How to keep an open secret with mathematics.

  Рет қаралды 269,056

Stand-up Maths

Stand-up Maths

4 жыл бұрын

Shamir's Secret Sharing on wikipedia.
en.wikipedia.org/wiki/Shamir%...
Teaching resource! This was made by a high school teacher in the US to use with Algebra 1, Algebra 2 and Pre-calc. It's a work in progress but you can get it here: www.dropbox.com/s/snee4of46ig...
I made the animated parabola in GeoGebra with help from my mate Ben Sparks. Here is the GeoGebra5 file if you'd like to have a play:
www.dropbox.com/s/zydcy38eeda...
Read about finite fields on MathWorld:
mathworld.wolfram.com/FiniteFi...
Shamir Secret Sharing used with Bitcoin:
blog.trezor.io/shamir-backup-...
And for balance, an argument against using Shamir Sharing with Bitcoin, but rather Multisignature.
blog.keys.casa/shamirs-secret...
CORRECTIONS
- None yet, let me know if you spot any mistakes!
Thanks again, as always, to Jane Street for supporting this channel.
www.janestreet.com/
Thanks to my Patreon supporters who help make these videos possible. Here is a random subset:
Michael Lehenbauer
Peter Gerrard
Matthew Roberts
Ben White
Jan Strohbeck
Lucas Werkmeister
Support my channel and I can make more maths videos:
/ standupmaths
Filming and editing by Alex Genn-Bash
Music by Howard Carter
Design by Simon Wright
MATT PARKER: Stand-up Mathematician
Website: standupmaths.com/
Maths book: wwwh.umble-pi.com
Nerdy maths toys: mathsgear.co.uk/

Пікірлер: 693
@spewkkake
@spewkkake 4 жыл бұрын
SUMS: S: stand U: up M: math S: s
@BaldAndroid
@BaldAndroid 4 жыл бұрын
Acronym
@KiroOsexXIII
@KiroOsexXIII 4 жыл бұрын
@@Ymparipyorailija That's a Parker spelling of Parker.
@thetntsheep4075
@thetntsheep4075 4 жыл бұрын
So for Americans it's just "SUM"
@Ymparipyorailija
@Ymparipyorailija 4 жыл бұрын
Oof. In the true Parker manner, my comment is incorrect in multiple ways.
@scottdebrestian9875
@scottdebrestian9875 4 жыл бұрын
A Parker password.
@rq4740
@rq4740 4 жыл бұрын
Teachers would have a much easier time getting their students to care about quadratics if they told them that they can solve polynomials to access someone's financial accounts
@adambascal
@adambascal 4 жыл бұрын
So true lol
@JoostMehrtens
@JoostMehrtens 4 жыл бұрын
My teacher told us we need math to maintain our own financial accounts, how boring...
@nickmartin7418
@nickmartin7418 4 жыл бұрын
Matt: This number is random and has no meaning. Everyone: That number definitely has meaning.
@Leyrann
@Leyrann 4 жыл бұрын
I'm lazy, I just go through the comments to see if it has a meaning or not.
@numero7mojeangering
@numero7mojeangering 3 жыл бұрын
@@Leyrann same
@lexingtonbrython1897
@lexingtonbrython1897 4 жыл бұрын
Matt's valuables are: a business card Level 2 Menger sponge, a ream of brown paper, a copy of Humble Pi, and a framed picture of the Parker Square
@thefountainpendesk
@thefountainpendesk 4 жыл бұрын
What about things to make and do in the 4th dimension
@OrcinusDrake
@OrcinusDrake 4 жыл бұрын
@@thefountainpendesk that's encoded in micro engravings on the business card
@amydebuitleir
@amydebuitleir 4 жыл бұрын
@@thefountainpendesk Wow, someone else likes both fountain pens, maths, and Matt Parker! At least. I assume you like fountain pens. If not, strange choice of usernames. ;)
@thefountainpendesk
@thefountainpendesk 4 жыл бұрын
@@amydebuitleir yeah I use em all the time
@isidore551
@isidore551 4 жыл бұрын
Horcruxes
@jaxielrivera4640
@jaxielrivera4640 4 жыл бұрын
Matt: There is no meaning behind 41,366,362 Me: No, there has to be. I googled the number and one of the things that came up was an adobe file image (with the number as its file ID) and it’s a 3D animated couple kissing and hugging, so the secret meaning is that he loves math. There it is. I got it guys, you’re welcome.
@U014B
@U014B 4 жыл бұрын
Sauce?
@yerwol
@yerwol 4 жыл бұрын
@@U014B he..... _literally_ told you how he found it. Go to google, put the number in, and click 'images'.....
@iAmTheSquidThing
@iAmTheSquidThing 4 жыл бұрын
There has to be some meaning here. Let's work it out together. What's the 41st letter of the alphabet?
@lexingtonbrython1897
@lexingtonbrython1897 4 жыл бұрын
@@iAmTheSquidThing Hurricanes start using Greek letters if there's more than 26 named storms in a season 41 - 26 = 15 15th Greek letter is Omicron (just 'o') so that doesnt help; 15th Latin letter is also O by sheer luck
@I25mI25
@I25mI25 4 жыл бұрын
@@yerwol It is possible that you wont find that image with google, since google factors a lot more than the search term itself into the results it is showing you. While it is likely, that everybody can find that image (especially when adding adobe), different configurations could theoretically cause you to not get that image as a result.
@Yoshiiro
@Yoshiiro 4 жыл бұрын
The clever-one : My password are the last 6 digits of Pi. The mathematician : It's impossible to guess. The engineer : I'll iterate from 000000 to 999999, should take a couple of seconds.
@calansmith655
@calansmith655 4 жыл бұрын
Yoshiiro Took me a second to get it, but that is genius
@nibblrrr7124
@nibblrrr7124 4 жыл бұрын
lol (well, technically the mathematician would say the clever-one's password was ill-defined, and probably conclude that they don't know what they're talking about :P)
@zeikjt
@zeikjt 4 жыл бұрын
@@calansmith655 Haha, same!
@delve_
@delve_ 4 жыл бұрын
Yo, would some kind soul be willing to explain? I don't think I get it.
@zeikjt
@zeikjt 4 жыл бұрын
@@delve_ since it's only 6 digits you can write a program to try out all possible combinations of digits really easily (this is known as brute forcing) instead of trying anything more complicated like messing around with pi
@faastex
@faastex 4 жыл бұрын
By assuring that number had no hidden meaning, I'm now even more convinced it has a hidden meaning.
@roberttomsiii3728
@roberttomsiii3728 4 жыл бұрын
Have you figured put that answer yet? Gonna have to find the Reddit for this now ;)
@vampyricon7026
@vampyricon7026 4 жыл бұрын
BUT WHAT IS THE HIDDEN MEANING?
@jayd2279
@jayd2279 4 жыл бұрын
Well dividing it up like the other one doesn't quite work, the only meaningful ways would be 4|1|3|6|6|3|6|2 = DACFFCFB or 4|13|6|6|3|6|2 = DMFFCFB
@jayd2279
@jayd2279 4 жыл бұрын
You have any other ideas?
@faastex
@faastex 4 жыл бұрын
I'm too lazy to work it out, but I trust in you guys
@user-hi4sm3ig5j
@user-hi4sm3ig5j 4 жыл бұрын
That's complicated. I think I'll stick with my trusty '1234'. Nobody will guess that.
@LeoStaley
@LeoStaley 4 жыл бұрын
That's the code to my luggage!
@lexingtonbrython1897
@lexingtonbrython1897 4 жыл бұрын
I'm sticking with hunter2
@LeoStaley
@LeoStaley 4 жыл бұрын
@@lexingtonbrython1897 I'm pretty sure most places won't accept "*******" as a password.
@AA-100
@AA-100 4 жыл бұрын
'password' is an even better password
@hebl47
@hebl47 4 жыл бұрын
Amazing! I have the same password for my planetary shield!
@yuvalne
@yuvalne 4 жыл бұрын
Referring to Tom's video without risking your brand deal. Clever.
@Imthefake
@Imthefake 4 жыл бұрын
what video?
@typo691
@typo691 4 жыл бұрын
@@Imthefake Tom Scott's video on VPN sponsorships.
@matthewellisor5835
@matthewellisor5835 4 жыл бұрын
What are you Nording about?
@green0563
@green0563 4 жыл бұрын
Yup, loving that subtle reference.
@rareroe305
@rareroe305 4 жыл бұрын
I already watched it, but Tom's video is in my sidebar for this one.
@cosmicdeven5976
@cosmicdeven5976 4 жыл бұрын
Toms really out here risking all of his friends sponsorship deals😂😂
@GammaFn.
@GammaFn. 4 жыл бұрын
That's your password? "sums"? That doesn't add up.
@roberttomsiii3728
@roberttomsiii3728 4 жыл бұрын
Lol
@MisterHunterWolf
@MisterHunterWolf 4 жыл бұрын
Lol
@karlneff
@karlneff 4 жыл бұрын
Lol
@laurihei
@laurihei 4 жыл бұрын
Lol
@-YELDAH
@-YELDAH 4 жыл бұрын
Lol
@MephieStopheles
@MephieStopheles 4 жыл бұрын
41.36, 63.62 are Long/Lat's to a location in the desert of Uzbekistan I think he's telling us where he hid the bodies.
@gbear1005
@gbear1005 4 жыл бұрын
I am there... really.. no bodies
@aldobernaltvbernal8745
@aldobernaltvbernal8745 4 жыл бұрын
That's very close to Lake Aral, which used to be the 4th biggest lake in the world until the USSR drained it
@lolledopke
@lolledopke 4 жыл бұрын
I logged in to Matt's bank account, but because he's a mathematician I couldn't steal anything :(
@crispoman
@crispoman 4 жыл бұрын
Well, he's a complex guy, so all his money is imaginary.
@Bruno_Noobador
@Bruno_Noobador 3 жыл бұрын
69 likes. Nice
@liquidkey8204
@liquidkey8204 3 жыл бұрын
@@crispoman Oooh good one
@second-handyt3958
@second-handyt3958 3 жыл бұрын
@@crispoman this comment is better than the one you replied to
@arnet95
@arnet95 4 жыл бұрын
Shamir secret sharing is such a brilliant and beautiful idea.
@michaellin4553
@michaellin4553 4 жыл бұрын
It has many hidden uses as well, such as cryptographic commitments
@terner1234
@terner1234 4 жыл бұрын
שמיר
@peppybocan
@peppybocan 4 жыл бұрын
Yep, it is beautiful.
@astropgn
@astropgn 4 жыл бұрын
9:30 "And they said no." Hahaha matt's timing is really funny!
@robnorris4770
@robnorris4770 4 жыл бұрын
Now Matt has to change his password to something else we could never guess, like “muss”.
@vampyricon7026
@vampyricon7026 4 жыл бұрын
Leon Muss: Leader of the movement to make sure the human race stays off Mars... At least until 2026.
@djones02
@djones02 4 жыл бұрын
Thank you for clarifying the VPN claims. I'm sick of all the false advertising in VPN ads.
@konstantinkh
@konstantinkh 4 жыл бұрын
It gets better. You aren't restricted to prime-sized sets. Any finite field will do, so you can use splitting fields. These can be p^n, where p is prime and n is any integer. And yes, 2 is a valid prime for this purpose. So if you need to encode, say, 256 bit key, there's a field over which you can define a polynomial that will admit any 256 bit number, and you'll need exactly the right number of people to come together with their parts of information to know it. The algebra of such fields gets a little intense, though.
@robertwiesner6825
@robertwiesner6825 4 жыл бұрын
Thank you so much for this video. We talked about this in one of our university courses and I didn't understand it very much. Having it explained like this with pictures makes it a TON more understandable.
@zacozacoify
@zacozacoify 4 жыл бұрын
For some reason I thought it was going to generalise into planes/hyper-planes or higher dimensional lines instead of polynomials.
@lierdakil
@lierdakil 4 жыл бұрын
9:23 "The only people who will see it [data] are you [...] and ExpressVPN" Not strictly true. Once the tunnel terminates -- and it eventually has to -- "the data" travels through the Internet unencrypted (unless it would've been encrypted without VPN also). Which means that once "the data" left the relative safety of the encrypted tunnel, it can (in theory) be seen by any number of third parties. In essence, using a VPN is trading your ISP for your VPN service. I mean, if you don't trust your ISP, or if you want to circumvent geographical restrictions, sure, VPN services are great for that. But those otherwise offer no more security than there is already there. In fact, those offer arguably _less_ security, since (a) VPN services are kinda shady with their stated no-logs policies often being in direct conflict with local laws, and (b) VPN services can be a prime target for malicious agents and/or government agencies -- if a VPN is compromised, it's statistically speaking less "secure" (in terms of possible data leaks) than not using a VPN at all.
@nibblrrr7124
@nibblrrr7124 4 жыл бұрын
Yep. The selling points of VPNs are mostly overblown, esp. in the age of widespread HTTPS. If you trust their intentions & capabilities, they can provide some anonymity for your _metadata_ to third parties, at the cost of them knowing your entire browsing history. But a vague sense of "security" apparently is easier to market than an all-eggs-in-one-basket mass surveillance self-defence strategy. Or illicit filesharing. :^) Tor e.g. is better for anonymity - it doesn't require you to trust _any_ single party. (And no, "Three Letter Agency runs exit relays" is not even in the same ballpark as "Three Letter Agency has a backdoor at your VPN provider")
@rene0
@rene0 4 жыл бұрын
You're missing the point of a VPN. The primary goal more often than not is not to encrypt the message, but to conceal the clients identity to the remote party. The VPN merely serves as a proxy and the encryption is a bonus. It offers little protection against state-level targeted attacks but is usually sufficient for small civil offenses like copying music. Informed users will not have the illusion of high-level protection, only journalists seem to.
@wolvenmoonstone8138
@wolvenmoonstone8138 4 жыл бұрын
video aside i really appreciated the honesty of that ad spot. VPN companies tend to be really manipulative and oversell themselves but not this time it fits the rest of the video better this way
@danieln7777
@danieln7777 4 жыл бұрын
That's incredible! Thanks for showing me this awesome math! I wrote my own program that does this and it was a lot of fun. Thanks for inspiring me today!
@boudmaths
@boudmaths 4 жыл бұрын
At 7:48 you said: "preferably a prime" Well it's not an option, I mean for the integers mod n be a field n has to be a prime
@ManuelBTC21
@ManuelBTC21 4 жыл бұрын
A power of a prime also works, but then you need to not just do modulo operations, you also have to divide by a reducing polynomial.
@DeGuerre
@DeGuerre 4 жыл бұрын
In most cryptographic applications, 2^k for some k is more usual because anything in binary is trivial to represent as an element of the field. There's another gotcha here, in that working in this field is a little more complicated. In field GF(p), the elements are just the integers mod p. In GF(p^k), the elements are polynomials of degree k-1 with coefficients in GF(p). (GF means Galois Field, by the way, but just think "finite field".)
@SillyMakesVids
@SillyMakesVids 4 жыл бұрын
I finally understand the use of polynomials in cryptography!
@defenestrated23
@defenestrated23 4 жыл бұрын
Equation-over-finite-field-modulo-huge-prime is the basis of a TON of cryptography. RSA, Diffie-Hellman and elliptic curve crypto of course come to mind. Oh and I think Reed-Solomon error correction codes are related as well. Computer security: Brought to you by Galois
@francomiranda706
@francomiranda706 4 жыл бұрын
3:10 "oh hes obviously talking about prime numbers, awesome" 3:24 "what..."
@SSardonic
@SSardonic 3 жыл бұрын
Did the same thing. 3:10 "factorize. Factorize! FACTORIZE! :D" 3:24 "... oh :/" Unsurprisingly, his version is better
@JasonSmith0
@JasonSmith0 4 жыл бұрын
I always imagined this is how horcruxes are implemented.
@willemvandebeek
@willemvandebeek 4 жыл бұрын
Happy new year and best wishes for 12020, Matt and company! :)
@isaiahlopez51
@isaiahlopez51 4 жыл бұрын
This is so amazing!! Love this video!
@thekmotr135
@thekmotr135 4 жыл бұрын
Or maybe use: Random x,y,z (similar digit count as “sums”) Use formula 19,211,319 + x + y + z = Result 1. Friend gets x 2. Friend gets y 3. Friend gets z 4. Friend gets Result Everyone is needed
@wingracer1614
@wingracer1614 4 жыл бұрын
You don't want everyone to be needed. What if you and friend 1 die in a car crash? The remaining friends can't access your secret.
@sublivion5024
@sublivion5024 4 жыл бұрын
Having 1 or 2 values would make checking all values easier
@K0nomi
@K0nomi 3 жыл бұрын
1:24 when the impostor
@bagelmeister2295
@bagelmeister2295 3 жыл бұрын
Is su_s
@glowstonelovepad9294
@glowstonelovepad9294 2 жыл бұрын
my feet is sus
@Shaquille69355
@Shaquille69355 4 жыл бұрын
Guys I just signed into his KZbin channel.
@MK-13337
@MK-13337 4 жыл бұрын
To get a finite field you *need* the number to be prime if you take your field as the congruence classes. If you take modulo of a composite number it's going to be a ring
@christianbarnay2499
@christianbarnay2499 4 жыл бұрын
Not only primes. Powers of primes also generate finite fields. They are not used with RSA because RSA is weaker on those fields. But elliptic curve cryptography doesn't have this issue.
@MK-13337
@MK-13337 4 жыл бұрын
@@christianbarnay2499 If I recall correctly (I took algebra years ago), you get a finite field from p^n if you consider some polynomials or roots of degree p^n..? I might very well be wrong and I'm too lazy to check but what I meant was if you just have [x] mod p^n (the congruence classes modulo p^n) then p*p^(n-1) = p^n =0 mod p^n and we no longer have a field.
@christianbarnay2499
@christianbarnay2499 4 жыл бұрын
@@MK-13337 Oh, you're right I was not fully awake when I read your comment. p^n fields are not modular.
@vylbird8014
@vylbird8014 4 жыл бұрын
If you calculate more points on your polynomial than you need, and pass them all to one person, you get something that looks a lot like Reed-Solomon forward error correction coding.
@nibblrrr7124
@nibblrrr7124 4 жыл бұрын
oooh, fascinating! * zoom in on claude shannon in the background, amusedly eating popcorn *
@ethanjensen661
@ethanjensen661 4 жыл бұрын
So fun seeing you in MathVengers, Euler's game this year!
@midik13
@midik13 3 жыл бұрын
excited to see this topic covered. My master's thesis was on this subject!:)
@marcoantonio5662
@marcoantonio5662 3 жыл бұрын
What a nice explanation! Thanks a lot!
@MrChernobyl22
@MrChernobyl22 4 жыл бұрын
Awesome! So simple and yet very clever
@benjaminsonntag7262
@benjaminsonntag7262 4 жыл бұрын
For us linux user, the package named "ssss" allows you to do a Shamir Secret Sharing easily (using the commnd line ;) )
@nibblrrr7124
@nibblrrr7124 4 жыл бұрын
Neat, didn't know that one! (Though it seems to be some guy's hobby project from 2006 & not actively maintained, so maybe don't rely on it for super important stuff. ^^)
@JNCressey
@JNCressey 4 жыл бұрын
Bob: What does the fourth S stand for? Alice: It's a secret.
@DiegoMathemagician
@DiegoMathemagician 4 жыл бұрын
These ideas are so neat wow
@infundere
@infundere 4 жыл бұрын
nicely explained, good job.
@madacol
@madacol 4 жыл бұрын
Awesome!. Loved this topic!
@phasm42
@phasm42 4 жыл бұрын
Brilliantly explained.
2 жыл бұрын
Great video! Thanks a lot!
@slunce12
@slunce12 4 жыл бұрын
This was probably the firsts VNP ad spot that didn't make me feel all icky :D Thanks Matt!
@AlexanderRafferty
@AlexanderRafferty 4 жыл бұрын
I was expecting him to simply split the password into several binary strings that need to be XORd to recover the original password.
@radadadadee
@radadadadee 4 жыл бұрын
That's clever but not as clever as Shamir's idea because you can't set a min threshold to unlock the secret. With XOR'd bits you need all of the pieces to unlock.
@Slikx666
@Slikx666 4 жыл бұрын
I've got dyslexia, it's funny what smelling mistakes are in my passwords.
@michaljanecek1103
@michaljanecek1103 4 ай бұрын
This was awesome!
@jameshouseweart
@jameshouseweart 4 жыл бұрын
Finally a real vpn add. Toms video about them is really informative.
@mmburgess11
@mmburgess11 4 жыл бұрын
I hide all my passwords in the comments section of "Watch Later" maths videos under a pseudonym....No self-respecting crook would ever watch maths videos, let alone all the comments.
@phyjeeksiitjee
@phyjeeksiitjee 10 күн бұрын
I will now
@nitfumble
@nitfumble 4 жыл бұрын
Leaving a nice comment, because I like Matt's videos!
@compugab
@compugab 4 жыл бұрын
Simple yet effective!!! I like that!!!
@PsychoMuffinSDM
@PsychoMuffinSDM 4 жыл бұрын
If someone told me this when I was in middle school learning about y=mx+b, I think I would have been so much more intrigued. And I liked math already too!
@NStripleseven
@NStripleseven 3 жыл бұрын
That’d be an interesting social experiment. If you took some really high-value polynomial, handed out points to, say, 1 thousand people around the world, and also gave each of those people a name of another person who was participating, how long would it take for those people to find each other and figure out what the polynomial was?
@NoMoreUsersAvailible
@NoMoreUsersAvailible 4 жыл бұрын
Some HSM (hardware security modules) vendors use Shamir Secret Sharing to implement their operator threshold systems. For example, the nCipher line (which was bought by Thales a while back and just recently was sold to Entrust) uses it to export the security world master keys to the backup/admin card sets in an M of N threshold.
@clandestin011
@clandestin011 4 жыл бұрын
"The solution of course, is to not use real numbers" the way he said cracked me up so bad
@samuelalphabet5360
@samuelalphabet5360 4 жыл бұрын
im only 30 seconds in but imma have to call "Stand Up MathS" a Parker Password AND a Parker acronym EDIT: Aight I watched the rest of the video this is pretty cool
@patrickboner
@patrickboner 4 жыл бұрын
Thanks for the password
@__mk_km__
@__mk_km__ 4 жыл бұрын
You can use a simpler system if all of the keys are required to get the secret. Generate N-1 random numbers. Then take the reciprocal of a multiple of those numbers, multiplied by the secret(everything in a finite field of course). Those N numbers are the keys. To get the secret, you just multiply all of the numbers together. The last key contains most of the information, provided you can recover it. But factorising a large number is very hard(and AFAIK can only be done with bruteforce if in a field) Shamir Secret Sharing System is more flexible though, since you can generate however many keys you like.
@thecoolkid440
@thecoolkid440 4 жыл бұрын
You could do a focus video on all of RSA from a math perspective. You could do an entire video on each attack on RSA and how those attacks are solved. The math behind cryptography is beautiful. I would encourage everyone to look up Ron Rivest, Adi Shamir, Leonard Adleman. The developers and the namesake of RSA which is widley used today with little competition. The only other system that comec close (off the top of my head) is ECC.
@kultek
@kultek 4 жыл бұрын
Now another great way to answer my students’ question of “When will I ever use this?!”
@smallbar2012
@smallbar2012 4 жыл бұрын
Big fan of that Parker Transition at 8:18.
@Archeious
@Archeious 4 жыл бұрын
I use SSS at work. We use it to unencrypt servers on boot. The servers requires a very long manual password or 3 authentication servers have to agree to unlock the server. This is nice as it mean if a server reboots in the middle of the night it will automatically unlock (as long as there are authentication servers). Check out Tang and Clevis if you are interested in running the service locally.
@nibblrrr7124
@nibblrrr7124 4 жыл бұрын
Ooooh that is cool! Thanks for the tip! (Maybe add _Network-Bound Disk Encryption_ to your search query; turns out clevises & tangs are also mechanical parts. ^^)
@Archeious
@Archeious 4 жыл бұрын
@@nibblrrr7124 LOL Good idea. I forgot about that. Man it was a pain, but I now know what a mechanical tang/clevis is.
@I_Echion
@I_Echion 4 жыл бұрын
Late congratulations on 500k
@danielb7006
@danielb7006 4 жыл бұрын
It's okay, he said he would celebrate at 2^19
@RealCadde
@RealCadde 4 жыл бұрын
"If i die" You sharing your key with anyone isn't the solution at all. In the case of death, the solution is that you didn't reset a timer and whatever was locked is now unlocked. There's a few ways of doing this. 1) You install a battery that will keep a string loaded locking mechanism locked as long as the battery has enough power. You come back just before the battery is about to run out of juice and when it unlocks, you install a new battery. 2) You have a computer that you log into (with your password ofc) to reset the timer. If the timer elapses, the computer spits out the secret. The only way to get the secret out is for the timer to elapse. Meaning your action of logging in doesn't give anyone access to the secret, not even yourself. 3) You encrypt your secret with an encryption you are certain will be solvable in a few years time from now as computers evolve. This means regardless what happens, once the encryption is broken, the secret is out there whether you are alive or not (and whether you want to or not) 4) You don't keep secrets. You make people BELIEVE you have secrets and watch the world burn as they do everything in their power to get it. Meanwhile you live a happy sheltered life because people think your secrets are so valuable that they will do everything in their power to keep you happy. OR ELSE!
@christianbarnay2499
@christianbarnay2499 4 жыл бұрын
1 is defeated by shorting the battery to make it run out faster. 2 is defeated by stealing the computer and letting the timer run out. 3 is not a good solution: "if I die" also means "as soon as I die". The purpose of such measure is to allow your backup team to reach your secret as soon as they have the information that you're dead. So they can access your accounts and do actions like ending contracts with automated payments or retrieving the combination to the safe box that contains your written and signed will. They shouldn't have to wait several years until the encryption is broken for that.
@RealCadde
@RealCadde 4 жыл бұрын
@@christianbarnay2499 1 What makes you think you can short out the battery? The battery is on the inside of the vault/safe. If your secret isn't a physical object but a digital one then you don't have a need for a battery. 2 What makes you think stealing the "computer" will help? 3 If you need that kind of solution then you'd have to watch the video. I am talking about secrets here, not "cancellation of your subscription to premiumhentai". In any case, have some bloody imagination for christ sake. If you have a secret that you want to share IF you die then you don't need to involve other people for that. If however you have a secret you DON'T want to share ever then... Don't put it anywhere to begin with.
@RealCadde
@RealCadde 4 жыл бұрын
@@christianbarnay2499 Also, your "DOS" attack comment that isn't showing up... Cool story bro but that's not how it works.
@christianbarnay2499
@christianbarnay2499 4 жыл бұрын
@@RealCadde I removed my DOS comment because I had misread your comment the first time and I figured out my misunderstanding after I had published it.
@christianbarnay2499
@christianbarnay2499 4 жыл бұрын
@@RealCadde Of course the best way to keep a secret for yourself is to never give any clue to that secret to anyone. But the purpose of this video is to be able to recover it either for yourself in case you have forgotten it (the initial hidden paper pieces scheme of the video) or allow a set of trusted people to gather and act on your behalf in case you can't do it yourself. 1. If the battery is inside then you can apply the physical equivalent of a DOS attack. The bad guy prevents you from reaching the safe in time and opens it when the battery runs out and the spring loaded mechanism unlocks. There are so many ways to slow down someone without raising suspicion. For example a simple accident on the road that creates a traffic jam. 2. Either the timer is directly on the computer and by stealing it you prevent the owner from resetting it, or the timer is on a remote server and then the initial DOS comment I removed becomes relevant. 3. Where does that hentai nonsense come from? I am talking about serious things when I mention your will and important contracts that need to be acted upon as fast as possible after your death. One example that comes to my mind right now is recovering your bitcoin wallet. And when I said automated payments I was thinking mortgages, rents and things like that which can add up to huge amounts, not a couple subscriptions to websites. The relevant point here is that you need the secret to be retrievable by a trusted group of people right after your death. Not whenever the encryption is broken, be it in a year, or a decade, or never because the encryption is stronger than you expected or another encryption scheme has peeked the interest of experts and nobody is working anymore on trying to break the one you're using.
@MintyBlaziken
@MintyBlaziken 4 жыл бұрын
Somebody graph the Bee movie script
@RJSnyper
@RJSnyper 4 жыл бұрын
I had something similar that I used for a long time where I would write two or three words nearby to whatever needed the password. The password wasn't the words, but rather the result of some order of operations done on those letters (converted into numbers) that was then translated back into letters to form a random string. All you have to do is remember a fairly basic order of operations, but the odds of somebody finding several words, converting them to numbers, running them through 3 or 4 specific math operations, and then converting them back into a string of letters that don't actually spell anything, seems quite low.
@darksentinel082
@darksentinel082 4 жыл бұрын
perfect for my upcoming puzzle~
@matthewstuckenbruck5834
@matthewstuckenbruck5834 4 жыл бұрын
I wish he'd shown us an example of how one could reduce the number of possibilities by seeing it as a continuous function.
@CraigNull
@CraigNull 4 жыл бұрын
I think, strictly speaking, what happens is the probability density of what the unknown number could be sharpens considerably but no possibility is completely ruled out with incomplete information. For instance, maybe the search space "reduces" in the sense that what was previously 10^200 equally like possibilities is now 95% certainty the solution is among just 10^10 possibilities.
@gyroninjamodder
@gyroninjamodder 4 жыл бұрын
@@CraigNull Isn't it infinite in both cases?
@jetison333
@jetison333 4 жыл бұрын
@@gyroninjamodder technically yes, but we are only sharing finite data so the number will be an integer or only have so many decimals.
@DeGuerre
@DeGuerre 4 жыл бұрын
Remember, the secret is an integer, and the coefficients of the polynomial are too.
@Look_Dad_Old_Tunes
@Look_Dad_Old_Tunes 3 жыл бұрын
That was a Pretty Good Video.
@aaronr.9644
@aaronr.9644 4 жыл бұрын
pretty cool!
@ThomasGiles
@ThomasGiles 4 жыл бұрын
Interesting stuff! So if you've cut the poly into tons of dots... how would those 2 people (or whatever) get back to their original value to then work out the secret value where it crosses Y?
@ethanshaw8256
@ethanshaw8256 4 жыл бұрын
Love the video! Expected prime factorization and got something much cooler. Where can I buy your shirt? It’s beautiful
@stephenkamenar
@stephenkamenar 4 жыл бұрын
very useful trick
@user-oc3sl4to9m
@user-oc3sl4to9m 4 жыл бұрын
Surely it would’ve been easier to get his number then do some operation to it ( for example divide by 3)have the answer as one of the secrets then the reverse operation as the other (x3). Neither secret would make it easier to find the original answer You could split it up to any number of people by doing more operations to get back to the first secret
@MatthewStinar
@MatthewStinar 4 жыл бұрын
Just last week I was trying to remember the name of this. I knew it was something secret algorithm, but that wasn't nearly enough to find it by it's name. Just like his example, I was looking for some sort of break glass mechanism for multiple people to cooperate to retrieve sensitive information they otherwise should have access to individually.
@aakashmaniar9494
@aakashmaniar9494 4 жыл бұрын
The fact that the number has no meaning makes that number special & meaningful
@fuckoffgoogle12
@fuckoffgoogle12 4 жыл бұрын
That is incredibly clever.
@juanpods
@juanpods 3 жыл бұрын
boi... HE SUS
@MechazoidApocalypse
@MechazoidApocalypse 4 жыл бұрын
Can someone explain how that finite field works? How do you get the answer from 3 points for example?
@CraigNull
@CraigNull 4 жыл бұрын
Take Z_5, the field with elements 0, 1, 2, 3, 4. Don't know how familiar you are with how you get the answer with real numbers so here's an over-abundance of details. There's an quadratic polynomial p(x) = a0 + a1*x + a2*x^2 with unknown coefficients a0, a1, a2 (where a0 is the password). You have the three points (xi, yi) for i = 1, 2, 3. Construct 3x3 matrix M where the (i, j) element is xi^(j-1) and make column vector y from the yi. Have a be the unknown column vector with entries a0, a1, a2. If you keep the order of things proper and consistent and more careful than I can be in a youtube comment then the equation M*a = y, if you multiply out the left side, is just saying p(xi) = yi, one row each for i = 1, 2, 3. To solve for vector a you invert matrix M and multiply it through on the left. The inverse of M will always exist so long as the xi are distinct. Z_5 hasn't entered the picture yet, because everything I said so far is true no matter what the field is. For Z_5 the elements in M are just one of 0, 1, 2, 3, 4. The inverse can be computed entirely in Z_5. It's not hard to do by hand, just keep modding by 5. The weird part is multiplicative inverses. Just keep in mind you don't have things like "1/2", you have to use the quirky multiplication table of Z_5, where the inverse of 2 is 3 (since they multiply to 1), etc. So once you have M inverse, M^(-1), you compute vector a with a = M^(-1)*y. In this cryptographic application you only need one of the rows, since a0 is all you're after
@musikSkool
@musikSkool 4 жыл бұрын
Additive OTPC with wraparound for when you run out of letters. "test" = 20 5 19 20 Add these two together to get the secret, "test" "pine" = 16 9 14 5 "dveo" = 4 22 5 15 Notice how "i" and "v" are 9 and 22, that makes 31, if it is larger than 26 you subtract 26, making 5, or "e" in the output. Any number can be added to your number to get any output. Unhackable with only one number.
@musikSkool
@musikSkool 4 жыл бұрын
In the case where you don't want anyone to know the length of the secret, simply add a bunch of null characters and use 27 as the wraparound. Example: "test" = 20 5 19 20 "pinepine" = 16 9 14 5 16 9 14 5 "dweokrmv" = 4 23 5 15 11 18 13 22 If the numbers add up to 27 that is a null character and not a letter, it isn't added to the output. Notice how the "v" in the previous example became "w" in this one. It is because the wraparound number is 27 now instead of 26, allowing for the null character. This secret word can be any length of letters up to 8, disguising the length of the secret. We call this "padding" in cryptology.
@IMYTnNERDEE2
@IMYTnNERDEE2 4 жыл бұрын
like the action music behind
@gm90rt24
@gm90rt24 4 жыл бұрын
I missunderstand you because I do not know alot at english but you are great. happy new year for you from iraq😍
@chraman169
@chraman169 4 жыл бұрын
0:00 - 0:10 would be my hair loss
@TintagelEmrys
@TintagelEmrys 4 жыл бұрын
I would have thought you also could have just given everyone a factor of the secret, so only once all are together could they know what the full number is.
@Richard_is_cool
@Richard_is_cool 4 жыл бұрын
The music is pretty good.
@olgierdvoneverec4135
@olgierdvoneverec4135 4 жыл бұрын
I use hashing, meaning i also split my passwords in 2 except one of the parts is the way in witch you have to transform the other part for it to work.
@drewdurant3835
@drewdurant3835 4 жыл бұрын
Happy new year!!
@therabbit3307
@therabbit3307 4 жыл бұрын
This is the first KZbin video I watch in 2020.
@Seth_M-T
@Seth_M-T 3 жыл бұрын
I'm so sorry.
@therabbit3307
@therabbit3307 3 жыл бұрын
@@Seth_M-T Wait. This is actually really funny
@mateuszkubala1800
@mateuszkubala1800 4 жыл бұрын
This is beautiful maths
@SirRyuk92
@SirRyuk92 4 жыл бұрын
what the hell, this video is sick, how did i not know of this channel before
@theajayyy
@theajayyy 4 жыл бұрын
It is your lucky day
@nibblrrr7124
@nibblrrr7124 4 жыл бұрын
FYI, Matt also made a lot of videos on Numberphile, and gave two Royal Institution talks on his books which I liked a lot. James "singingbanana" Grime does similar videos on maths, and so does Matt's friend Steve Mould does more in the direction of science/physics. :3 (Also in case you haven't heard of all of those: Tom Scott, 3b1b, Vihart, Science Asylum, PBS Spacetime, Veritasium, Vsauce)
@theajayyy
@theajayyy 4 жыл бұрын
@@nibblrrr7124 don't forget CGP Grey and Kursgezagt
@Richardincancale
@Richardincancale 4 жыл бұрын
Nice and interesting - thanks. But did you think the quite loud background music would help? Your voice is fine ‘a Capella’!
@gordonrichardson2972
@gordonrichardson2972 4 жыл бұрын
The combination of low audio volume and background music makes the narration barely intelligible. Good way to hide information in the video...
@PaulMansfield
@PaulMansfield 4 жыл бұрын
Check out the Vault application from Hashicorp.
@mina86
@mina86 4 жыл бұрын
There are hardware encryption devices which use the scheme as well.
@mjbe
@mjbe 4 жыл бұрын
Playlist in background, so at first glance I thought he was going to talk about RAID parity. Then I remembered what the video was.
@jan_harald
@jan_harald 4 жыл бұрын
that's a neat trick in case you die or get in an accident or such, sure the trick is to always keep one of the required parts with you, so that you will always know when somebody's got your password, and use this sharing for your password manager's password (if you're not big brain and don't use a stateless manager)
@MateusSFigueiredo
@MateusSFigueiredo 4 жыл бұрын
First, vandalism in Sidney. Now, bypassing the subway Wi-Fi barriers. Who knew Matt Parker was such a bad boy?
@factsverse9957
@factsverse9957 4 жыл бұрын
Huh happy new year 2020!
@Ahop63
@Ahop63 3 жыл бұрын
Wow, thanks for making cryptography surprisingly simple.
@ebrahimalfardan8823
@ebrahimalfardan8823 4 жыл бұрын
Great idea to never lose a password again
When Spreadsheets Attack!
16:27
Stand-up Maths
Рет қаралды 295 М.
How to mathematically calculate a fall through the Earth
24:07
Stand-up Maths
Рет қаралды 534 М.
Smart Sigma Kid #funny #sigma #comedy
00:40
CRAZY GREAPA
Рет қаралды 26 МЛН
Sigma Kid Hair #funny #sigma #comedy
00:33
CRAZY GREAPA
Рет қаралды 39 МЛН
Nastya and SeanDoesMagic
00:16
Nastya
Рет қаралды 38 МЛН
An unexciting video about distance derivatives
23:41
Stand-up Maths
Рет қаралды 297 М.
What is a Vampire Matrix?
12:15
Stand-up Maths
Рет қаралды 326 М.
The Greenwich Meridian is in the wrong place
25:07
Stand-up Maths
Рет қаралды 173 М.
Why π^π^π^π could be an integer (for all we know!).
15:21
Stand-up Maths
Рет қаралды 3,3 МЛН
Secret Sharing Explained Visually
7:57
Art of the Problem
Рет қаралды 51 М.
Will a falling pencil hit the table? We do the maths!
16:19
Stand-up Maths
Рет қаралды 290 М.
Exploring the mysteries of the Prime (gaps!) Line.
24:37
Stand-up Maths
Рет қаралды 591 М.
This equation will change how you see the world (the logistic map)
18:39
How does a calculator find square roots?
11:24
The Unqualified Tutor
Рет қаралды 119 М.
I found Amongi in the digits of pi!
18:04
Stand-up Maths
Рет қаралды 600 М.
Вся страна в очередях, а ты без очереди...
0:52
МиRRные Чувства
Рет қаралды 7 МЛН
Арбузорезка 🍉
0:42
Сан Тан
Рет қаралды 3,3 МЛН
Аниматоры в форме СПЕЦНАЗА: Именинника разыграли
0:21
Собиратель новостей
Рет қаралды 12 МЛН