22, according to WikiPedia, The key must be at least as long as the plaintext, not just exactly the same length as plaintext, en.wikipedia.org/wiki/One-time_pad#:~:text=The%20key%20must%20be%20at,according%20to%20Gregory%20Chaitin%20definition.
@aleksanderessex7328 Жыл бұрын
The important point here is that the encryption function consumes one bit of key material for one bit of plaintext. Could you generate a duodecillion random bits and then encrypt just one bit? Absolutely. But you still only consume one bit of key material. The rest is unused. What happens to this leftover? Now we get into the opsec headaches of the OTP...
@PetarHristov-z3e Жыл бұрын
Great video, much better than my university lectures about the topic.
@mihalachebogdan1 Жыл бұрын
Give this man his flowers for this video 😂💯 This is more than a hidden gem , im so happy i found this 🫡 Salute
@clueless_experimenter Жыл бұрын
This kinda answered my question of what a "cipher table" seen in en.wikipedia.org/wiki/Block_cipher_mode_of_operation#Counter_(CTR) ?
@RobertoAndradePerez Жыл бұрын
Awesome discussion! I’d love to hear an extended chat on the topics of liquid democracy / blockchain / decentralised voting mentioned at 3:18:49, as whenever Alex mentioned about the far future of voting it still felt very constrained to our current reality.
@CORAcsi2 жыл бұрын
Interesting video, though it constantly surprises me that no one has openly imagined the MUP (Multiple Use Pads) that I have designed. Yes, it is possible to create an OTP that is reusable. Sure, it should be called a modified Vigenère cipher, or Vigenère 2.0, however, I like MUP better. If you are curious, take a look; verifying that MUPs are indeed reusable isn't difficult; you can use one of these MUPs on innumerable messages and try to break it.
@es624762 жыл бұрын
One of the best explanation. Simple and understandable. I really appreciate your hard work.
@kennethaidoo3612 жыл бұрын
Kenneth was here :)
@universalponcho2 жыл бұрын
This is very well done. Thank you for your service.
@valeriewang14732 жыл бұрын
I like this reasoning perspective on why should we use this algorithm! this video definitely deserves more viewers
@MHamidAshraf2 жыл бұрын
Nicely explained. I am reading for CISSP exam and had the cryptoghraphic modes of symmetric cryptography. really helpful. thanks
@accumulator48252 жыл бұрын
Awesome video, thank you very much. God bless 🌄🌿
@abrarmahi2 жыл бұрын
OMG this is saving my grade in cryptography
@dsoni59822 жыл бұрын
Why 00 XOR 10 is 01 at 9:51 ? wouldn't it be 10?
@AP-qs2zf Жыл бұрын
exactly this guy is full of bs
@oluwatosinogunjobi62642 жыл бұрын
thank you for this video
@ΜαρίναΚοσκιδου2 жыл бұрын
that was very helpful! :)
@secwiser11732 жыл бұрын
Nice video! Take a look at the contents that I started producing about information security and cybersecurity in my channel!
@blowingupblocks2 жыл бұрын
thanks for the wonderful vid!
@KamiK4ze2 жыл бұрын
This is a really good video!
@KamiK4ze2 жыл бұрын
You should cover more cryptography topics!
@magueritemichima68182 жыл бұрын
very nice video and helpfull
@pjtrusci3 жыл бұрын
Appreciate it
@abreue51273 жыл бұрын
Congratulations! Thank you for the content!
@alibaba8883 жыл бұрын
Only 7090 views? This is a hidden gem. Excellent teaching. Simple and on point. Thank you
@HK-sw3vi3 жыл бұрын
well... now it's 7995 so yea
@clueless_experimenter Жыл бұрын
yes he is
@mihalachebogdan1 Жыл бұрын
As a CyberSec student i can definitely confirm this is definitely a big big hidden gem 😂 This man deserves his flowers for this
@mightyelon25833 жыл бұрын
Can somebody explain what was meant about ECB at kzbin.info/www/bejne/pYemdIuQm9WoY9k? ""Clearly you can win the eavesdropping game here quite easily. All you have to do is to create two different messages that contain structure that are larger than the ECB block length. ECB mode doesn't disrupt that larger scale structure." By the way, very helpful video with excellent examples. Thank you so much.
@aleksanderessex732811 ай бұрын
What I'm saying is that the cipher hides structure within a plaintext block, but, on its own, does not hide macro structure between blocks. For this, we need a better cipher mode of operation.
@StormChaos3 жыл бұрын
Why must Zoom continue to be used in classrooms? The university should know about the security flaws!
@caydengineer3 жыл бұрын
Looking forward to it Prof. Essex
@FreeDomSy-nk9ue3 жыл бұрын
Awesome stuff. Thank you
@bennettvanberlo38223 жыл бұрын
Excited to take this class! Thanks Dr. Essex!
@lordknepper45442 жыл бұрын
same
@gam__043 жыл бұрын
this video is so complicated 😧😧
@raquelbibi14363 жыл бұрын
Please make a video about number two factor authentication (twitter) I got so confused cause give me so many numbers
@midyaazad72153 жыл бұрын
amazing explanation.
@nutsandbolts133 жыл бұрын
Thanku for sharing knowledge to us.....do more videos sir...
@yannicklittek33143 жыл бұрын
MAC explanation at 12:35
@ShopperPlug3 жыл бұрын
would be nice which mode is best for which application.
@aleksanderessex73283 жыл бұрын
If you're rolling your own crypto, the answer is none of the above. If you're tuning your OpenSSL config, look at the kind of sites that get A+ on www.ssllabs.com/ssltest/
@ShopperPlug3 жыл бұрын
@@aleksanderessex7328 thank you for replying Alexander. I am actually going to roll on my own crypto server. Would it be alright if I made a KZbin video explaining my server system design and have you judge it? The reason why is because I’m not pleased with today’s standards, it’s just not safe enough.
@1UniverseGames3 жыл бұрын
Is it possible sir to show it in programming perspective like how it implemented. It will be helpful, also a bit of its Mathematical explanation
@aleksanderessex73283 жыл бұрын
Showing crypto from a programmatic perspective may do more harm than good because it might leave even the tiniest impression that coding one's own crypto is a good idea. With that disclaimer made, you may be interested in cryptopals.com
@mihalachebogdan1 Жыл бұрын
@@aleksanderessex7328 Yep , this is one of the first thing our cryptology professor told us not to do. 😂💯 Programming own ciphers or own cryptology is a very big mistake . One might think its very secure and no one could break into while an expert in the cryptanalysis field could attack it in under 10 minutes and own one's soul instantly.
@1UniverseGames3 жыл бұрын
Is it possible sir to show it in programming perspective like how it implemented. It will be helpful, also a bit of its Mathematical explanation
@1UniverseGames3 жыл бұрын
Is it possible sir to show it in programming perspective like how it implemented. It will be helpful, also a bit of its Mathematical explanation
@anitaweasel3 жыл бұрын
great work.
@MrMarkgyuro3 жыл бұрын
This was really helpful! Thank you!!
@1UniverseGames3 жыл бұрын
Is it possible to do a video with the coding and explain it! Thanks 😊
@maksudahossain84823 жыл бұрын
Excellent!
@lobaandrade30913 жыл бұрын
okay so i was pirating movies and later that day i wanted to look at my grades but then i got an error message while signing in saying an attacker changed something. edit: i just turned on cookies and it works now lol