Professor Brailsford never "stutters." He is a great storyteller. Thank you!
@ronniebasak964 жыл бұрын
Aka David Attenborough of computer science
@edwardtait42854 жыл бұрын
@@ronniebasak96 Each to their own and well spoken, on both counts!
@PplsChampion5 жыл бұрын
10:43 i love that prof Brailsford has a stack of oldschool perforated printer paper for scratch paper
@PandoraMakesGames6 жыл бұрын
Professor Brailsford is always great!
@crystalsoulslayer6 жыл бұрын
I barely understand the subject matter most of the time, but what I do understand is fascinating. And he delivers it so well!
@PandoraMakesGames6 жыл бұрын
True, he inspires me to make videos myself.
@stevensexton58016 жыл бұрын
I worked on teletypes in the Army in the '80. "The quick brown fox jumps over the lazy dog" was a staple in debugging the machines. The newest one I worked on was a UGC-74. Thanks for the trip back in time!
@toddkes5890 Жыл бұрын
Go with a modern version - "sphinx of black quartz, judge my vow"
@MCPhssthpok6 жыл бұрын
I looked at the thumbnail and immediately thought "That's tunny traffic, must be a Professor Brailsford video!"
@leocomerford6 жыл бұрын
Now there's traffic analysis for you!
@7177YT5 жыл бұрын
I could listen to this man for hours. More please! (:
@GaryBickford6 жыл бұрын
This great video suddenly gave me to wonder about the people in Germany and elsewhere who were designing and building these systems. We’ve seen many videos about the amazing processes and people at Bletchley Park, but I’ve never seen anything about the also-rather-amazing work on the other side. We’ve seen lots of information on other German (and less so Japanese) science and tech, such as rockets and tanks, but nothing on the “codemakers”.
@SpenserRoger6 жыл бұрын
Gary Bickford Did you google it?
@shaneirwin94616 жыл бұрын
Part of 'Operation Paperclip' maybe. These were scientists, rocket designers and engineers that the Americans 'poached' from Germany after the war to work for America. They were given a free pass, no trials and citizenship...no questions asked.
@Justin-TPG6 жыл бұрын
Let’s have a video on Prof. Brailsford exploiting the Amen Break next ;)
@raykent32116 жыл бұрын
Great video! A commentor on an unrelated video wanted to buy gear wheels with a simple integer ratio and wondered why he couldn't find 16 to 32 teeth, but rather 16 to 31. Someone else replied that it spreads the wear. Now I know that it's because they are relatively prime, giving the maximum number of turns before the same pair of teeth meet again. Of course integer ratios are needed in some apps, but it's, well, interesting anyway.
@donaldasayers6 жыл бұрын
Great for gearboxes, but useless for clocks where you need exact ratios.
@mal2ksc6 жыл бұрын
Sometimes those exact ratios are fairly large (three digit) prime numbers, such as 223, as in the case of the Antikythera mechanism.
@donaldasayers6 жыл бұрын
Or Clocks with sidereal dials.
@woodywoodlstein95196 жыл бұрын
Fascinating
@woodywoodlstein95196 жыл бұрын
Mal-2 KSC thx for me mentioning that device. I’d never heard of it.
@cmelton67965 жыл бұрын
You know things just got real when Prof. Brailsford says "Oh dear! Calamity."
@tocsa120ls6 жыл бұрын
Bletchley is absolutely worth the days time and I even got a yearly admission for the price of a day ticket. Very cool. Check the opening times first, as the National Museum of Computing (which you will want to see) is not open all day, just the Colossus exhibition. Even got a peek at the Bombe project.
@Raazor22322 жыл бұрын
I love Professor Brailsford. I could listen to him yarn all day.
@HanggliderDelta6 жыл бұрын
Another interesting video spiced by Prof. Brailsford enthusiastic personality. Wonderful and thanks for it.
@JVerschueren6 жыл бұрын
During my national service, I used Telex connections which had a similar sort of encryption scheme as described early in the video for the connection only. It used a tape which one had to load monthly, which had seeds on it for a pseudo random generator in the encrypter. Each day, at a set time per line, one would call the operator at the other end and advance the machines together, passing a short message back and forth to verify the machines were in sync. They would then spit out the previous day's seed, which we had to destroy. Secret, but not extremely sensitive information would be sent as clear text across these secure connections, while the real secrets were sent as seperately encrypted text.
@NuclearCraftMod2 ай бұрын
If you pause at 17:51 you can just about see the diagonal lines in the key stream that Dave then talks about.
@davidwilkie95515 жыл бұрын
The concept of co-primes.., at last I understand something about Chemistry and Bonding/wave-packaging, that was not previously obvious, because it's the inclusion/exclusion quantum boundary of common denominator resonance modulation, (-> Spinfoam bubble relative size-positioning in Totality). Brilliant stuff, thank you all.
@richardsinger015 жыл бұрын
David Wilkie you have lost me there - what is the connection with bonding?
@aaron_111116 жыл бұрын
Another excellent video featuring professor Brailsford. Thank you!
@josephwong28324 жыл бұрын
What an epic story!! I love how this guy just remembered that long string just like that
@simontay48516 жыл бұрын
Bill tut was indeed a genius. My head would've exploded trying to decrypt these messages.
@Mekchanoid3 жыл бұрын
Fascinating and engagingly told. Thank you so much!
@jellyboy006 жыл бұрын
13:33 we do the same thing while learning fourier transform finding period of signal produced by adding up two (or more) sine wave We find the LCM of period of all sine wave.
@grn13 жыл бұрын
A few minutes in and I just realized that the effectively 1 data line from USB 2.0 gets XORed. I just watched a video (I think by Ben Eater) about USB keyboards (and how they compare with PS/2 keyboards). In that video he explained that the USB standard (or at least the USB 2.0 standard) has 2 data lines and no dedicated clock line. The two lines normally send opposite signals, this helps with data redundancy and creates destructive interference in the EM produced by the cables so as to eliminate most of the EM emissions. As such USB 2.0 effectively has only one data line (there are a couple special states). This one data line doesn't just send it's data as 1's and 0's though, instead it's a 1 if the state changes and a 0 if it doesn't (or maybe the other way around). In any case what this means is that the previous input is effectively XORed with the current input to determine the actual value (apparently this is more reliable at higher speeds than just sending the data directly).
@rv65026 жыл бұрын
Bet once the code was cracked the Axis side weren't so zmug.
@davidgillies6203 жыл бұрын
One of the key insights in counterintelligence is that just because you can't imagine how to do something doesn't mean your enemy can't (the converse is also true, but much less damaging). The Axis suffered from a failure of imagination when it came to its assessment of Allied cryptographic capabilities, which is odd given that they did indeed manage to break some Allied codes (notably, and most scandalously, the British merchant shipping code and the US diplomatic code that the hapless military attaché in Egypt used, to Rommel's great advantage).
@sau0025 жыл бұрын
I have a question for you - Is there an archive of all the Enigma messages that were decrypted at Bletchley Park? Are there messages that were not archived? E.g. the Naval messages with 8 rotors. I wonder if it is worth decrypting these messages. They might give us some fresh historical insights.
@JMDinOKC4 жыл бұрын
I wouldn't be surprised if all those documents were among those destroyed at Bletchley at the end of the war.
@2adamast4 жыл бұрын
The Americans having most of the bomb power, wasn’t most of it decrypted in the states?
@JMDinOKC4 жыл бұрын
@@2adamast Not at all. The US had its own establishment of code-breakers, which was called Arlington Hall. It was run by the US Army's Signal Intelligence Service. Their efforts were directed mainly against Japanese codes. There was a lot of information exchange between BP and AH. Cryptographers from both places spent time visiting and working alongside cryptographers at the other in order to gain experience and share expertise. AH is still a US government facility, but I think all the cryptographic services are located elsewhere now.
@2adamast4 жыл бұрын
@@JMDinOKC Knowing that "The main response to the Four-rotor Enigma was the US Navy bombe, ..." they build 125 of 180 total. And that "The fast drum rotated at 1,725 rpm, 34 times the speed of the early British bombes." the US had maybe 20 times the British computational power. Add to that the super fast Three-rotor Enigma bombs of the US Army
@JMDinOKC4 жыл бұрын
@@2adamast Most of the US cryptographers working to crack the Japanese naval codes were based at Pearl Harbor. Arlington Hall mostly worked on Japanese Army codes, and, beginning even before WWII ended, on Soviet codes.
@parttroll16 жыл бұрын
Always love Prof Brailsford's videos on the WWII code breaking at BP. Can't wait for the next installment
@JMDinOKC4 жыл бұрын
He reminds me of my Uncle Phil, who fancied himself quite the raconteur; except that Professor Brailsford actually is one.
@bigmoe-specialtylandservic61063 жыл бұрын
Incredibly easy to understand explanation of a complex topic. Thank you!!!
@RWBHere6 жыл бұрын
Having binge-watched a selection of these, I'm now on a cliff-hanger for the next video..l Thanks! ;-)
@brianmessemer29735 жыл бұрын
SAME 👍
@qwertyasdf666 жыл бұрын
We only ever hear about these things through the stories of the allies reverse-engineering them. We never hear the stories of the germans designing them. We just have speculations about what the designers were/weren't thinking. And I think that's really sad. I like the excitement of figuring it out, but I also like confirmation.
@Yaxqb6 жыл бұрын
24:28 when he says "can you imagine setting up all of these teeth" and points at the cartoon fish👌
@TheSam19026 жыл бұрын
6:30 sorry but I don't understand why nobody got the idea of superposing the encrypted message tape and the key tape, then punching holes where the two were filled instead of syncing them side by side. This way 1 xor 1 = 0 (newly punched hole) and the rest works like XOR (1 xor 1 yields a filled hole, 0 xor 1 and 1 xor 0 also, and 0 xor 0 yields a hole which is what XOR would do). Is this idea useless or has it been tried ? Why wouldn't it work ?
@ahaveland5 жыл бұрын
I don't know either - 35m film has holes on each side for synchronization, so it was possible. Superimposing two tapes gives an OR, but you could use relative opacity to isolate XOR. Anyway, in order to decrypt, you would still need to be able to synchronize the cipher with the key, whether aligned side by side or layered.
@Jeff-ss6qt6 жыл бұрын
What's that weird faint musical beeping sound that starts at 10:13 and continues to 10:28?
@CuttyP1235 жыл бұрын
That is the sound a Samsung washing machine makes when it's done :D I was quite amused about that.
@GrumpyGrebo6 жыл бұрын
You sir are a legend. Great lesson
@RonJohn636 жыл бұрын
3:28 That sounds like a One Time Pad.
@michaelsommers23566 жыл бұрын
Ideally the key does not repeat and is used only once. But reality is not always ideal. VENONA was broken because the Russians reused their OTPs.
@AttilaAsztalos6 жыл бұрын
Yes, and it's a rather humongous omission to not point out that a truly randomly assembled key tape would be fundamentally different from the key stream the video goes on to discuss, which is a _generated_ key producing the next value from the previous one through an (as complicated as they can manage) rule. This very difference is what makes the latter crackable while the former _is not_. Of course, it also implies the former needs a copy of your completely random tape to decrypt, while the second only needs the starting settings...
@RonJohn633 жыл бұрын
@@michaelsommers2356 it's always the humans being lazy...
@polares81876 жыл бұрын
Excellent and very informative video. Love the professor
@donaldasayers6 жыл бұрын
He's done the cube!
@tobiasgorgen75924 жыл бұрын
Why do you look like Jeff sokol
@brian554xx6 жыл бұрын
Love these decryption videos!
@jwaustinmunguy3 жыл бұрын
Dr. Tutte was Chairman of the Department of Combinatorics and Optimization at the Faculty of Mathematics, University of Waterloo. when I was an undergrad. I knew the name but it wasn't my specialization.
@tiantian11076 жыл бұрын
Where could I get the booklet mentioned at around 2:12 ? I'd like to read it too. Thanks!
@profdaveb63846 жыл бұрын
Hi, the booklet I used was by Frank Carter and was put out in the early 1990s. You might want to check on the BP web site to see if it's still available. Failing that a revised and updated version of that material is in Appendix 9 of the "Colossus" book edited by Jack Copeland (see Info header for this video)
@Pilchard1236 жыл бұрын
MichaelKingsfordGray Must he listen very carefully?
@superscatboy6 жыл бұрын
I could watch Prof B all day.
@jamesgrimwood12856 жыл бұрын
The interesting bit is how these early cyphers totally relied on them being too difficult for humans to decrypt by hand. Using nothing more than Excel, figuring out repeating patterns in streams of bits takes no effort at all.
@michaelsommers23566 жыл бұрын
There is no sense at all in these ciphers being "early". People have used ciphers for thousands of years.
@jamesgrimwood12856 жыл бұрын
Yeah I know what you mean, I guess every cryptographic system relies on being too difficult to brute-force using current technology. I suppose back when the Romans were ROT-13ing things, the general population couldn't read so something a modern school kid can figure out must have been "too difficult". At one point RSA and MD5 hashes were considered secure. Now we have computing power capable of rendering them useless. I wonder if there'll ever be a time where the computation required to encrypt something securely outweighs the security it offers, but at the same time the technology to break the encryption will catch up.
@hadinossanosam44596 жыл бұрын
"we have computers capable of rendering [RSA] useless" Yeah, no.
@simontay48516 жыл бұрын
They were no ordinary humans.
@tonyennis30086 жыл бұрын
Excel is impressive. Another aspect to remember about encryption machines is that they must be easy to use and field-maintainable. Lorenz may be a for high level cyphers only and thus be an exception. But the Enigma was everywhere, on every boat, with every unit. It had to be easy to use by relatively uneducated people. Similarly, in WWI, soldiers in the trenches used pretty simple cyphers even though better ones were available. But nearly-illiterate farmers cannot do math with artillery shells exploding, bullets zinging by their heads, and while a gas mask.
@JavierSalcedoC6 жыл бұрын
Oh dear, what a wonderful video
@meme-hj5rs6 жыл бұрын
the answer to life is 42 not 41 :) . Great video , great passion from him explaining this
@noxabellus6 жыл бұрын
If by "pure luck" you mean "a well-developed debugging technique" then yes he found the diagonal pattern by "pure luck"
@peterjohnson94386 жыл бұрын
my thought as well when Brailsford said that. "Wait, that's how I fix most 'hard' bugs"
@seamusandpat6 жыл бұрын
Or a case of 'fortune favours the prepared mind' .....
@MrNoname72966 жыл бұрын
The pure luck wasn’t magically finding a pattern, it was that 574 is one less than 575 so he found an unrelated pattern on his first go. It just saved some work since as noted 575 would’ve shown patterns in stream 5.
@IronicHavoc5 жыл бұрын
He just means how the streams for the 23 and 41 cogs were one off for his 575 period. Not lucky that he found the pattern, just lucky that the two patterns coincided there. He would have had to check the fifth stream to fins the pattern otherwise (which he probably would have done eventually)
@Ganerrr3 жыл бұрын
6:02 heh
@leemoore52123 жыл бұрын
I've read and watched at least a dozen accounts of what Bill Tutte got up to, and each time have gone away with nothing more than "He must have been very clever." But this time I actually get it !
@ianleitch99603 жыл бұрын
Imagine the random tape breaking during transmission . . . while a complacent operator had a quick smoke break . . .
@alexstevensen42926 жыл бұрын
lol that rubics cube in the background. "but you can't break that cube can ya!"
@hpdv02764 жыл бұрын
There is a logical error in the graphic at 6:44 line 5
@thejll27 күн бұрын
Lovely yarns! Anyone ever interviewed the Germans who sat at the other end, making the Enigma codes?
@Ivo--6 жыл бұрын
Excellent video as usual from Professor Brailsford. IMO the story of Tunny is more interesting than Enigma.
@hkchandana3 жыл бұрын
Very nicely explained. Thank you very much.
@SlocketSeven6 жыл бұрын
THANK YOU SO MUCH FOR KEEPING THE SOUND OF THE MARKER OFF THE AUDIO TRACK! I've had to stop watching way to many of your videos that are really interesting because that sound just drives me crazy.
@marsovac6 жыл бұрын
You need to fix your problems instead of avoiding them.
@williamsquires30706 жыл бұрын
Why didn’t they just put a “1” start and stop bit, then they would have had a row of sprocket-feed holes on each tape? Then they could have fed both (tapes) through, much like in a “modern” dot-matrix printer with the sprocket-feed engaged.
@DarkRedman314 жыл бұрын
11:55 I recognize this pattern, that's what we call the round-robin!
@dndboy136 жыл бұрын
i can only imagine the amount of eyerolls received by whomever came up with 'relative primes'
@robburnett26725 жыл бұрын
ii am by no means a statistician or maths person but these are great, entertaining videos..great work.
@thetommantom6 жыл бұрын
Give random number sequences random letter values then run the current data stream until real words are provided.
@HebaruSan6 жыл бұрын
Did the Enigma support "ß" as a character, or did they just type "ss"?
@sundhaug926 жыл бұрын
It was A-Z only
@NetRolller3D6 жыл бұрын
I'm pretty sure they typed SZ.
@simontay48516 жыл бұрын
Only 26 letters in the alphabet. Where did you get 32 from.
@Iowahurler826 жыл бұрын
Though, looking at an image of an enigma machine on wikipedia, there are only the 26 standard letters on it.
@samholden57586 жыл бұрын
It's 5 bits, so you can only have 32 characters. Which means you are stuck to uppercase letters only since you can't fit both upper and lower...
@andrewwrobel22553 жыл бұрын
But you cannot label all 41 teeth of that wheel with 25 letters. So how could an alphabetic indicator work? Did the operators use only 25 out of the 41 possible starting points?
@JmanNo426 жыл бұрын
Lovely permutations.
@teddyboragina64376 жыл бұрын
I thought for a moment someone was creepin in on you through the window but it was just a mirror
@eazel74 жыл бұрын
I love his videos, but I believe this is the most revealing one
@retepaskab6 жыл бұрын
So what is the Tiltman Break? 8:58 is mentioning some break, but was it explained in the video before that?
@tocsa120ls6 жыл бұрын
The break was that the same but just slightly different message was sent twice > this means you got a double length keystream, and by decoding the messages, you got the keystream back too, that was used to send it. You then had to use statistics and pattern recognition on it and you could theoretically get back the logic of the machine that generated the keystream. And this was what John Tiltman and the rest of the Bletchley cryptanalysts did.
@profdaveb63846 жыл бұрын
See the previous "Fishy Ciphers" and "ZigZag decryption" videos which you'll find on the playlist
@kokosensei52319 ай бұрын
Thank you for share
@xplorethings6 жыл бұрын
Too bad we will never hear the cryptography stories from the other side of the effort! Great piece, as always.
@r4z0r842 жыл бұрын
Reminds me a lot of the mechanical calculator
@terapode5 жыл бұрын
The best monolog ever.
@swainscheps2 жыл бұрын
Totally lost me at 17:01….all the periodicity talk made me lose the plot - what is the long stream of digits again? Why would it work to just look at the rightmost?
@robertmaclean70703 жыл бұрын
Fascinating.
@henrymach6 жыл бұрын
Search for Curious Marc videos to see teletypes in action, among other things
@georgegonzalez24426 жыл бұрын
Part of this explanation sounds a bit unlikely. 5-hole paper tape ALWAYS has a sixth sprocket hole. I've seen and used 5, 6, 7, and 8 bit paper tape and they ALL have sprocket timing holes. Now the colossus tapes look like they don't have timing holes, maybe that is what he his thinking of?
@profdaveb63846 жыл бұрын
The Colossus tape mechanism didn't rely on the tape's sprocket wheels for transporting the tape. But it did use them - with a photoelectric sensor behind them - to provide the fundamental clock pulse for Colossus itself. In this way the Colossus computer was always in sync with the data it was reading
@johnlister6 жыл бұрын
That has been true of optical paper tape readers in general. I had the privilege of playing with an obsolete Ferranti Mercury which used paper tape for all I/O. The reader used a rubber capstan to move the tape, and 6 photocells to read it, with the clock being provided from the sprocket hole.
@allangibson84944 жыл бұрын
dothemathright 1111 The teletype machine has no electronics - it is a mess of gears and relays. Magnetic logic in short.
@sirnukesalot246 жыл бұрын
This sounds like the birth of the automated "rolling code" encryption. Is this right?
@imir8atu3216 жыл бұрын
Wonderful...
@gwenynorisu68836 жыл бұрын
Hang on, so, how is this relevant to the Colossus, and what is the Tiltman Break anyway? As fascinating as was anyway, I have a feeling the wrong title and description has been put on this video.
@chap666ish6 жыл бұрын
Nice Robert's Radio in the background, I see :-)
@twotone30704 жыл бұрын
What do you reckon it's tuned to?
@chap666ish4 жыл бұрын
@@twotone3070 The BBC Home Service. Probably listening to Workers' Playtime :)
@MorningStarChrist6 жыл бұрын
it's the lock of a safe encrypting the space inside!
@Czeckie6 жыл бұрын
12:45 quick maffs
@DavidvanDeijk6 жыл бұрын
a little bit too much was cut, what is zigzag decryption? also: 26 is not a prime
@Computerphile6 жыл бұрын
try this video: kzbin.info/www/bejne/r6nbZHWhottmmc0
@ronr20305 жыл бұрын
You're right it's not prime, it's "relatively" prime compared to the other numbers.
@richardkaz23366 жыл бұрын
Why didn't they just have a uniform sync bit down each tape.
@sau0025 жыл бұрын
Very inspiring.
@TakeThatPizza6 жыл бұрын
Fascinating
@charlieangkor86494 жыл бұрын
A sprocket wasn't invented yet?
@ProWhitaker6 жыл бұрын
Thanks for the video
@msimon68085 жыл бұрын
The Americans used a machine during the war that had a tape key. At a speed of 10 characters per second (CPS) - synchronizing is easy. Much above that and you can't do it electro-mechanically. To read a tape going 5,000 CPS photocells are going to be required. Back in the early 8080 days you could build a kit paper tape reader that used photocells. It could do 5,000 CPS if you could pull the tape that fast.
@David-lb4te5 жыл бұрын
Collosus used an optical tape readers at 5k/s.
@repairitdontreplaceit5 жыл бұрын
ahh form feed paper :) happy days
@1992jamo6 жыл бұрын
Surely you could just xor two messages and get the key?
@sbalogh535 жыл бұрын
You would need plain text for the message
@jeffchilds80505 жыл бұрын
Shirley you cannot. And don't call me Surely. :)
@EtzEchad6 ай бұрын
The idea of running parallel paper tapes is not a cipher, it's a code. That should've terrified them because codes are, bt their nature, unbreakable.
@LucidZzz_6 жыл бұрын
5:55
@baitsnatcha6 жыл бұрын
3 times 2 is 6, instant maffs! 12:44
@gabeech6 жыл бұрын
Glad to see your Cube in a solved state in this video. I'd like to see you educate whilst solving your Cube.
@Zebsy6 жыл бұрын
23 * 25 = 575. Let's investigate.... Dusty went to Italy, xor with a plane ticket to Ztut, its a holiday in the Italian Alps!!
@ahmadsheikhsuliman75176 жыл бұрын
Well, apparently cryptography is way more interesting than my c# high school class.
@jonahcornish Жыл бұрын
Oh, what a tangled web we weave when first we practice to deceive...
@woodywoodlstein95196 жыл бұрын
Friggin amazing professor. I partially understand it. Lol