Exploiting the Tiltman Break - Computerphile

  Рет қаралды 255,102

Computerphile

Computerphile

Күн бұрын

Professor Brailsford returns to the subject of why Colossus was built.
The professor's notes:
www.eprg.org/computerphile/lor...
Bletchley Park Playlist: • Bletchley Park (Coloss...
Professor Brailsford used the book "Colossus" by B. Jack Copeland and others (Oxford University Press, 2006). Also recommended are chapters 18 and 19 from : "The Bletchley Park Codebreakers" by R. Erskine and M. Smith (eds.) Biteback Publishing 2011
/ computerphile
/ computer_phile
This video was filmed and edited by Sean Riley.
Computer Science at the University of Nottingham: bit.ly/nottscomputer
Computerphile is a sister project to Brady Haran's Numberphile. More at www.bradyharan.com

Пікірлер: 201
@edwardtait4285
@edwardtait4285 5 жыл бұрын
Professor Brailsford never "stutters." He is a great storyteller. Thank you!
@ronniebasak96
@ronniebasak96 3 жыл бұрын
Aka David Attenborough of computer science
@edwardtait4285
@edwardtait4285 3 жыл бұрын
@@ronniebasak96 Each to their own and well spoken, on both counts!
@PplsChampion
@PplsChampion 5 жыл бұрын
10:43 i love that prof Brailsford has a stack of oldschool perforated printer paper for scratch paper
@MCPhssthpok
@MCPhssthpok 5 жыл бұрын
I looked at the thumbnail and immediately thought "That's tunny traffic, must be a Professor Brailsford video!"
@leocomerford
@leocomerford 5 жыл бұрын
Now there's traffic analysis for you!
@Justin-TPG
@Justin-TPG 5 жыл бұрын
Let’s have a video on Prof. Brailsford exploiting the Amen Break next ;)
@PandoraMakesGames
@PandoraMakesGames 5 жыл бұрын
Professor Brailsford is always great!
@crystalsoulslayer
@crystalsoulslayer 5 жыл бұрын
I barely understand the subject matter most of the time, but what I do understand is fascinating. And he delivers it so well!
@PandoraMakesGames
@PandoraMakesGames 5 жыл бұрын
True, he inspires me to make videos myself.
@cmelton6796
@cmelton6796 4 жыл бұрын
You know things just got real when Prof. Brailsford says "Oh dear! Calamity."
@stevensexton5801
@stevensexton5801 5 жыл бұрын
I worked on teletypes in the Army in the '80. "The quick brown fox jumps over the lazy dog" was a staple in debugging the machines. The newest one I worked on was a UGC-74. Thanks for the trip back in time!
@toddkes5890
@toddkes5890 Жыл бұрын
Go with a modern version - "sphinx of black quartz, judge my vow"
@raykent3211
@raykent3211 5 жыл бұрын
Great video! A commentor on an unrelated video wanted to buy gear wheels with a simple integer ratio and wondered why he couldn't find 16 to 32 teeth, but rather 16 to 31. Someone else replied that it spreads the wear. Now I know that it's because they are relatively prime, giving the maximum number of turns before the same pair of teeth meet again. Of course integer ratios are needed in some apps, but it's, well, interesting anyway.
@donaldasayers
@donaldasayers 5 жыл бұрын
Great for gearboxes, but useless for clocks where you need exact ratios.
@mal2ksc
@mal2ksc 5 жыл бұрын
Sometimes those exact ratios are fairly large (three digit) prime numbers, such as 223, as in the case of the Antikythera mechanism.
@donaldasayers
@donaldasayers 5 жыл бұрын
Or Clocks with sidereal dials.
@woodywoodlstein9519
@woodywoodlstein9519 5 жыл бұрын
Fascinating
@woodywoodlstein9519
@woodywoodlstein9519 5 жыл бұрын
Mal-2 KSC thx for me mentioning that device. I’d never heard of it.
@7177YT
@7177YT 4 жыл бұрын
I could listen to this man for hours. More please! (:
@tocsa120ls
@tocsa120ls 5 жыл бұрын
Bletchley is absolutely worth the days time and I even got a yearly admission for the price of a day ticket. Very cool. Check the opening times first, as the National Museum of Computing (which you will want to see) is not open all day, just the Colossus exhibition. Even got a peek at the Bombe project.
@Lawofimprobability
@Lawofimprobability 2 жыл бұрын
This video finally explained to me why prime numbers are cared about in cryptography. I hadn't thought that all the code-wheels moved at the same time so didn't think about the dangers of non-primes presenting patterns.
@aaron_11111
@aaron_11111 5 жыл бұрын
Another excellent video featuring professor Brailsford. Thank you!
@parttroll1
@parttroll1 5 жыл бұрын
Always love Prof Brailsford's videos on the WWII code breaking at BP. Can't wait for the next installment
@HanggliderDelta
@HanggliderDelta 5 жыл бұрын
Another interesting video spiced by Prof. Brailsford enthusiastic personality. Wonderful and thanks for it.
@JVerschueren
@JVerschueren 5 жыл бұрын
During my national service, I used Telex connections which had a similar sort of encryption scheme as described early in the video for the connection only. It used a tape which one had to load monthly, which had seeds on it for a pseudo random generator in the encrypter. Each day, at a set time per line, one would call the operator at the other end and advance the machines together, passing a short message back and forth to verify the machines were in sync. They would then spit out the previous day's seed, which we had to destroy. Secret, but not extremely sensitive information would be sent as clear text across these secure connections, while the real secrets were sent as seperately encrypted text.
@Mekchanoid
@Mekchanoid 2 жыл бұрын
Fascinating and engagingly told. Thank you so much!
@GaryBickford
@GaryBickford 5 жыл бұрын
This great video suddenly gave me to wonder about the people in Germany and elsewhere who were designing and building these systems. We’ve seen many videos about the amazing processes and people at Bletchley Park, but I’ve never seen anything about the also-rather-amazing work on the other side. We’ve seen lots of information on other German (and less so Japanese) science and tech, such as rockets and tanks, but nothing on the “codemakers”.
@SpenserRoger
@SpenserRoger 5 жыл бұрын
Gary Bickford Did you google it?
@shaneirwin9461
@shaneirwin9461 5 жыл бұрын
Part of 'Operation Paperclip' maybe. These were scientists, rocket designers and engineers that the Americans 'poached' from Germany after the war to work for America. They were given a free pass, no trials and citizenship...no questions asked.
@josephwong2832
@josephwong2832 4 жыл бұрын
What an epic story!! I love how this guy just remembered that long string just like that
@bigmoe-specialtylandservic6106
@bigmoe-specialtylandservic6106 3 жыл бұрын
Incredibly easy to understand explanation of a complex topic. Thank you!!!
@Raazor2232
@Raazor2232 Жыл бұрын
I love Professor Brailsford. I could listen to him yarn all day.
@simontay4851
@simontay4851 5 жыл бұрын
Bill tut was indeed a genius. My head would've exploded trying to decrypt these messages.
@polares8187
@polares8187 5 жыл бұрын
Excellent and very informative video. Love the professor
@GrumpyGrebo
@GrumpyGrebo 5 жыл бұрын
You sir are a legend. Great lesson
@brian554xx
@brian554xx 5 жыл бұрын
Love these decryption videos!
@RWBHere
@RWBHere 5 жыл бұрын
Having binge-watched a selection of these, I'm now on a cliff-hanger for the next video..l Thanks! ;-)
@brianmessemer2973
@brianmessemer2973 4 жыл бұрын
SAME 👍
@JavierSalcedoC
@JavierSalcedoC 5 жыл бұрын
Oh dear, what a wonderful video
@davidwilkie9551
@davidwilkie9551 5 жыл бұрын
The concept of co-primes.., at last I understand something about Chemistry and Bonding/wave-packaging, that was not previously obvious, because it's the inclusion/exclusion quantum boundary of common denominator resonance modulation, (-> Spinfoam bubble relative size-positioning in Totality). Brilliant stuff, thank you all.
@richardsinger01
@richardsinger01 4 жыл бұрын
David Wilkie you have lost me there - what is the connection with bonding?
@hkchandana
@hkchandana 2 жыл бұрын
Very nicely explained. Thank you very much.
@JMDinOKC
@JMDinOKC 3 жыл бұрын
He reminds me of my Uncle Phil, who fancied himself quite the raconteur; except that Professor Brailsford actually is one.
@rv6502
@rv6502 5 жыл бұрын
Bet once the code was cracked the Axis side weren't so zmug.
@qwertyasdf66
@qwertyasdf66 5 жыл бұрын
We only ever hear about these things through the stories of the allies reverse-engineering them. We never hear the stories of the germans designing them. We just have speculations about what the designers were/weren't thinking. And I think that's really sad. I like the excitement of figuring it out, but I also like confirmation.
@jellyboy00
@jellyboy00 5 жыл бұрын
13:33 we do the same thing while learning fourier transform finding period of signal produced by adding up two (or more) sine wave We find the LCM of period of all sine wave.
@Yaxqb
@Yaxqb 5 жыл бұрын
24:28 when he says "can you imagine setting up all of these teeth" and points at the cartoon fish👌
@grn1
@grn1 2 жыл бұрын
A few minutes in and I just realized that the effectively 1 data line from USB 2.0 gets XORed. I just watched a video (I think by Ben Eater) about USB keyboards (and how they compare with PS/2 keyboards). In that video he explained that the USB standard (or at least the USB 2.0 standard) has 2 data lines and no dedicated clock line. The two lines normally send opposite signals, this helps with data redundancy and creates destructive interference in the EM produced by the cables so as to eliminate most of the EM emissions. As such USB 2.0 effectively has only one data line (there are a couple special states). This one data line doesn't just send it's data as 1's and 0's though, instead it's a 1 if the state changes and a 0 if it doesn't (or maybe the other way around). In any case what this means is that the previous input is effectively XORed with the current input to determine the actual value (apparently this is more reliable at higher speeds than just sending the data directly).
@superscatboy
@superscatboy 5 жыл бұрын
I could watch Prof B all day.
@meme-hj5rs
@meme-hj5rs 5 жыл бұрын
the answer to life is 42 not 41 :) . Great video , great passion from him explaining this
@davidgillies620
@davidgillies620 2 жыл бұрын
One of the key insights in counterintelligence is that just because you can't imagine how to do something doesn't mean your enemy can't (the converse is also true, but much less damaging). The Axis suffered from a failure of imagination when it came to its assessment of Allied cryptographic capabilities, which is odd given that they did indeed manage to break some Allied codes (notably, and most scandalously, the British merchant shipping code and the US diplomatic code that the hapless military attaché in Egypt used, to Rommel's great advantage).
@kokosensei5231
@kokosensei5231 Ай бұрын
Thank you for share
@donaldasayers
@donaldasayers 5 жыл бұрын
He's done the cube!
@tobiasgorgen7592
@tobiasgorgen7592 3 жыл бұрын
Why do you look like Jeff sokol
@Ivo--
@Ivo-- 5 жыл бұрын
Excellent video as usual from Professor Brailsford. IMO the story of Tunny is more interesting than Enigma.
@jwaustinmunguy
@jwaustinmunguy 3 жыл бұрын
Dr. Tutte was Chairman of the Department of Combinatorics and Optimization at the Faculty of Mathematics, University of Waterloo. when I was an undergrad. I knew the name but it wasn't my specialization.
@sau002
@sau002 4 жыл бұрын
I have a question for you - Is there an archive of all the Enigma messages that were decrypted at Bletchley Park? Are there messages that were not archived? E.g. the Naval messages with 8 rotors. I wonder if it is worth decrypting these messages. They might give us some fresh historical insights.
@JMDinOKC
@JMDinOKC 3 жыл бұрын
I wouldn't be surprised if all those documents were among those destroyed at Bletchley at the end of the war.
@2adamast
@2adamast 3 жыл бұрын
The Americans having most of the bomb power, wasn’t most of it decrypted in the states?
@JMDinOKC
@JMDinOKC 3 жыл бұрын
@@2adamast Not at all. The US had its own establishment of code-breakers, which was called Arlington Hall. It was run by the US Army's Signal Intelligence Service. Their efforts were directed mainly against Japanese codes. There was a lot of information exchange between BP and AH. Cryptographers from both places spent time visiting and working alongside cryptographers at the other in order to gain experience and share expertise. AH is still a US government facility, but I think all the cryptographic services are located elsewhere now.
@2adamast
@2adamast 3 жыл бұрын
@@JMDinOKC Knowing that "The main response to the Four-rotor Enigma was the US Navy bombe, ..." they build 125 of 180 total. And that "The fast drum rotated at 1,725 rpm, 34 times the speed of the early British bombes." the US had maybe 20 times the British computational power. Add to that the super fast Three-rotor Enigma bombs of the US Army
@JMDinOKC
@JMDinOKC 3 жыл бұрын
@@2adamast Most of the US cryptographers working to crack the Japanese naval codes were based at Pearl Harbor. Arlington Hall mostly worked on Japanese Army codes, and, beginning even before WWII ended, on Soviet codes.
@ProWhitaker
@ProWhitaker 5 жыл бұрын
Thanks for the video
@robburnett2672
@robburnett2672 4 жыл бұрын
ii am by no means a statistician or maths person but these are great, entertaining videos..great work.
@JmanNo42
@JmanNo42 5 жыл бұрын
Lovely permutations.
@ihateevilbill
@ihateevilbill 2 ай бұрын
1:10 Oh. Hey there Mr camera man! Side note: Great topic, great video :)
@robertmaclean7070
@robertmaclean7070 3 жыл бұрын
Fascinating.
@horsenuts1831
@horsenuts1831 4 жыл бұрын
11:06 I miss that old computer paper. My dad worked in nuclear research and had access to the best computer equipment the taxpayer could afford. But, being a relatively lowly paid British civil servant scientist he would bring some home for me and my brother to draw on. We grew up with that stuff all over the place.
@freedomvigilant1234
@freedomvigilant1234 2 жыл бұрын
I remember the paper as well. It was present in our household as well
@xplorethings
@xplorethings 5 жыл бұрын
Too bad we will never hear the cryptography stories from the other side of the effort! Great piece, as always.
@eazel7
@eazel7 4 жыл бұрын
I love his videos, but I believe this is the most revealing one
@noxabellus
@noxabellus 5 жыл бұрын
If by "pure luck" you mean "a well-developed debugging technique" then yes he found the diagonal pattern by "pure luck"
@peterjohnson9438
@peterjohnson9438 5 жыл бұрын
my thought as well when Brailsford said that. "Wait, that's how I fix most 'hard' bugs"
@seamusandpat
@seamusandpat 5 жыл бұрын
Or a case of 'fortune favours the prepared mind' .....
@MrNoname7296
@MrNoname7296 5 жыл бұрын
The pure luck wasn’t magically finding a pattern, it was that 574 is one less than 575 so he found an unrelated pattern on his first go. It just saved some work since as noted 575 would’ve shown patterns in stream 5.
@IronicHavoc
@IronicHavoc 4 жыл бұрын
He just means how the streams for the 23 and 41 cogs were one off for his 575 period. Not lucky that he found the pattern, just lucky that the two patterns coincided there. He would have had to check the fifth stream to fins the pattern otherwise (which he probably would have done eventually)
@imir8atu321
@imir8atu321 5 жыл бұрын
Wonderful...
@SlocketSeven
@SlocketSeven 5 жыл бұрын
THANK YOU SO MUCH FOR KEEPING THE SOUND OF THE MARKER OFF THE AUDIO TRACK! I've had to stop watching way to many of your videos that are really interesting because that sound just drives me crazy.
@marsovac
@marsovac 5 жыл бұрын
You need to fix your problems instead of avoiding them.
@TakeThatPizza
@TakeThatPizza 5 жыл бұрын
Fascinating
@DarkRedman31
@DarkRedman31 3 жыл бұрын
11:55 I recognize this pattern, that's what we call the round-robin!
@alexstevensen4292
@alexstevensen4292 5 жыл бұрын
lol that rubics cube in the background. "but you can't break that cube can ya!"
@terapode
@terapode 5 жыл бұрын
The best monolog ever.
@leemoore5212
@leemoore5212 2 жыл бұрын
I've read and watched at least a dozen accounts of what Bill Tutte got up to, and each time have gone away with nothing more than "He must have been very clever." But this time I actually get it !
@sau002
@sau002 4 жыл бұрын
Very inspiring.
@edetmmekut809
@edetmmekut809 5 жыл бұрын
perfect video
@RonJohn63
@RonJohn63 5 жыл бұрын
3:28 That sounds like a One Time Pad.
@michaelsommers2356
@michaelsommers2356 5 жыл бұрын
Ideally the key does not repeat and is used only once. But reality is not always ideal. VENONA was broken because the Russians reused their OTPs.
@AttilaAsztalos
@AttilaAsztalos 5 жыл бұрын
Yes, and it's a rather humongous omission to not point out that a truly randomly assembled key tape would be fundamentally different from the key stream the video goes on to discuss, which is a _generated_ key producing the next value from the previous one through an (as complicated as they can manage) rule. This very difference is what makes the latter crackable while the former _is not_. Of course, it also implies the former needs a copy of your completely random tape to decrypt, while the second only needs the starting settings...
@RonJohn63
@RonJohn63 2 жыл бұрын
@@michaelsommers2356 it's always the humans being lazy...
@thetommantom
@thetommantom 5 жыл бұрын
Give random number sequences random letter values then run the current data stream until real words are provided.
@borhangherbi8189
@borhangherbi8189 5 жыл бұрын
You are the best
@gabeech
@gabeech 5 жыл бұрын
Glad to see your Cube in a solved state in this video. I'd like to see you educate whilst solving your Cube.
@MorningStarChrist
@MorningStarChrist 5 жыл бұрын
it's the lock of a safe encrypting the space inside!
@jamesgrimwood1285
@jamesgrimwood1285 5 жыл бұрын
The interesting bit is how these early cyphers totally relied on them being too difficult for humans to decrypt by hand. Using nothing more than Excel, figuring out repeating patterns in streams of bits takes no effort at all.
@michaelsommers2356
@michaelsommers2356 5 жыл бұрын
There is no sense at all in these ciphers being "early". People have used ciphers for thousands of years.
@jamesgrimwood1285
@jamesgrimwood1285 5 жыл бұрын
Yeah I know what you mean, I guess every cryptographic system relies on being too difficult to brute-force using current technology. I suppose back when the Romans were ROT-13ing things, the general population couldn't read so something a modern school kid can figure out must have been "too difficult". At one point RSA and MD5 hashes were considered secure. Now we have computing power capable of rendering them useless. I wonder if there'll ever be a time where the computation required to encrypt something securely outweighs the security it offers, but at the same time the technology to break the encryption will catch up.
@hadinossanosam4459
@hadinossanosam4459 5 жыл бұрын
"we have computers capable of rendering [RSA] useless" Yeah, no.
@simontay4851
@simontay4851 5 жыл бұрын
They were no ordinary humans.
@tonyennis3008
@tonyennis3008 5 жыл бұрын
Excel is impressive. Another aspect to remember about encryption machines is that they must be easy to use and field-maintainable. Lorenz may be a for high level cyphers only and thus be an exception. But the Enigma was everywhere, on every boat, with every unit. It had to be easy to use by relatively uneducated people. Similarly, in WWI, soldiers in the trenches used pretty simple cyphers even though better ones were available. But nearly-illiterate farmers cannot do math with artillery shells exploding, bullets zinging by their heads, and while a gas mask.
@tiantian1107
@tiantian1107 5 жыл бұрын
Where could I get the booklet mentioned at around 2:12 ? I'd like to read it too. Thanks!
@profdaveb6384
@profdaveb6384 5 жыл бұрын
Hi, the booklet I used was by Frank Carter and was put out in the early 1990s. You might want to check on the BP web site to see if it's still available. Failing that a revised and updated version of that material is in Appendix 9 of the "Colossus" book edited by Jack Copeland (see Info header for this video)
@ThePilchard123
@ThePilchard123 5 жыл бұрын
MichaelKingsfordGray Must he listen very carefully?
@dndboy13
@dndboy13 5 жыл бұрын
i can only imagine the amount of eyerolls received by whomever came up with 'relative primes'
@teddyboragina6437
@teddyboragina6437 5 жыл бұрын
I thought for a moment someone was creepin in on you through the window but it was just a mirror
@r4z0r84
@r4z0r84 2 жыл бұрын
Reminds me a lot of the mechanical calculator
@repairitdontreplaceit
@repairitdontreplaceit 5 жыл бұрын
ahh form feed paper :) happy days
@chap666ish
@chap666ish 5 жыл бұрын
Nice Robert's Radio in the background, I see :-)
@twotone3070
@twotone3070 4 жыл бұрын
What do you reckon it's tuned to?
@chap666ish
@chap666ish 4 жыл бұрын
@@twotone3070 The BBC Home Service. Probably listening to Workers' Playtime :)
@yoramstein
@yoramstein 5 жыл бұрын
love it
@woodywoodlstein9519
@woodywoodlstein9519 5 жыл бұрын
Friggin amazing professor. I partially understand it. Lol
@ianleitch9960
@ianleitch9960 2 жыл бұрын
Imagine the random tape breaking during transmission . . . while a complacent operator had a quick smoke break . . .
@williamsquires3070
@williamsquires3070 5 жыл бұрын
Why didn’t they just put a “1” start and stop bit, then they would have had a row of sprocket-feed holes on each tape? Then they could have fed both (tapes) through, much like in a “modern” dot-matrix printer with the sprocket-feed engaged.
@rasmusjrgensen143
@rasmusjrgensen143 5 жыл бұрын
Nice video
@hpdv0276
@hpdv0276 4 жыл бұрын
There is a logical error in the graphic at 6:44 line 5
@henrymach
@henrymach 5 жыл бұрын
Search for Curious Marc videos to see teletypes in action, among other things
@retepaskab
@retepaskab 5 жыл бұрын
So what is the Tiltman Break? 8:58 is mentioning some break, but was it explained in the video before that?
@tocsa120ls
@tocsa120ls 5 жыл бұрын
The break was that the same but just slightly different message was sent twice > this means you got a double length keystream, and by decoding the messages, you got the keystream back too, that was used to send it. You then had to use statistics and pattern recognition on it and you could theoretically get back the logic of the machine that generated the keystream. And this was what John Tiltman and the rest of the Bletchley cryptanalysts did.
@profdaveb6384
@profdaveb6384 5 жыл бұрын
See the previous "Fishy Ciphers" and "ZigZag decryption" videos which you'll find on the playlist
@TheSam1902
@TheSam1902 5 жыл бұрын
6:30 sorry but I don't understand why nobody got the idea of superposing the encrypted message tape and the key tape, then punching holes where the two were filled instead of syncing them side by side. This way 1 xor 1 = 0 (newly punched hole) and the rest works like XOR (1 xor 1 yields a filled hole, 0 xor 1 and 1 xor 0 also, and 0 xor 0 yields a hole which is what XOR would do). Is this idea useless or has it been tried ? Why wouldn't it work ?
@ahaveland
@ahaveland 5 жыл бұрын
I don't know either - 35m film has holes on each side for synchronization, so it was possible. Superimposing two tapes gives an OR, but you could use relative opacity to isolate XOR. Anyway, in order to decrypt, you would still need to be able to synchronize the cipher with the key, whether aligned side by side or layered.
@Jeff-ss6qt
@Jeff-ss6qt 5 жыл бұрын
What's that weird faint musical beeping sound that starts at 10:13 and continues to 10:28?
@CuttyP123
@CuttyP123 5 жыл бұрын
That is the sound a Samsung washing machine makes when it's done :D I was quite amused about that.
@y2ksw1
@y2ksw1 5 жыл бұрын
Amazing, even by nowadays standards!
@HebaruSan
@HebaruSan 5 жыл бұрын
Did the Enigma support "ß" as a character, or did they just type "ss"?
@luelou8464
@luelou8464 5 жыл бұрын
It was just upper case letters, only 32 posible values.
@sundhaug92
@sundhaug92 5 жыл бұрын
It was A-Z only
@NetRolller3D
@NetRolller3D 5 жыл бұрын
I'm pretty sure they typed SZ.
@simontay4851
@simontay4851 5 жыл бұрын
Only 26 letters in the alphabet. Where did you get 32 from.
@Iowahurler82
@Iowahurler82 5 жыл бұрын
Though, looking at an image of an enigma machine on wikipedia, there are only the 26 standard letters on it.
@richardkaz2336
@richardkaz2336 5 жыл бұрын
Why didn't they just have a uniform sync bit down each tape.
@msimon6808
@msimon6808 5 жыл бұрын
The Americans used a machine during the war that had a tape key. At a speed of 10 characters per second (CPS) - synchronizing is easy. Much above that and you can't do it electro-mechanically. To read a tape going 5,000 CPS photocells are going to be required. Back in the early 8080 days you could build a kit paper tape reader that used photocells. It could do 5,000 CPS if you could pull the tape that fast.
@David-lb4te
@David-lb4te 4 жыл бұрын
Collosus used an optical tape readers at 5k/s.
@DavidvanDeijk
@DavidvanDeijk 5 жыл бұрын
a little bit too much was cut, what is zigzag decryption? also: 26 is not a prime
@Computerphile
@Computerphile 5 жыл бұрын
try this video: kzbin.info/www/bejne/r6nbZHWhottmmc0
@ronr2030
@ronr2030 5 жыл бұрын
You're right it's not prime, it's "relatively" prime compared to the other numbers.
@Zebsy
@Zebsy 5 жыл бұрын
23 * 25 = 575. Let's investigate.... Dusty went to Italy, xor with a plane ticket to Ztut, its a holiday in the Italian Alps!!
@sirnukesalot24
@sirnukesalot24 5 жыл бұрын
This sounds like the birth of the automated "rolling code" encryption. Is this right?
@Rob9
@Rob9 5 жыл бұрын
I've been inspired to watch The Imitation Game
@twotone3070
@twotone3070 4 жыл бұрын
You'll be disappointed at the inaccuracy.
@Rob9
@Rob9 4 жыл бұрын
@@twotone3070 This was a year ago but I did end up watching it. It was okay, the stupidest thing though was at the end when they implied he was "in love" with the machine or something ridiculous like that.
@gwenynorisu6883
@gwenynorisu6883 5 жыл бұрын
Hang on, so, how is this relevant to the Colossus, and what is the Tiltman Break anyway? As fascinating as was anyway, I have a feeling the wrong title and description has been put on this video.
@baitsnatcha
@baitsnatcha 5 жыл бұрын
3 times 2 is 6, instant maffs! 12:44
@andrewwrobel2255
@andrewwrobel2255 3 жыл бұрын
But you cannot label all 41 teeth of that wheel with 25 letters. So how could an alphabetic indicator work? Did the operators use only 25 out of the 41 possible starting points?
@Czeckie
@Czeckie 5 жыл бұрын
12:45 quick maffs
@jonahcornish
@jonahcornish Жыл бұрын
Oh, what a tangled web we weave when first we practice to deceive...
@georgegonzalez2442
@georgegonzalez2442 5 жыл бұрын
Part of this explanation sounds a bit unlikely. 5-hole paper tape ALWAYS has a sixth sprocket hole. I've seen and used 5, 6, 7, and 8 bit paper tape and they ALL have sprocket timing holes. Now the colossus tapes look like they don't have timing holes, maybe that is what he his thinking of?
@profdaveb6384
@profdaveb6384 5 жыл бұрын
The Colossus tape mechanism didn't rely on the tape's sprocket wheels for transporting the tape. But it did use them - with a photoelectric sensor behind them - to provide the fundamental clock pulse for Colossus itself. In this way the Colossus computer was always in sync with the data it was reading
@johnlister
@johnlister 5 жыл бұрын
That has been true of optical paper tape readers in general. I had the privilege of playing with an obsolete Ferranti Mercury which used paper tape for all I/O. The reader used a rubber capstan to move the tape, and 6 photocells to read it, with the clock being provided from the sprocket hole.
@allangibson8494
@allangibson8494 3 жыл бұрын
dothemathright 1111 The teletype machine has no electronics - it is a mess of gears and relays. Magnetic logic in short.
@ahmadsheikhsuliman7517
@ahmadsheikhsuliman7517 5 жыл бұрын
Well, apparently cryptography is way more interesting than my c# high school class.
@dingaia
@dingaia 5 жыл бұрын
What happens next
@GanerRL
@GanerRL 2 жыл бұрын
6:02 heh
@michaelsommers2356
@michaelsommers2356 5 жыл бұрын
Vernam's invention was in 1918, before the war ended.
The Great 202 Jailbreak - Computerphile
19:55
Computerphile
Рет қаралды 517 М.
Enigma, TypeX and Dad - Computerphile
16:48
Computerphile
Рет қаралды 176 М.
ОДИН ДОМА #shorts
00:34
Паша Осадчий
Рет қаралды 6 МЛН
😱СНЯЛ СУПЕР КОТА НА КАМЕРУ⁉
00:37
OMG DEN
Рет қаралды 1,8 МЛН
Top 5 Weaknesses of an Enigma | Bletchley Park
21:42
Bletchley Park
Рет қаралды 59 М.
The Font Magicians - Computerphile
19:31
Computerphile
Рет қаралды 365 М.
Wana Decrypt0r (Wanacry Ransomware) - Computerphile
15:19
Computerphile
Рет қаралды 1,5 МЛН
How Ray Tracing Works - Computerphile
20:23
Computerphile
Рет қаралды 50 М.
When Unix Landed - Computerphile
13:12
Computerphile
Рет қаралды 146 М.
Zig Zag Decryption - Computerphile
17:08
Computerphile
Рет қаралды 214 М.
Colossus - The Greatest Secret in the History of Computing
1:00:26
The Centre for Computing History
Рет қаралды 906 М.
Diceware & Passwords - Computerphile
10:56
Computerphile
Рет қаралды 303 М.
CPU Pipeline - Computerphile
21:48
Computerphile
Рет қаралды 55 М.