Cryptography 101 - The Basics

  Рет қаралды 335,824

Pico Cetef

Pico Cetef

Күн бұрын

Пікірлер: 100
@Fre3r
@Fre3r Жыл бұрын
got really interested in encryption recently. thanks for making this!
@barrykavanagh5045
@barrykavanagh5045 5 жыл бұрын
Using HTTPS to securely thank you for this video! :)
@gsharpshooter80
@gsharpshooter80 10 жыл бұрын
Did anybody else think this demonstration should have been used with Spongebob, Patrick, and squidward when they were sending voice messages through bubbles and squidward would hijack the moment with hate bubbles XD
@Divya-tl6gr
@Divya-tl6gr 9 жыл бұрын
+gsharpshooter80 very creative thought dude.
@aughtrycw1009
@aughtrycw1009 8 жыл бұрын
You are now my God
@julianocamargo6674
@julianocamargo6674 7 жыл бұрын
It would be great for kids but you would need to talk to Viacom
@bestbotreview
@bestbotreview 7 жыл бұрын
im here for the party like its opposite day
@anonymoustester9472
@anonymoustester9472 6 жыл бұрын
Simple Encryption Technique in just 30 sec kzbin.info/www/bejne/h4e3oqtnlq5ribc
@sujanbaruah3305
@sujanbaruah3305 7 жыл бұрын
THANK YOU soooo much..... Very intuitive and easy explanation
@anoncker
@anoncker 11 жыл бұрын
Thank you so much man,you made things MUUUUUUUUCH clear for me. I LOVE YOU :D
@uwumukizasolange8889
@uwumukizasolange8889 6 жыл бұрын
thank you for providing this understandable video for us
@DX413RB8
@DX413RB8 4 жыл бұрын
this is why i learned english; international knowledge
@punditgi
@punditgi 4 жыл бұрын
A freebie lecture from CMU? Nice! 👍
@TheMojoPhoto
@TheMojoPhoto 4 жыл бұрын
Well done, I ended up here by mishap. You have a new Sub. I was look up classical pigpen. FYI.
@osmanmusse9432
@osmanmusse9432 2 жыл бұрын
Thanks for explaining this topic
@supremeleadersnoke792
@supremeleadersnoke792 8 жыл бұрын
how do i decode your video on Cryptography 101 - The Basics ...the video was obviously made by cicada 3301
@anonymoustester9472
@anonymoustester9472 6 жыл бұрын
Simple Encryption Technique in just 30 sec kzbin.info/www/bejne/h4e3oqtnlq5ribc
@SantoshBalakrishnanVSL
@SantoshBalakrishnanVSL 7 жыл бұрын
Hi David, this is an excellent start. Can you share more or related videos?
@malluk4127
@malluk4127 6 жыл бұрын
Sorry if this is a bit late... But he has more on his channel...
@Divya-tl6gr
@Divya-tl6gr 9 жыл бұрын
i really liked the way you explained it.
@bkzegyptshin1
@bkzegyptshin1 2 жыл бұрын
Do you have a full course of this , I never had someone explain Somthing do understandable ..
@Jamie-iv8dp
@Jamie-iv8dp 7 жыл бұрын
How do Alice and bob know the same key without sending a decrypted version first?
@DannyD1Chung
@DannyD1Chung 6 жыл бұрын
Thank you. Well explained.
@tarannumkhatri5636
@tarannumkhatri5636 9 жыл бұрын
very helpful..easy to understand thanks..
@BambiOnIce19
@BambiOnIce19 2 жыл бұрын
So the exchange of keys is the really important part, right? You can steal the information, but you cannot do nothing with that information unless you have the 'key'. So how do you get your hands on this 'key', that is what i want to know
@raregear
@raregear 4 жыл бұрын
very well explained!
@adithyavikramm3837
@adithyavikramm3837 7 жыл бұрын
how could eve has access to the cipher text.. Pls explain
@creamy6680
@creamy6680 7 жыл бұрын
Interesting ! I have a question... is online banking considered as asymetric encryption?
@the17kyd
@the17kyd 7 жыл бұрын
Is this helping me crack the Z340 cipher?
@skitflow5.046
@skitflow5.046 9 жыл бұрын
does Alice use Bobs public key to encrypt the message? then wen she sends the message only bob that can decrypt it with his Private key?
@julianocamargo6674
@julianocamargo6674 7 жыл бұрын
Alice creates a session key to encrypt the message, and she uses Bob's public key to encrypt this session key. Bob uses his private key to retrieve the session key. He now has the same session key that Alice used, as in symmetric cryptography. He uses this key to finally decrypt the message.
@wildcountryman13
@wildcountryman13 9 жыл бұрын
Hi I enjoyed your video. I was trying to find someone that could possibly make an encryption and decryption program using an old method that ive used on paper.
@binnypatel7061
@binnypatel7061 8 жыл бұрын
great job.... thanks!!
@Spudst3r
@Spudst3r 11 жыл бұрын
If I use Bob's public key to encrypt a message to him, couldn't an adversary just apply Bob's public key to unlock it? How does Alice effectively obscure the message encrypted to bob with his public key, so that an adversary can't open it while Bob can?
@khan0000007
@khan0000007 11 жыл бұрын
Ok I will try to explain. Bob has 2 keys, public and private. Public key can do encryption and is given to everyone. Private key can do decryption and is kept with bob only. So when alice wants to encrypt the message she uses bob's public. Even though eve can eavesdrop the message, she cannot decrypt it because she does not have the private key needed to decrypt it, only bob has that key. So only bob can decrypt alice's message because he has private key with him. Hope this makes you clear. Also remember when you go deeper into subject, you will come to know that these keys can be used alternatively, that is data encrypted with public key is decrypted using private key and that is data encrypted with private key is decrypted using public key.
@Spudst3r
@Spudst3r 11 жыл бұрын
Yeah I understand it now. What I didn't understand, and I think is conceptually hard to figure out until you delve into the actual math of public key/private key encryption, is *how* the public key can have properties that make it only possible to be decoded by the private key. Namely, that a *public key* is a number that is a factor of two prime numbers, and that knowing *which two prime numbers* were used to generate this number is critical to figuring out the actual private key. Since it is very mathematically difficult to figure out which prime numbers were used if you only know the public key, encryption works.
@mboerrigter1
@mboerrigter1 11 жыл бұрын
Spuds7er Bob will generate two keys based on some mathematical operation which is easy to apply in one direction but next to impossible in the other direction. For example, Bob can generate two very large prime numbers and compute the product of those two numbers (easy) but if Bob asks Alice to factor the two prime numbers giving Alice only the product she will need a very, very long time to figure it out. It's not quite impossible but the time involved would be prohibitive. Now, Bob could use this very large number to generate two keys, one public and one private. The public key will be sent to Alice and she can encrypt her message with it. Bob's private key is never disclosed to Alice and it is the only key that is able to decrypt the message. The relationship between the public key and the private key (only known to Bob) allows Bob, and only Bob, to decrypt the message. Of course, anybody can get Bob's public key so this particular scenario only ensures confidentiality and not non-repudiation since Alice can never prove that the message came from her (or not).
@jorgejr5876
@jorgejr5876 10 жыл бұрын
***** How does one get the Private key? Is it sent through the first public message. Or is it given to the other party even before communication begins?
@OmriSama
@OmriSama 10 жыл бұрын
Jorge jr I thought the idea was that no one gets the private key?
@yvfg326
@yvfg326 7 жыл бұрын
thank u so much u want video plz about reed solomn
@markmillenium438
@markmillenium438 2 жыл бұрын
GHCQ?
@atulshriwastva3595
@atulshriwastva3595 6 жыл бұрын
where is the other video after this first ?
@malluk4127
@malluk4127 6 жыл бұрын
Atul, check his channel... He has more videos listed...
@gaabinubatrafinulifilit122
@gaabinubatrafinulifilit122 8 жыл бұрын
Alice ? Who the fuck is Alice ?
@skateboards3571
@skateboards3571 8 жыл бұрын
your wife, and she's cheating on you...
@coldfrostbyte5344
@coldfrostbyte5344 8 жыл бұрын
Decode this if you can- PGZ1Y2s=
@chrisredmon5494
@chrisredmon5494 8 жыл бұрын
Dark Moon I can see the house of black.
@almicc
@almicc 8 жыл бұрын
Dark Moon it's a bad word :(
@greenspringvalley
@greenspringvalley 10 жыл бұрын
outstanding
@leonardadams2341
@leonardadams2341 6 жыл бұрын
Okay so are these messages sent by email ?!?!?!
@antochess9749
@antochess9749 6 жыл бұрын
prof can plz explain stegnogrphy
@friscianviales7519
@friscianviales7519 6 жыл бұрын
Hope you bought some bitcoin for yourself, it is really expensive in 2018. Thanks for the info btw
@TooManyBrackets
@TooManyBrackets 6 жыл бұрын
6:58 Oh no! He said GHCQ.....Goodness! Kinda grates the ear like if a security expert called the CIA the IAC :-O (The rest seems okay though)
@CrazyK64
@CrazyK64 3 жыл бұрын
But Bob is cheating on Eve and she's 2yrs behind the technology in passing love notes..now what
@aksahani26
@aksahani26 9 жыл бұрын
:( very difficult 'Alice' and bob but very well explained thanks
@Multigameguy35
@Multigameguy35 9 жыл бұрын
anand sahani I think this may help.www.khanacademy.org/computing/computer-science/cryptography/crypt/v/intro-to-cryptography
@tomfearnley2354
@tomfearnley2354 8 жыл бұрын
"Hate" Wouldn't be bad in that context because he would assume she was joking....
@BrianFaure1
@BrianFaure1 8 жыл бұрын
What if Bob doesn't have a sense of humor
@dissaid
@dissaid Жыл бұрын
😎😎😎
@adamwebster1652
@adamwebster1652 10 жыл бұрын
If you give a man with an understanding of calculus/algebra 3 months to create his own cipher for mobile phone numbers what would be the best way to do it? Ciphering text is one thing but to be able to look down at your own mobile phone and in 10 seconds to be able to change a phone book full of 'jibberish' into something that will take a computer a few months to crack... What's the best method? As reward I will link you all to the best XKCD cartoon ever made(most of you will have read it already).
@schuegrafma
@schuegrafma 9 жыл бұрын
The most secure way is the so called one-time pad. But its also the least practical.
@adamwebster1652
@adamwebster1652 9 жыл бұрын
Adam Webster I came up with a vignere cipher. The 'one-time' pad is not something that given a short amount of time a (smart) person would be able to do fairly quickly in their head I think. I'm quick at this Vignere cipher now and it has only been two weeks and about four hours of practice. A mobile phone number is eleven numbers so by coming up with a 11 letter phrase I have been able to commit quickly to doing it but only on paper and I think in a year I will be able to do it without any real cognitive thinking. I think a Vignere is pretty badass and would delay a computer quite a long time. I don't mind even mentioning it here on youtube because without the key nobody can really have a crack at it. A dictionary attack proof type of vignere is nigh invincible I think? My pre-frontal cortex will always outperform a computers GPU huh!
@adamwebster1652
@adamwebster1652 9 жыл бұрын
Adam Webster My favourite thing to do it use mnemonics to memorise number plates. I'm interested in joining the police force you see and anything like this I can do in my spare time not only proves useful but absolutely fascinating. What is it about the spy stuff that makes it so much fun? I always wanted to be James Bond as a kid but until now the only thing I've had in common with him is his ability with women... I have to work at the math! :)
@adamwebster1652
@adamwebster1652 9 жыл бұрын
MdK xkcd.com/936/ YOUR REWARD! That was a fascinating read. Thank you!
@adamwebster1652
@adamwebster1652 9 жыл бұрын
Adam Webster Click the link for your XKCD cartoon reward, here it is again: xkcd.com/936/
@Sam_Hopkins
@Sam_Hopkins 8 жыл бұрын
The drawings kinda look like the drawings from the book what if
@huntertony56
@huntertony56 11 жыл бұрын
i dont understand can someone please make it simpler....
@XUndeadChampionX
@XUndeadChampionX 6 жыл бұрын
surely you investd in bitcoin
@karlreimers
@karlreimers 10 жыл бұрын
Nice video- easy to follow and understand -devoid of some irritating foreign accent.
@williamm.9429
@williamm.9429 10 жыл бұрын
RACIST
@karlreimers
@karlreimers 10 жыл бұрын
Morg'n Freem'n Tea Party Man- get educated!
@carte0000blanche
@carte0000blanche 10 жыл бұрын
Karl Reimers Super racist
@cryptojeetu7599
@cryptojeetu7599 Жыл бұрын
Bitcoin was $154.20 when this video was published.
@poisonpotato1
@poisonpotato1 7 жыл бұрын
I just want to solve the cryptoquotes in the paper
@kennethserrano2661
@kennethserrano2661 3 жыл бұрын
BSIT 3B HERE sana atin kung antndiyan
@vaibhavahuja5849
@vaibhavahuja5849 8 жыл бұрын
good
@pinruihuang8463
@pinruihuang8463 3 жыл бұрын
Alice and Bob look like xkcd characters.
@andyduly98
@andyduly98 10 жыл бұрын
Hmm very helpful, but i still got a long way to go ;)
@13antawa85
@13antawa85 4 жыл бұрын
andyduly98 did you get anywhere?
@ParadoxUmbra
@ParadoxUmbra 8 жыл бұрын
Prakash Rajendran is a legend. Thumbs up this comment if you came here from the private group on FB known as "IT UTS".
@robotslayer9690
@robotslayer9690 6 жыл бұрын
Cool c o d e
@GamingRading
@GamingRading 5 жыл бұрын
this fuckin guy knew about bitcoin in 2013
@zoeazsss5035
@zoeazsss5035 7 жыл бұрын
hey, boss, can u pay me in cryptocurrency so the govt wont know how much money I make
@HalfTelevision
@HalfTelevision 6 жыл бұрын
i use a secret language, It Would Work Easier
@dwrldgster3151
@dwrldgster3151 9 жыл бұрын
siht devol I
@ShopperPlug
@ShopperPlug 3 жыл бұрын
I didn't learn anything...
1 - Cryptography Basics
15:23
CBTVid
Рет қаралды 19 М.
Introduction to Basic Cryptography: Simple Cryptography
23:37
Ryan Riley
Рет қаралды 30 М.
The Best Band 😅 #toshleh #viralshort
00:11
Toshleh
Рет қаралды 22 МЛН
Don’t Choose The Wrong Box 😱
00:41
Topper Guild
Рет қаралды 62 МЛН
Mom Hack for Cooking Solo with a Little One! 🍳👶
00:15
5-Minute Crafts HOUSE
Рет қаралды 23 МЛН
V1a: Post-quantum cryptography (Kyber and Dilithium short course)
24:09
Lecture 12: The RSA Cryptosystem and Efficient Exponentiation by Christof Paar
1:28:27
Introduction to Cryptography by Christof Paar
Рет қаралды 164 М.
Secret Codes: A History of Cryptography (Part 1)
12:09
The Generalist Papers
Рет қаралды 87 М.
Public Key Cryptography: RSA Encryption Algorithm
16:31
Art of the Problem
Рет қаралды 944 М.
But how does bitcoin actually work?
25:16
3Blue1Brown
Рет қаралды 16 МЛН
Networking 101- The Basics of Protocols
9:23
Pico Cetef
Рет қаралды 128 М.
The Mathematics of Cryptography
13:03
Zach Star
Рет қаралды 409 М.
The Best Band 😅 #toshleh #viralshort
00:11
Toshleh
Рет қаралды 22 МЛН