cryptologist bruce schneier on the OTP: "[it's] the only provably secure cryptosystem we know of. It's also pretty much useless. Because the key has to be as long as the message, it doesn't solve the security problem. One way to look at encryption is that it takes very long secrets -- the message -- and turns them into very short secrets: the key. With a one-time pad, you haven't shrunk the secret any. It's just as hard to courier the pad to the recipient as it is to courier the message itself."
@AdamPatrizio4 ай бұрын
But it does allow you to pre-share a pad once and then have provably secure communication after that, even at great physical distances away. During the Cold War, security agencies used one-time pads in practice. So definitely not useless.
@ftj3kf38 жыл бұрын
You are missing the most important part of the One-Time-Pad(OTP): If you encrypt ALICE using the OTP every possible word with 5 Letters is a possible outcome after the encryption. The "hacker" can not know which of these set of words is the initial encrypted one. Thats why the OTP is even unconditionally secure meaning that you cannot break it even if you have infinite computational resources.
@abdelrahmangamalmahdy6 жыл бұрын
No, if you have infinite computational resources and you sniffed a very long message, you can do pattern analysis to see which random combination of letters can result into english readable text. It's fairly complicated but doable if one has unlimited computational resources.
@creamy28956 жыл бұрын
When you try out every combination of letters with the length of the message, you implicitly also try out every combination that makes the sentence a valid English sentence. So even if we assume that the message was (correct) English, Alice could've conveyed any semantic meaning that you possibly could using these 26 letters and correct English language. The only thing we know is the length of the message (though even that can be encrypted if you use appropriate methods). A pattern analysis won't help you if one possible encryption says "ATTACK ENEMY" and another "DO NOT SHOOT'. How're you gonna choose which one is right, especially if there's billions of other combinations, a lot of which directly contradict each other?
@abdelrahmangamalmahdy6 жыл бұрын
Yes, you are right.. I get it now
@sol3cito333 жыл бұрын
Exactly my thoughts.
@King_Cola2 жыл бұрын
What if the message has no meaning.. Except for the spy
@Wickedeh17GE8 жыл бұрын
The irony of stacking sheets of paper in a forest!
@sonnyhe200212 жыл бұрын
Simple, I'll give you an example to illustrate the how Eve can figure out the msg if the one time pad is used repeatedly. In the time of war, if Allies send a one time pad message to the troops in the front line to attack. If the Axis intercepts this encrypted text, they don't know what it means. But if the Allies reuse this one time pad and the Axis keep getting the same encrypted messages and the Allies keep attacking after each msg, then the Axis can figure out what that encoded msg means.
@PotadoTomado12 жыл бұрын
1. You can't share it multiple times because then you would give Eve multiple sources to work from, and he/she would be able to find patterns leading to the cypher. The one-time pad is elegant because the message is equally likely to be decoded into any sequence of letters the length of the original message. Once more messages are released, the number of possible cyphers is decreased significantly because they would have to fit with all of the messages 2. I think he'll cover that in the futur
@MrSilo8611 жыл бұрын
I love this topic. I want more :D
@ThisTall3 жыл бұрын
When considering if these are usable on a device like a smart phone. It’s worth noting that password hacking had a 50-60% success rate 10 years ago, just by having the accelerometer read the tiny differences of your hands twitching when typing one letter versus the next. Just look at your keyboard and know that you can have a password long enough to take 37,000 years to brute force crack, but Apple has at least a 60% chance of cracking it in real time by being able to read the twitch difference between you hitting the G or the H.
@subvind2 жыл бұрын
and that is why playing the guitar is more secure than playing the piano
@13WhiteFang3712 жыл бұрын
khanacademy never fails to amaze me.
@gedstrom5 жыл бұрын
The one-time-pad is the ONLY crypto scheme that can be proven immune to quantum computer cracking! Sure, it is inconvenient to have to exchange these secret keys ahead of time, but depending on the importance of what you are communicating, it might be worth it. Modern thumb drives can contain 256GB or more of random data that you can exchange with the other person, so there is little chance of running out of key material any time soon. Of course, you would need a scheme to insure that no key data is ever used more than once, and that the used key on your thumb drive is zeroed-out after it is used.
@blitzbladerr90357 жыл бұрын
this is also assuming if the code breaker knows 2 26 sided dice was used
@htawrew1312 жыл бұрын
1) If both your messages are intercepted, it is possible to brute for the one-time pad. 2) With great difficulty- that's the problem with the one-time pad.
@KodakYarr2 жыл бұрын
Yes, which is why it's called a "*one* time pad." You only ever encrypt one single message with it, after which it is discarded. If you reuse it you immediately open the door to pattern analysis.
@MasonC2K10 жыл бұрын
I understand the idea here. But to me it seems impractical given the previously given scenario that Bob and Alice are separated. When Alice writes her message she is also creating the key using the one time pad. How would Bob be able to have the key that Alice created after they have already parted. She would have to send him the key as well which defeats the purpose. In order for encryption and decryption to work of distance both parties have to have the key beforehand.
@ethalum10 жыл бұрын
True. Key exchange is now the big problem people want to solve. We now know that the one time pad is the best, but we don't know how to exchange keys over large distances. Google 'Key exchange' then there is loads more to learn!
@rlvsun10 жыл бұрын
During the ww2 and cold war this was the method of encryption used by the soviet spies. There is actual photos of the one time pad plus i understand that each spy agent has a boss who give them the one time pad, so both of them has the key to cypher and decipher the messages. They agree to use certain page in certain day.
@rohbinsonsamuel675510 жыл бұрын
ethalum once a very long pad has been securely sent it can be used for numerous future messages, until the sum of their sizes equals the size of the pad.... Exemple : use a book as the key u have just to give ur friend the name of that book.
@thelurkingpanda360510 жыл бұрын
send the next key in the message :)
@opmike34310 жыл бұрын
Rohbinson Samuel Reusing one time pads SEVERELY cripples their security. Unless you're just transmitting gibberish, the occurrence of frequently used words like "and" and "the" can be used to compromise your code. Once has to assume that it won't just be some dude with a paper and a pencil trying to crack the code.
@moothemooer43224 жыл бұрын
It is interesting that the time of the video is 2:56.
@78anurag3 жыл бұрын
How
@Patman12812 жыл бұрын
This is true, but only if they can figure out a likely string of text in the encrypted message and verify it by decrypting the same fragment in each message that uses the same key. Then, using the fragments in the other letters, guess more possible combinations for nearby letters and verify those. That's why it's the one-time pad; it's strength relies on it's ambiguity. With only 1 key and 1 encrypted message, it could be absolutely anything!
@ZTechSecurity4 жыл бұрын
What is the function of that small dial thing?? @0:30
@sonnyhe200212 жыл бұрын
Well the one time pad is an arbitrary string or sequence of numbers(string can be converted to a list of numbers). You just shift the 1st letter in your msg with the 1st in the one time pad, then the 2nd letter with the 2nd number in the one time pad, and so on. Once all the letters in the original text is shifted, u'll get your cipher text. Bob decrypts the cipher text by unshifting it with the one time pad, which he should have.
@callmedragon53218 ай бұрын
Unless you know the answer breaking it is always 1: in the total number of possibilities. Basically this video explains why you won't win the lottery
@dunx12511 жыл бұрын
Please release more videos on this topic!
@IrregularPineapples12 жыл бұрын
More of this! Please!
@computer_gai10 ай бұрын
greate work !
@ROMAQHICKS12 жыл бұрын
That is right. This encryption is usually broken as a result of an encoder using the same page more then once. @PhantomAct : You second questions answer is that the two cryptographer has to be together at some point in order to obtain a copy of the same pad. This is the reason why the Allies spent a decent amount of resources trying to obtain Axis OTP during the wars. But if you had the pad you had to keep it a secret from your enemy or they would just get a new OTP.
@rohbinsonsamuel675510 жыл бұрын
the best way to send keys is on the messages themselves i mean : you give the first key of the first (plantext)message to your friend physically, then when you send the message just add the key of the second message in this one , when you send the second message you add the key of 3th msg and so on... add the key in plantext not in ciphertext. example : plantext : yourmsg...nextkeyisjkjljkjlj that's it :)
@thelurkingpanda360510 жыл бұрын
yo
@ArkaidynSenpaii10 жыл бұрын
Well then all it would take is 1 message to be broken, then every message after that could be deciphered because you will have access to the source of encryption for the next message :P
@thelurkingpanda360510 жыл бұрын
But how would you break the previous ones? You don't have the key and its even harder because you can hide the cipher in the plaintext, further screwing them up. Even better, you can decide its like every 5th letter or something.
@rohbinsonsamuel67559 жыл бұрын
Arkaidyn impossible. because they don't have the key of the first message who were given to your friend physically....
@ArkaidynSenpaii9 жыл бұрын
Rohbinson Samuel The flaw is that all you need is to crack 1 code, and then you have access to read every message send after that since the code the new code is contained in the message, every previous message is safe just not the message that is cracked or any of the ones that follow.
@megaelliott12 жыл бұрын
Some random numbers could be used to swap letters around instead of shift them. So, for example, if the random numbers are 4,9,5,11,17, you would swap every 4th letter, then every 9th, 5th, 11th, 17th, etc.
@imfasa12 жыл бұрын
the list has to be shared beforehand. Another requirement is, of course, that there should only be two copies of the list. if someone gets the key he will be able to decrypt the text. That a weakness in using this method, but if used correctly, it is the only unbreakable decryption method.
@Sarthex11 жыл бұрын
So, this is basically a vigenère cipher with a key that's the same length as the message?
@Lojikish12 жыл бұрын
(1) If you use it twice, then the encryption method simplifies to a Vigenere Cipher (like a fancy shift cipher) and is vulnerable to a frequency attack. (2) To share, use a courier?
@johnroyce86503 жыл бұрын
To share the one-time pad key, **always** use a trusted courier for that matter.
@joeymatee12 жыл бұрын
these videos are amazing, is there any possibility of getting more?
@drkcaey12 жыл бұрын
I believe this is like PSK, Pre-Shared Key where you'll always have the other person, the receiver, to know the transition method to encryption.
@mrfrankincense12 жыл бұрын
It means you only use that specific sequence of random numbers once because two intercepted letters using the same set of random shifts could be broken.
@TheProjekton9 жыл бұрын
There's only one problem with this type of cipher. If the key is random then the only way the receiver of the encrypted message would be able to view it, would be if you sent the key along with the message. Thus, making it readable to anyone who understands basic cryptography, which is something anyone can google now'a days. Now remember, it's called the *One-Time* Pad for a reason, meaning the key can only be used once. If the same key is used more than once then the cipher is no longer a One-Time Pad cipher, it's just a standard Vernam cipher. Which is more vulnerable to being broken. This type of cipher is more used to keep anyone from viewing something than it is to communicate between individuals. It's best to keep in mind that nothing you send with encryption is 100% secure. Not even a One-Time Pad cipher is 100% secure as it only appears to be impossible to break because of how long it would take, but it can be broken. Especially with the power of molecular and even quantum computers which are being tested and even used to some degree now.
@Henry-fv3bc8 жыл бұрын
It is totally impossible to break a one time pad encryption - even with infinite computational resources, quantum or not. This is because, mathematically, there is no information stored in the encrypted message. Every possible decryption is equally likely. Using the example of a five-letter word, every possible five letter word is equally likely to be the decryption. The downside to OTP is that the key must be secure and it can only be used once.
@ineednochannelyoutube53846 жыл бұрын
The key is sent before the message. Probably before the reciever even departed. This makes the use nieche, yes, but it is still the most secure system that exists.
@Entity31412 жыл бұрын
How do they share the key?
@ProsyMe Жыл бұрын
keep khan academy free by paying for it, let's go!
@KulasangarGowrisangar6 жыл бұрын
Plus the key can't have repetitions is it? If so in the 0:37, there's N written twice! Or is it for a single word?
@ineednochannelyoutube53846 жыл бұрын
It can have repetitions, as true randomness will in fact produce long strings of repetitions.
@PostFormitable12 жыл бұрын
No Cause in this method you can use the same spacing but in randomness it is VERY unlikely that it'll happen. For instance if I am protecting this message Hello Then a random number generated is 2 2 2 2 2 (WHICH IS VERYYY UNLIKELY) I would get the message as J G N N Q. But obviously getting 2 2 2 2 2 in random is like saying 1/26 * 1/26 * 1/26 * 1/26 * 1/26. Remember were not taking out a gap after we use it. Otherwise this method would only be useful for messages less then 26.
@sonnyhe200212 жыл бұрын
What do u mean 'chaotic algorithm'? If you are saying to encrypt with randomness, then you'll have to think about how Bob is going to decrypt the message. Or are you talking about salting random chars in the message? Then a longer one time pad will have the same effect.
@PostFormitable12 жыл бұрын
Cause he gets all pieces of the information to solve it e.g. the shift numbers, which direction it shifts, and the encrypted message.
@piggy63943 жыл бұрын
Thank you very much. Very easy to understand. I got so curious that I did the math in Excel. You notice that the OTP has 21 21 19 for E L E, this should have been Z G X, not Z G N heheh, not that it matters so much
@abetlen12 жыл бұрын
As for the second part of your question the OTP is used by several governments including the United States of America and the British government, as I understand it the keys are typically transported to the recipients location ahead of time and under HEAVY security.
@bautrey12 жыл бұрын
More of this series!!
@PostFormitable12 жыл бұрын
So bob gets the random numbers ? or the crypt message ? And if bob gets both, then couldn't eve figure it out, considering the random numbers are the instructions to decrypt it ?
@sonnyhe200212 жыл бұрын
Well all encryption have to share the keys before hand, so i don't think this is a weakness of the one time pad. The only weakness is you can only use it once.
@frilansspion12 жыл бұрын
they have the key from the beginning. an agent would have a bunch of keys to use (dont know if they had an id nr or something to tell which). if used twice you can work out some letters by just trying shifts and comparing what makes words. a fair bit of work but can potentially be done, as opposed to with just the one sheet. I think. :)
@throwawayaccount37073 жыл бұрын
The point of OTP is that the key should only be used once, hence the name. Reusing the key would obviously compromise it.
@pieinghigh11 жыл бұрын
I recommend to anyone interested in the topic to check out Numberphile's two videos on the Enigma machine from WWII; very good stuff.
@megaelliott12 жыл бұрын
You could have a secret chaotic algorithm that generates random numbers. That way Alice could attach the input for the alorithm to the message, and it could be different each time a message is sent, and Eve wouldn't be able to work out the shift.
@fruitygranulizer540 Жыл бұрын
creating an algorithm that generates truly random numbers is, with our current knowledge, impossible
@bautrey12 жыл бұрын
Do more videos in this series!!
@dreinertson12 жыл бұрын
To get your OTP through Customs, you might try swallowing some microfilm. You need to make absolutely sure the OTP isn't read surreptitiously in transit. If your job is to defeat someone else's OTP system, you can either search Bob's room, hack his computer, or ask him to show you the OTP. Of course, this is exactly the problem. If you had a perfectly secure and convenient way of distributing OTPs, you'd have a secure way of sending messages.
@fashizzle Жыл бұрын
Let's say Alice and Bob put together 1,000 one-time pads in advance, during a time where the threat of interception was much lower. Later on if they needed to communicate securely in a time when interception was much higher, they can now use the one-time pads they already created and shared with each other earlier. This is why they can still be more useful. You can limit your vulnerable period to one secure exchange and then have numerous less secure exchanges afterwards
@jlmknight12 жыл бұрын
but would it not be 26*25*24*23*22 because you wouldn't want to have one letter representing more that one letter, ie one to one mapping?
@00chips12 жыл бұрын
1) Because then you have a repeating pattern (Occurs twice).
@pradeepvenkatesan580611 жыл бұрын
best way to explain !!! keep it up !!! (y)
@michaellentz28876 жыл бұрын
How and when, is the list of random offsets shared ?
@SlickBlackCadillac3 жыл бұрын
It would have to be shared in person. And then you could never use the same one time pad again. If you didn't want to share it in person, you would need to use a different encryption method to transmit the pad. Well, now the pad would only be as strong as the form of encryption you used to transmit it. So it is by far the least convenient as it requires a great deal of anticipation and energy to protecting the secrecy of the one time pad by both parties. Hardly useful in MOST applications.
@johnroyce86503 жыл бұрын
@@SlickBlackCadillac Except military and diplomatic communication, and espionage
@SlickBlackCadillac3 жыл бұрын
@@johnroyce8650 what is the definition of "most"?
@bautrey12 жыл бұрын
I want more of this!!
@mica1222134 жыл бұрын
more of this 8=====D?
@XenoContact8 жыл бұрын
Assume quantum technology well mastered. Would a well developed quantum processor still struggle to crack it in a reasonable amount of time?
@quietcivic8 жыл бұрын
It would fail to crack it for a very simple reason. Because of the equal frequency distribution, it is as likely that the answer is 'Alice' as the answer be 'Julie', 'Woods', or any other five-letter word (assuming it even is a word in the English language). The sheer number of possibilities coupled with the countless 'false' positives makes quantum computing no help in cracking this.
@Walshy20006 жыл бұрын
What conditions need to be met to ensure perfect security?
@KodakYarr2 жыл бұрын
1. Never reuse an OTP to encrypt more than one message under any circumstances. 2. Make absolutely sure that the distribution of the OTP's is not at any point compromised. 3. Agents must keep their OTP's secure at all times making absolutely sure the OTP's are never copied or otherwise revealed. 4. Implement a method allowing an agent to identify or find out which OTP's have been used but which message they have missed allowing them to cull and annihilate those OTP's. 5. After an OTP has been used to unencrypt a message the OTP must immediately be annihilated.
@teenfoe10 жыл бұрын
ham radio? you listen to the numbers stations?
@25karensarmiento8 жыл бұрын
Then how is the recipient able to read the message? Does Alice need to send the key as well? Then Eve can break it too? So is she the only one with the key and the only one able to read it???
@rz55058 жыл бұрын
The key is communicated before the message transmission through a secure channel. For example, this one-time pad is used in Washington-Moscow hotline where the key is communicated through a secure telephone before the real message is exchanged.
@imfasa12 жыл бұрын
yeah sort of... but what i mean is that only getting the key to the other person might be considered as dangerous (you take the risk of the key being intercepted) anyway, have a nice day :)
@masterofktulu12 жыл бұрын
Again... wow..
@KhanAcademyLabs12 жыл бұрын
Yes, we are still in the world of "Private Key" cryptography which requires A and B to meet first. Public Key cryptography deals with the case when they cannot meet first. Coming soon!
@andreaspanagi31496 жыл бұрын
Does anyone know what is that metal thing between the numbers and the encrypted message she uses to encrypt the message in the beginning?
@16D12 жыл бұрын
if i were to capture a bunch of these cipher text, can i eventually break the encryption?
@ineednochannelyoutube53846 жыл бұрын
no as long as the key is changed literally every bit.
@samuelfeder976411 жыл бұрын
I think unfortunately the method is slightly missrepresented here because the spaces where kept (because it makes it easier to follow visually I suppose). The spaces should however be treated as characters as well making it a 27 letter alphabet (all letters plus space).
@samuelfeder976411 жыл бұрын
If this is done the only thing that EVE might still get out of the message is length of the total message, and if we would add some random letters at the end EVE would only get an upper bound on the lenght of the message.
@LionKimbro3 жыл бұрын
OTP is great! But it's not bulletproof, for all cryptographic purposes. If someone can anticipate what the encrypted message might be, (like for example, perhaps it could be something crazy and unusual like, "GET / HTTP/1.1", but if that could be guessed --) then the attacker can modify the message in place. There are ways to protect an OTP against this kind of an attack, but it's an additional step.
@Lawh10 жыл бұрын
What if you'd have multiple messages with this same key. Could you then start to decipher the messages in the same fashion as with the more simple example? You would stack them all up and see which letters are repeated. I'm not smart enough to see if that would work or not.
@opmike34310 жыл бұрын
If you're using the "pad" more than once, than it is no longer a "one time pad."
@noxure12 жыл бұрын
You're not far off, but algorithms can not behave chaotically; the idea itself is a paradox. Algorithms can only generate pseudo-random numbers which where we have to hide it source, but in theory it can always be reverse engineered by a competent hacker. To solve this problem we use specialized hardware that is actually chaotic in nature. It's basically a box containing a small quantity of radioactive material that measures it's decay and convert that to numbers.
@mandingaification12 жыл бұрын
It wouldn't be 1 kilometer tall because it would fall over. :)
@zcnaipowered74074 ай бұрын
Imagine it falling on the message recipient
@Lojikish12 жыл бұрын
Nothing is foolproof, even the one time pad.
@ineednochannelyoutube53846 жыл бұрын
Fools can indeed ruin everything.
@davidemodi76178 жыл бұрын
perfect
@jlmknight12 жыл бұрын
I do agree getting 5 in a row is very unlikely, but getting say 2 in a row is not so much, say your same message HELLO became JGNNQ but what if H=N , E=G, L=N, O= Q, so now when decrypting N's how do you know whether it is an H or an L?
@hassannazar41789 жыл бұрын
That is all good.. But for the one-time pad cryptosystem to work, We have to somehow be able to share the One-time pad with the recipient without EVE finding out. Because if Eve gets ahold of the one time pad, then she can just as easy as the recipient decrypt the text. RSA is by far the best solution to this.
@csiszar3119 жыл бұрын
***** That's the biggest flaw with this system. The best way to encrypt imo is to develop a personal language with the recipient verbally, then when both understand it, wirte it down. It'll have the same effect as the use of the Navajo language by the U.S. in WWII.
@hassannazar41789 жыл бұрын
Ανδρέας Ανάγνος There is an encryption standard called RSA which is used all over the world today. You do not need to share the decryption key with the recipient thus this becomes full proof. Look at the RSA encryption video by khanacademy. It is also used in modern technologies such as your credit card chip etc.
@anonymousmystery829 жыл бұрын
***** you can also use SHA or MD5 for hash encryption..
@lilbahr9 жыл бұрын
+Hassan Nazar Well, basically you only need to meet once. Absolutely, if there is no way to meet, ever, then obviously OTP is not going to work. But if it is possible to meet at least once, then there is no reason to use anything else except OTP, for _strategic_ messaging. 1 TB disk of key and the two parties can talk for the rest of their lives, in ABSOLUTE secrecy. RSA or other means can not provide this.
@hassannazar41789 жыл бұрын
+lilbahr CORRECTION: They CAN indeed provide the same level of secrecy, also... without the need to ever meet up. Thus it is by far superior. Secondly, we are talking about a scenario which is applicable in our modern era with internet and technology! A place where one guy from Europe wants to confidentially converse with a business guy from Asia. Is it possible for them to physically meet up, maybe, but why? When you have RSA..
@StanleyZheng9 жыл бұрын
Is there any way to effectively crack this code?
@ArtOfTheProblem9 жыл бұрын
+Stan the MAN nope...
@StanleyZheng9 жыл бұрын
wow the perfect cipher! Took long enough...
@Andrewsafb719 жыл бұрын
+Stan the MAN It's existed for at least a century
@StanleyZheng9 жыл бұрын
I know, but it's still quite modern
@msss1268 жыл бұрын
+Stan the MAN Well, it is about 100 years old. The reason it isn't more popular is because of practical concerns. It is hard to generate genuinely random keys. Then the other problem is distributing these keys.
@ThamizhanDaa18 жыл бұрын
Isn't this the same thing as using Vigenere Cipher with the length as the same length as the message?
@baklava4238 жыл бұрын
better late than never: nope, the vigenere cipher makes use of a keyword, e.g. LIGHT, which then is repeated to match the length of the plaintext (e.g. LIGHTLIGHTLI). in addition the OTP can never be broken, because it relies on (true) randomness, whereas the vigenere cipher relies on the keyword mentioned above.
@ThamizhanDaa18 жыл бұрын
+Steakkini okay so what I meant is that the word that is repeated is just as long as the message , then it would be the same idea, right? so, the if the message is LIGHT, then using the word FISHY as the key would be the same thing as what the video is explaining, right?
@ThamizhanDaa18 жыл бұрын
+Steakkini okay so what I meant is that the word that is repeated is just as long as the message , then it would be the same idea, right? so, the if the message is LIGHT, then using the word FISHY as the key would be the same thing as what the video is explaining, right?
@baklava4238 жыл бұрын
that is true, i suppose. but isn't this (from an abstract point of view) true for any other crypto system? as far as i understand, keys (e.g. in AES) are applied over and over again, but with some additional stuff going on (like substitution, permutation etc. for confusion).
@baklava4238 жыл бұрын
whoops didnt see your full comment, sry. for the scenario of LIGHT and FISHY it is probably the same, but i actually dont know how problematic using a real word as keyword in this case is.
@frilansspion12 жыл бұрын
launch codes are a kind of a password isnt it, not a cipher. what has that to do with OTPs? "need to know the length of the code"? to decrypt something youd obviously need the encrypted message. the "length" is the same as that.
@jlmknight12 жыл бұрын
but my argument is that what if all the letters a,l,i,c,e all get mapped to the same letter, say T, then it would be encrypted as TTTTT...but then it is useless because the word is no longer recoverable, there for your options for the first letter is 26, then for the second 25 because you cant use the one you chose the letter A, and soo one till you get 22 for the last letter
@rohbinsonsamuel675510 жыл бұрын
if u wanna send a clear message... then use the key as a message and a ciphertext as a key, Example : (HELLO) is the real message (WATER) is the message u send (DEEPF) is the key.... so here (HELLO) is the Plaintext (WATER) is the Onetimepad (DEEPF) is the ciphertext ... you can send an ordinary letter hidden a message.
@Jedidiah1310 жыл бұрын
what is the device that she is turning in the video??? can anyone tell me?
@warped_rider10 жыл бұрын
Cipher wheel.
@KhanAcademyLabs12 жыл бұрын
No it must be 26*26*26...otherwise you'd be eliminating possibilities. There is a 1/26^5 chance that ALICE would be encrypted as ALICE - and this is okay. I will go into more detail soon!
@markgriz12 жыл бұрын
Bob has the same one time pad key. It's the secure sharing of the key which is the greatest weakness of the one time pad.
@BrentDeJong11 жыл бұрын
You don't choose that letter, you shift by that letter.
@MrBumbo9012 жыл бұрын
We need moreeee
@vaibhavpatil261110 жыл бұрын
how do we always get a uniform frequency distribution in one time pad?
@opmike34310 жыл бұрын
Make sure your random number generation is TRULY random. If you're asking why true randomness leads to uniform frequency distribution, this is covered in the video at around 2:00.
@ArkaidynSenpaii10 жыл бұрын
Because the number of the shift is found through rolling a dice, the source of the shift is always random, the number selected always has 1/26 probability, therefore you get the even distribution.
@lucaswilson8989 жыл бұрын
vaibhav patil It's basically a different ceasar cipher for each letter in the message. That means that every letter turns into a random letter (each having a 1/26 chance). This substitution favors no letters causing it to be uniform.
@ineednochannelyoutube53846 жыл бұрын
+Arkaidyn Except dice are not truely random. Use isotope decay instead.
@KulasangarGowrisangar6 жыл бұрын
I don't get it, how bob would decrypt it back to plain text by using the same key (I mean the random number shifts shown in the vid)?
@Caleb-qr6lo6 жыл бұрын
to encrypt you add the specified shifts ... to decrypt you subtract the shifts. simple. Bob has to know the key of course.
@hfulhorst4 жыл бұрын
*QUANTUM COMPUTING*
@TimWarner12 жыл бұрын
@megaelliott Isn't using an algorithm potentially a source of leak? My understanding is that many cypher algorithms are well known, so statistical analysis might reveal the algorithm and put the code breaker closer to knowing the secret input. BTW, I read an article some time back about NSA using mathematical analysis to find suspicious encoded messages within the flow of internet traffic; this is way over my head, but it does make me question the assertion that OTP is unbreakable.
@SPastaL9 жыл бұрын
the stack of outcomes would be too Damn high!
@FluorescentGreen57 жыл бұрын
otp is only uncrackable because of it's lack of a message authentication code. no MAC means it's vulnerable to being corrupted. as far as im concerned, OTP is just a basic XOR cipher with large single use keys and no MAC
@ineednochannelyoutube53846 жыл бұрын
What makes it special is that the key is single use.
@rachelz10418 жыл бұрын
hello!! could someone please do me a really big favor and tell me what kind of dice I can use to generate the random shifts I would need in order to create my own encrypted text? I'm trying to make my own for a paper that I have to write for school but I'm struggling to find a 26 sided dice like they use in the video. Any advice would be helpful :)
@rachelz10418 жыл бұрын
+Khan Academy please help if you could
@XenoContact8 жыл бұрын
I can help you out with that. If you want I could write you a piece of software that handles that for you.
@throwawayaccount37073 жыл бұрын
@@rachelz1041 It doesn't have to be specifically 26-sided dice (I don't think that kind of dice exists anyway; the ones used in the video are certainly not 26-sided). It could be anything as long as it's truly random (so no using algorithm like the person above me probably wanted to do, because that would be pseudorandom).
@andrizeemynizee862312 жыл бұрын
yjod od dp serdp,r@ (this is so awesome!) I did this by shifting my hands over one place to the right on my keyboard.
@spacecat31984 жыл бұрын
Hmm yeah, but then it could be a little more complex by using a different keyboard layout (eg DVORAK).
@xandersotheraccount23564 жыл бұрын
@@spacecat3198 lol wanker
@spacecat31984 жыл бұрын
Handon McKak Any reason why you’re so rude?
@xandersotheraccount23564 жыл бұрын
@@spacecat3198 You sound like you want to be smart. Idk
@spacecat31984 жыл бұрын
Handon McKak Not really no.
@TraceguyRune4 жыл бұрын
What I gather. If your password is 5 characters (a-z). A computer only needs 12,000,000 guesses to get it right, which should take less than a mute
@randomvideos36287 жыл бұрын
How would it be (26)^5? If alice rolls a 26 sided dice 26 times, then each of the 26 outcomes should be associated with each letter. then it should be 26 factorial. isn't it?
@kennethkretschmer10273 жыл бұрын
Only if the encrypted message is 26 characters long.
@kineticstar5 жыл бұрын
But this only works from point to point. Computer A to Computer B. This is useless in a networked system because of the need of multiple people and devices having access to the Cypher. It is based of the German enigma machine from ww2 which was cracked due to unit capture and mathematical analysis. Unless you can scale it and keep it secure this will remains a pipe dream.
@toby99992 жыл бұрын
Then don't use it for network systems. It's a case of using the right tool for the job. It is the right tool for some jobs.
@imfasa12 жыл бұрын
0:23 "and shared this with Bob"
@TempestTossedWaters12 жыл бұрын
But you can only send one message with that so what's the use really? It would often be more trouble than it's worth because you would have to share the key too.
@ineednochannelyoutube53846 жыл бұрын
Espionage reports and orders mostly.
@PostFormitable12 жыл бұрын
Cause I would tell you also that the turns. Turns meaning whether the jump is to the left of the alphabet or to the right of the alphabet. So if I was encrypting the message Hello even more securely, I would tell you that the turn alternates every letter and it starts with a forward jump. Therefore you can decrypt it. E.g. Here decrypt this using the above: 5 1 9 16 21 M D U V J
@IrregularPineapples12 жыл бұрын
More of this?
@habesha977912 жыл бұрын
i think they already agreed on the all the shift.
@justinchan104510 жыл бұрын
Wait, it was that easy that whole time?
@Sukuraidogai10 жыл бұрын
The problem is the key has to be as long as the message you want to send, and you can't share your key with someone else to send them the message without the possibility of jeapordizing the key's secrecy.
@ineednochannelyoutube53846 жыл бұрын
+Sukuraidogai And generating a truly random key is really bloody hard too.
@ineednochannelyoutube53844 жыл бұрын
@@superresistant0 Insufficient. In reality fissile matrrial is usally used.
@9668jake12 жыл бұрын
i don't get it... how does bob solve it?
@masterbobp7 жыл бұрын
Isn't that the same idea as the monoalphabetic cipher ??
@johnroyce86503 жыл бұрын
One-time pad = just basically a polyalphabetic Vigenere cipher with a truly random key long as the message, never reused.
@victorgrottil530310 жыл бұрын
Decrypt this 4-letter word: WQFD Good luck.
@vaibhavpatil261110 жыл бұрын
is it caeser, polyalphabetic or one time pad cipher ?