Before I watched this video I had no idea how AES worked. Now I've watched it and still have no idea how it works.
@targ37_64 Жыл бұрын
Same goes for me
@cafeinst Жыл бұрын
AES works by mixing stuff up a lot.
@angeis76 Жыл бұрын
@@cafeinst😂ikr, it's hard for u to figure if aes mixes it up or u just too cool to think clearly
@NHA3031 Жыл бұрын
😂
@kevinwydler7305 Жыл бұрын
But that’s not because its not well explained, it’s just a topic that is difficult to understand
@Damian-lu8sx4 жыл бұрын
Computerphile and Numberphile are a blessing. I remember my math classes in college and we were taught different things about math but we were never told what they were used for. Now after seeing these videos I literally feel like I'd actually even enjoy learning maths. It makes sense because now I know why something is useful and when it may come in handy...
@Fullstackdev-2 жыл бұрын
i dint know Numberphile , l did need some motivation to study math... thanks
@necroowl39532 жыл бұрын
It's because this is also Nottingham University
@Felix-ve9hs5 жыл бұрын
I knew what AES is for over 8 years but today I learned how it works
@ziyarules4 жыл бұрын
That's exactly the same for me :) :P
@vertexpmed4 жыл бұрын
same.. lol. I felt like a bot using it for so long without knowing how it really works...
@arnabmondal11584 жыл бұрын
Same to you 😂
@dotaprorussian36795 жыл бұрын
I love his explanations but these videos give me the feeling that camera-man just randomly bursts in to Mikes office and asks him random questions.
@firezdog4 жыл бұрын
which is prob what happened
@fabitooopestana75414 жыл бұрын
in the first seconds of the video I thought it was a scene from The Office lol
@Bandalorian4 жыл бұрын
@@firezdog Lol totally what happened with the preprinted diagrams and all.
@hououinkyouma53723 жыл бұрын
LOL
@Tristoo3 жыл бұрын
how's that a bad thing?
@rot5275 жыл бұрын
There is an issue with the animation at 11:02. Matrix multiplication is not commutative, the matrix has to be multiplied from the left ( the shown multiplication is not even doable)
@silentkiller17535 жыл бұрын
Just came to write this
@JNCressey5 жыл бұрын
If you interpret the vector as a 1 dimensional tensor instead of a 4x1 matrix, the tensor contraction is at least defined for when the matrix is on either side, but still it's not commutative - you'd get a different vector than you're supposed to.
@pushdword5 жыл бұрын
yes, A*B!=B*A
@muhammadsiddiqui22445 жыл бұрын
I was writing the same comment and then saw yours. Yeah!!! this mistake is confusing.....
@MrSpikegee5 жыл бұрын
Yep, this matrix multiplication is not possible as written in the animation (4,1)*(4,4) is not correct + it was the right way around on the paper: (4,4)*(4,1) gives a (4,1) vector. Hopefully this will be fixed and re-uploaded.
@vernekarraghavendranagaraj86953 жыл бұрын
Absolutely love the way Mr. Pound teaches. Can listen for hours together. Waiting for many more such interesting videos.
@rabidbigdog2 жыл бұрын
Dr Pound.
@supdawg78115 жыл бұрын
Just a correction: the vector operand at 10:59 should be on the other side of the matrix. Matrix multiplication is undefined in the way you have it written because the sizes of the vector and the matrix don’t match.
@rastkomiocinovic5 жыл бұрын
Thank you for making these videos. I have been watching them for years, finding the algorithms fascinating and the explanations very easy. As a second year cs student I must say that watching this channel realy helps me now more than ever. Keep up the awesome work!
@DeshantaDevkota3 жыл бұрын
Hey computerphile, thanks to all of the team for sharing the enthusiasm of Computer Science with me and other students, it's easy to find the lectures boring so I come here often to get more insights and intuitions. Being here enables me to learn things casually.
@Grimlock19795 жыл бұрын
1:46 Drawing a 4 by 4 grid 101: 1. Draw a square (roughly) 2. Draw a vertical line through the middle. 3. Draw 2 more vertical lines through the middle of each half. 4. Draw a horizontal line through the middle. 5. Draw 2 more horizontal lines through the middle of each half.
@fox_the_apprentice4 жыл бұрын
6. Look at your grid and ask yourself how you screwed it up this bad.
@timshearer50923 жыл бұрын
I just want to say this is a great description of Galois fields in practical use. I learned it from textbooks way back when, and it was mind boggling.
I just talked a few hours ago with a colleague about how we could use this encription on an arduino to secure the data sent to a raspberry for a project (never used it before). And now you upload this... I need to use a mic detector in my classroom. Thanks for the explanation!
@knightshousegames5 жыл бұрын
"Captain, this vessel seems to be emitting a Galois Field. It has rendered our sensors completely inoperative."
@robinw775 жыл бұрын
"...our tensors..." surely? 🙈
@KumManish5 ай бұрын
He taught the nitty gritty, your way of teaching and breaking things up to chunks is just wow. Thankyou Man, you just won my heart. Watching this is 2024 makes sense 😄🚀
@fantazzmagazz91564 жыл бұрын
Dude! you're just a legend and so clear in your explanations! What I couldn't stop noticing is the scene you're filmed in. You sitting next to a white board is absolutely identical to watching The Office!
@Zerbey4 жыл бұрын
You're an excellent teacher, you took something very complicated and made it easy even for someone like myself who only has A level education in maths.
@dropcake5 жыл бұрын
I literally just learned this yesterday in my cryptography class. Great refresher Dr. Pound!
@rayanslimani56643 жыл бұрын
a lecture of 1.5 hours didn't understand it , just watched this video understood it in 14 min , TY you saved my semester .
@TobiasJarvelov5 жыл бұрын
Yes, been excited for more AES since the last video! Always love when you discuss cryptography on this channel.
@zombiegun713 жыл бұрын
This man is one of the most interesting people I have ever had the pleasure of listening to. Kudos!
@2Sor2Fig3 жыл бұрын
10:00 I judge the paper as more than worth it. I really appreciate your videos. Often they provide me with the inspiration for my work even when it has no direct bearing on the task at hand. I was reminded of this when you referenced Turing, because I remember watching the one on Turing operations and it making it easier for me to develop a pickle-based data storage for my app that was significantly faster [in terms of read and write times] than an SQLAlchemy-based solution. I've used the same DB in my last 3 Android apps and every time I initialize that git submodule, I say a little thank-you to Alan Turing and Computerphile for giving me the courage to try something more ambitious than a command-line tool or Django-site. Baie dankie, from Southern Africa.
@drgr33nUK5 жыл бұрын
1.5M subscribers! Great job guys :D
@vil9386 Жыл бұрын
Dr. Mike makes all the logics so charming and interesting. What a pleasure to listen to the logics through him!!
@wlockuz44672 жыл бұрын
Damn I can listen to him for hours, I know what is AES I have used it many times for development but I have never looked into how it actually works. Hands down the best video.
@santizdr11 ай бұрын
This is a blessing, couldnt be explained more clearly. Could we see an ElGamal cipher video please. Love you guys.
@dandan78845 жыл бұрын
itd be insane if he actually encrypted a message going to all of those steps not much was talked about the generation and usage of the key
@danieljensen26265 жыл бұрын
They have done other videos on key generation, presumably it just uses any of the other standards for that.
@nonav57635 жыл бұрын
All these keys and I can never find my own 🤔
@SirFancyPants215 жыл бұрын
There are vastly differing ways in which the keys are generated, but the purpose of the video is the algorithm utilizing a given 128bit key. I’m no expert upon the AES so I cannot explain exactly how the key is utilized, but I’m guessing that is what dictates the matrix chosen, the number of row swaps, things like that
@Megaranator5 жыл бұрын
@@SirFancyPants21 the key only matters for the XOR functions, where you add the round key
@JNCressey5 жыл бұрын
I think the key seeds the generation of a series of round keys using a method he says he explained in another video, and the round key is just "added" to the block after each round. (And "add" in this field means XOR)
@michaelpound98915 жыл бұрын
As mathematicians will have noticed, during the mix columns animation the vector goes on the right, it's correct on the paper. Fabulous animations though as always Sean ;)
@synt4xphc8325 жыл бұрын
Dr. Mike rocking! Best Man for teaching things with Humor! I just want to know everything he knows ._.
@MongiNTS3YT5 жыл бұрын
OMG we just ended the semester and AES was covered in one of my modules! Wish i had this video a while back...Thanks for the upload though :)
@dehartyz5 жыл бұрын
Very well explained. Thank you so much for taking the time to record and post this!
@fatiharmin13013 жыл бұрын
You can tell this stuff makes him very happy. I have no clue how this works after watching this, but I'm happy for him. 🤷🏾♀️
@karolbomba67045 жыл бұрын
Great job on explaining it guys! Thank you for making these for free!
@josephkokenge40224 жыл бұрын
The interview part looks like The Office lol
@Derbauer5 жыл бұрын
i spent around 5 minutes furiously scrolling through computerphile videos trying to find "how aes works" because it was in the end of the previous video, and i couldnt find it so was a bit puzzled. I found other encryption content, but not this video. Turns out this one is uploaded AFTER the last video recommending it 👍😁
@Computerphile5 жыл бұрын
If a video is 'coming soon' I'll generally put 'coming soon' next to its title in the video description (which nobody ever reads) (in the interests of clarity, I try then to update the video description (which nobody ever reads) once the forthcoming video goes live)- HTH :) Sean
@Derbauer5 жыл бұрын
@@Computerphile And the videos you produce are a breath of fresh air, and i hope to see more content from Dr Mike Pound. Really you should make videos with him atleast each month, i dont care what the topic is, its sheer joy watching content featuring him.
@cnp2z3fyz2zuag85 жыл бұрын
Was hoping this would come out
@mgerber595 жыл бұрын
Just last week I gave a presentation on how AES works and now this video is coming out. Anyway, I liked the video and can confirm that what he was talking about is correct :)
@ЮхновськийНазарійАй бұрын
Thank you guys, your explanation is really helpful here, since it wasn't clear how all of this essentially works.
@KangoV4 жыл бұрын
Great video. I'm shocked that they still have music rule paper! Gives me nightmares of the IBM band printers I used to have to deal with on a S/38 :)
@IsYitzach Жыл бұрын
I implemented AES and RSA in C++. AES is about 800 lines. RSA is about 300 lines. The thing that makes AES fast is that its bitshifts and bitwise xors. The 2 things that make RSA slow is mod exponentiation and prime number testing. Prime number test is an O(1) problem as you only do it once. So if you have a key pair, don't throw it out of you can avoid it. The mod exponentiation has to be done repeatedly and on large numbers that aren't native to machine code, numbers that are can get up to 4kbits longs.
@katczinsky5 жыл бұрын
Woow I was thinking of this TODAY and this vid comes out ! Plus its Mike Pound
@TheHamoodz5 жыл бұрын
Just before my security exam, thanks!!
@DarkussJerry15975 жыл бұрын
This is the only channel on KZbin which I have the notifications turned on. Love computerphile 😍
@deep.space.122 жыл бұрын
The most secure feature when it comes to the AES standard is its matrix being column-major.
@Slickjitz4 жыл бұрын
FYI the CNSA has recommended organizations stop using AES-128 as of January 2016 in their Algorithm Suite and Quantum Computing FAQ. If possible you should implement AES-256 to better secure from Grover’s algo
@jurgentreep5 жыл бұрын
this video is a lot better than the last video I watched
@jeremymcclellan4743 жыл бұрын
Best explanation I've found so far. Thank you.
@zaid.12714 жыл бұрын
Idk y but this guy is fun to watch. Like ik some of these concepts and he just makes me understand them more
@garybuttherissilent5896 Жыл бұрын
My professor Joan Daemen co-invented this cipher, really cool to be taught by one of the best!
@noir3712 жыл бұрын
How does this one guy know such a ridiculous amount about all this stuff, honestly really impressive
@__cm__3 жыл бұрын
this guy is a genius at so many different topics !
@1337GameDev5 жыл бұрын
8:01 - No byte can become itself? Wasn't that the CRUX of how the enigma machine was defeated?
@SillyMakesVids5 жыл бұрын
The Enigma machine didn't do permutation.
@y__h5 жыл бұрын
That's fine for an S-box where you expect non-linear elationship of bits. In fact you don't want some bytes to be mapped to themselves as that introduced a fixed point into the cipher construction.
@1337GameDev5 жыл бұрын
@@SillyMakesVids True, but it did substitution... which was what I was referring too. Not saying this is a vulnerability of AES, but just curious why they didn't let same substitutions as the input
@dingo1375 жыл бұрын
That's only for a part of AES's internal operation. With Enigma, a byte of the input couldn't give an identical byte as the output - which means you immediately know something about the plaintext for any ciphertext. That's not true for AES.
@g2g5915 жыл бұрын
With enigma there was a one to one output. For each encryption one letter of the message got mapped to a specific letter of the output. That's how in combination with knowing a letter can't be itself they tore it apart
@wouldyoudomeakindnes4 жыл бұрын
this is amazing i always wanted to learn the mechanics about AES
@georgelza5 жыл бұрын
wow, funky, nice to learn how ASE works, and also love Dr Mike's presentation style. G
@efp7224 жыл бұрын
as a cyber security student... this was as informative as it was confusing lol
@efp7224 жыл бұрын
that is to say I learned a lot from this video but I am leaving with just as many new questions as I had coming in.
@user-cx2bk6pm2f3 жыл бұрын
The guy is a Brit of the classical sense from another generation. Love it.
@DavidRTribble11 ай бұрын
8:29 The AES designers could also have done rotations within the 4x4 grid (e.g., b0 shifts to b1, b4 to b0, b3 to b7, etc.), which is just a 4x4 cell permutation, but they didn't.
@Vivian-swim3 жыл бұрын
these videos are amazing and very helpful but please do consider to put subtitles as there are a lot of people who do watch them and are from other couintries. English subtitles would be amazing!!!thanks
@ajnikurtaj27825 жыл бұрын
Keep doing these types of videos, I love them!
@dd95164 жыл бұрын
A separate video on the MDS matrix, with full example, would be nice. Haven't seen a clear example yet.
@philipmrch83265 жыл бұрын
I've been waiting for this one!!
@HieuNguyen-ty7vw3 жыл бұрын
Thanks prof. Can you explain about the Authentication tag using in AES GCM? What is the different between GCM tag and authentication tag? Thank you
@ishitajhunjhunwala38384 жыл бұрын
Brilliant explanation. A very helpful video for beginners who wish to learn the AES algorithm.
@TheReligiousAtheists4 жыл бұрын
When Computerphile is more math-oriented than Sixty Symbols...
@Celrador4 жыл бұрын
As long as it doesn't overtake Numberphile we're still in the green. :)
@qm3ster2 жыл бұрын
This is shockingly close to a cypher I designed knowing nothing, except instead of an intelligently designed S-box I generated unique lookup tables for each round using Fisher-Yates on a secure PRNG seeded with the key. (And that was the only way the key was used, there was no key XOR step).
@ArleiOliveira2 жыл бұрын
Thank you for this amazing video about AES...congrats
@tomas59703 жыл бұрын
Wow, this is beautifully explained!
@xureality5 жыл бұрын
0:55 Let's put it this way: Google is using 128 bit keys for your everything you kept on Google, right now. It's probably secure enough. And so does Reddit, Facebook, Github, And Twitch. Wikipedia however is using 256 bits. Out of curiosity I went ahead and checked the top ten American banks according to Wikipedia, and all of them except Chase and Bank of America (at 128 bits each) currently uses 256 bits on their home page.
@Tukan4355 жыл бұрын
Very interesting video! Thanks for the insights.
@skunfiltered96725 жыл бұрын
Just in time for my exam in a couple hours !!
@skunfiltered96725 жыл бұрын
Also great barnet
@benjaminbrady23855 жыл бұрын
11:01 that's some incorrect linear alge🅱️ruh right there
@zaramomadi55694 жыл бұрын
I can't stop laughing at this
@eric_aic Жыл бұрын
When the plaintext block length is 128, the number of iteration rounds is 10. When the plaintext block length is 192, the number of iteration rounds is 12. When the plaintext packet length is 256, the number of iterations is 14
@TheMR-777 Жыл бұрын
8:30 Why is it called Shifting the Rows? As, it's a Row Rotation instead.
@robertboran62345 жыл бұрын
Could you please add another video about the Key Schedule process ? Because for every round we need to use a different subKey that is created during the Key Schedule process. This is important for a full picture of the algorithm.
@ehudv92764 жыл бұрын
Amazing. Very well explained. thank you for expanding my knowledge!
@muhammadhassan30584 жыл бұрын
You are great sir the way of explanation is very nice thanks sir ☺️ for AES explanation
@apathfinding9294 Жыл бұрын
My professor invented this and is teaching me security right now :)
@DAVIDGREGORYKERR2 жыл бұрын
AMD and INTEL have the AESNI instructions which are AESKEYGENASSIST,AESENC,AESENCLAST,AESDEC,AESDECLAST,AESIMC,PXOR and PCLMULQDQ and make use of the 128 data busses that are part of processors in the INTEL AND AMD ranges,therefore there are no side channel attack vectors, actually the AMD A10-7800k (Kavari) can make use of the AESNI instructions so can run bitlocker very quickly.
@Zahlenteufel15 жыл бұрын
Great, you've adapted to my curriculum :) perfect.
@mgdecodes87463 жыл бұрын
Absolutely great way to share, great job!
@evelynmisaki24284 жыл бұрын
I prefer twofish. AES has many more troubling mathematical issues shall we say. Its not broken by any means, but twofish is far less far along the pipeline to becoming broken. I initially didn't want to detail what these were due to the time it'd take, but considering the only response was to say shut up instead of to do any research or anything, I decided to detail them in the responses bellow if anyone is interested. I also talk about other Ciphers used by other countries (as some countries like Japan have their own standards of cipher and rely on them over AES) and how these compare to AES.
@nine16904 жыл бұрын
@Fajitahmed/videos You lack a strong chin Achmed, might wanna sit out of this one. Evelyn, you don't make a lot of sense. You say AES is "broken" but cite nothing. Both Twofish and AES are impossibly secure, and while Twofish is arguably more secure it's also a lot slower. More rounds mean more time spent decrypting and encrypting, especially nowadays where AES is standardized on CPUs while Twofish is not.
@lukor-tech5 жыл бұрын
Hell yes! Two in a row!
@chriswysocki88165 жыл бұрын
Hello. Can you explain the difference between AES and Twofish? I believe that Twofish was the runner up in the competition to select the standard encryption algorithm back in 1999 (I think)
@everyhandletaken4 жыл бұрын
I was lost after plain text... but fascinating nonetheless. Kudos to all the commenters here with such amazing knowledge, such valuable minds you have. I will just stick to iOS calculator app for my math needs.
@MeisterJager903 жыл бұрын
“Does this ever go wrong?” [nervous grin] “How so?” [tugs at collar] 😂🤣😂🤣
@JJ-Streaming3 жыл бұрын
Can you explain the iv? (Initialisation vector) and why having a unique iv helps?
@prashantkumar29634 жыл бұрын
Spiderman explains AES!
@Jojoxxr5 жыл бұрын
++++ my IQ jumps every time I watch any of your videos!
@adedejiemmanuel14 жыл бұрын
Thanks for this lesson. I have a question, what cipher mode is applicable in the AES encryption? By cipher mode, I meant something like ECB, CBC, CTM, GCM, etc.
@franatrturcech84844 жыл бұрын
i think the ones most used are GCM and CTR, as they are the most secure, sometimes u might find CBC. other modes, such as CFB, EBC or OFB are usable, but not believed to be secure
@joeybf5 жыл бұрын
5:10 correction: there is no finite field with just 10 elements. 8, 9 and 11 are possible but not 10. (In general only powers of primes are possible)
@fetchstixRHD5 жыл бұрын
I was about to ask this, I was thinking "wait, is that possible or am I being slow today?"
@JNCressey5 жыл бұрын
Well, he said between 0 and 10. Sounds like 11 elements to me. 🙂
@fetchstixRHD5 жыл бұрын
@@JNCressey: Ah, yes, you're right. Sounds like time for me to get some food...
@MrKrabs-xf2tr3 жыл бұрын
Matrix Multiplication isn't commutative and the operation shown in the animation in undefined since it's 4x1 times 4x4 rather than 4x4 x 4x1
@douglasheld5 жыл бұрын
07:52 I think it is ironic that the lack of self-substitution was the downfall of Enigma, but in AES it is a "feature"!
@franatrturcech84843 жыл бұрын
Enigma didn't do permutation (still in aes when going through all the rounds of course a byte can become itself)
@harirao12345 Жыл бұрын
Awesome explanation! Thank you!
@OliverQueen-yu3ly5 жыл бұрын
I wish you released this in April before my exams
@BlackFalconElectronics5 жыл бұрын
Biggest fan guys! Keep up the great work!!
5 жыл бұрын
This is the first time I feel empty-handed after a Computerphile video . I really didn't understand what's going on
@sibongisenisimon21033 жыл бұрын
me2
@neilthomas25494 жыл бұрын
In the Galois Field, multiplication and inverse are not opposites, multiplication by n and multiplication by inverse of n are
@mohamedghacham76762 жыл бұрын
You just compressed a 3 hour lecture into 15 minutes for me
@JustinEltoft5 жыл бұрын
Dr Mike Pound for president of space. Get him and Hank Green hooked up to explain how everything will be ok
@janisstolzenwald83123 ай бұрын
Love this video, thanks! You said that in some stages the bits are x-ored with the key. How can this operation be undone during deciphering given its not bijective?
@janisstolzenwald83123 ай бұрын
Just found the answer to my own question: if the key is known, then XOR can be inverted of course.