The Science of Codes: An Intro to Cryptography

  Рет қаралды 1,149,672

SciShow

SciShow

Күн бұрын

Пікірлер: 1 400
@scabiniful
@scabiniful 9 жыл бұрын
passing notes in class just got a lot more interesting
@afeishalopez4524
@afeishalopez4524 2 жыл бұрын
hahah😂😂😂😂 true
@Combes_
@Combes_ 2 жыл бұрын
@@xingyuliu1890 i bet they won't when they don't get caught passing test anwsers because they used the cipher
@erlynvasquez1962
@erlynvasquez1962 Жыл бұрын
I gave this to a crush I had
@bitonic589
@bitonic589 Жыл бұрын
hah, ik this is from 8 years ago, but imagine a teacher so confident aboutta bust a student, but then seeing "faojnfb hbba klpp hanv kkso"
@imnotcool1203
@imnotcool1203 7 ай бұрын
THAT'S WHY I SEARCHED THIS UP
@NukeIvex
@NukeIvex 9 жыл бұрын
When you crack Caesar ciphers, do they ask "Et tu, Brute force?" Hides from impending mob.
@AplaTaSpaw
@AplaTaSpaw 7 жыл бұрын
Kevin Xue Oh man exactly my kind of humour...well played :D
@Leah-xe6xs
@Leah-xe6xs 5 жыл бұрын
Huh?
@dominic2446
@dominic2446 5 жыл бұрын
i dont get this.
@SomeBuddy777
@SomeBuddy777 5 жыл бұрын
You don't get his story!
@sureshotshorts1207
@sureshotshorts1207 4 жыл бұрын
Haha man....!
@d.tt.wilding7740
@d.tt.wilding7740 4 жыл бұрын
he's telling me this so enthusiastically like if he's helping me get away with a top secret. I almost feel bad for having nothing to hide
@govindagovindaji4662
@govindagovindaji4662 2 жыл бұрын
LOL~!
@ShadowGhost-n8d
@ShadowGhost-n8d 3 ай бұрын
Interesting. Hmmmmm
@chaz8837
@chaz8837 8 жыл бұрын
Enigma is a truly brilliant approach to cryptography. The weakness is the common wording of course. So we can take common words out of the cipher altogether. When using enigma one must not use common words at all. so we can make different substitutes for common words like "the"
@JamesDavy2009
@JamesDavy2009 8 жыл бұрын
Or »das«, »der«, »die« and »Fuehrer« back when they operated them. In fact, Enigma messages began with a three-letter operator code (at first repeated once to make a six-letter operator code).
@gecsus
@gecsus 3 жыл бұрын
The answer is too simple. Simply group all the words into 5 letter groups and there are no common words to find. It comes out like this "thisi sames saget hatus esfiv elett ergro upsin itfin" It's just not translated for clarity. If you can't read it, it says "this is a message that uses five letter groups in it fin."
@himesilva
@himesilva Жыл бұрын
@@gecsus That somehow seems too obvious. Would it really work?
@gecsus
@gecsus Жыл бұрын
@@himesilva It actually is used by military. When a message is encoded it must be grouped into 5 letter groupings so that the common word sequences are not obtainable. Otherwise it would be easily decoded. Could you even recognize the message example even though it wasn't encoded? The next problem is letter frequencies. Like "E" is the most commonly used letter in the alphabet for English words. Words like it, we, us, be, etc, are limited in number. Single letter words a very easy as well, as they are VERY limited in number (I, & A)
@TheYafaShow
@TheYafaShow 9 жыл бұрын
Two cryptographers walk into a bar. Nobody else has a clue what they're talking about.
@ShallowBeThyGames
@ShallowBeThyGames 9 жыл бұрын
***** Who'd have known a cryptographer would be scuppered by predictive text.
@stuvs830
@stuvs830 9 жыл бұрын
@Ka P that took me a sec.
@TaylorYarick
@TaylorYarick 9 жыл бұрын
+Stu VS I'm not gonna lie. I don't get it
@цветок-ш7п
@цветок-ш7п 8 жыл бұрын
+TheYafaShow lol i got it in less than a minza
@TaylorYarick
@TaylorYarick 8 жыл бұрын
I get Ka P's joke now. I thought you'd all like to know that. It only took 3 months
@squee6970
@squee6970 8 жыл бұрын
Brute force is pretty effective on Caesar
@nicholasdreesen3223
@nicholasdreesen3223 8 жыл бұрын
even a brain could be decrypt caesar xd
@maron3563
@maron3563 8 жыл бұрын
agree :D
@maistromann136
@maistromann136 8 жыл бұрын
I understood that
@vanillatwilight82
@vanillatwilight82 8 жыл бұрын
I just screamed this is too funny i hate it
@TheMultipower47
@TheMultipower47 7 жыл бұрын
Too soon
@MetaBloxer
@MetaBloxer 8 жыл бұрын
"This should look like gibberish to you" *Gestures towards ad*
@apersonthatisliving5810
@apersonthatisliving5810 8 жыл бұрын
MetaBloxer nope
@carpenter3461
@carpenter3461 7 жыл бұрын
lol
@theoneshad0w508
@theoneshad0w508 9 жыл бұрын
How about a crash course series on this? Like if you agree.
@manguy01
@manguy01 9 жыл бұрын
I learned the Caesar Cipher in 4th grade. My teacher was awesome. _edit: 5th grade._
@SeaZucchini
@SeaZucchini 9 жыл бұрын
***** For 8 year-olds. That's kinda... I dunno, the point?
@batman88891
@batman88891 9 жыл бұрын
Matthew DeLeon Most fourth graders would be 9, wouldn't they?
@GhostKreep
@GhostKreep 9 жыл бұрын
batman88891 nope
@AwkwardCheeseIsAwkward
@AwkwardCheeseIsAwkward 9 жыл бұрын
batman88891 Depends on where you started.
@QuickLs3ns3
@QuickLs3ns3 9 жыл бұрын
MicManGuy Wtf SciShow i rewatched numberphiles videos about the enigma machine and then 3 hours later u post this video about Cryptography.. Are u spying on me? Spooky
@filipepontelima8305
@filipepontelima8305 9 жыл бұрын
I work with cryptography and I have to say: this video is amazing. Great way to teach the history of cryptography in a way easy to understand. Also very accurate and covered the most important topics of the history of cryptography
@lunam7249
@lunam7249 Жыл бұрын
your comment was very clear,...i doubt your a codewriter....hahaha
@DampeS8N
@DampeS8N 9 жыл бұрын
Very nice primer on encryption with examples. Great job! I hope you do a part 2.
@heathermarcoux294
@heathermarcoux294 9 жыл бұрын
another giveaway worth mentioning is that in your message "scishow is the greatest" you use a common two letter word, and there's only a handful of two letter words those letters could be which makes it easier to guess the proper match. Also if you had used a single letter word, there's only two possible choices because the only single letter words are "I" and "A" (assuming you're not using txt lingo)
@Suedocode
@Suedocode 9 жыл бұрын
No mention of public/private key encryption (RSA/ECC) or the current symmetric key encryption (AES)? The schemes you provided are technically symmetric key encryption, and it's such an important word/concept that I'm surprised it wasn't specifically pointed out. RSA, ECC, and AES are the most important and relevant encryption schemes. A topic about cryptography is rather silly without them, even if it's only rudimentary stuff. You don't need to describe the math behind it, but mention the concepts at the very least.
@tipomartins
@tipomartins 9 жыл бұрын
Jeremy Joachim I think they will do it in future videos, this was just the first part!
@RSP13
@RSP13 9 жыл бұрын
Jeremy Joachim It's better to present properly just a few topics then to simply scratch the surface of several ones. I would be pissed if they attempt to explain RSA is 30 seconds.
@thegingersheep
@thegingersheep 9 жыл бұрын
Jeremy Joachim While I understand the reasoning behind what you said I have to say I partially disagree. While it is true they could of gone into more advanced/modern encryption methods. This show is primarily intended to provide and introduction to topics. This allows those who are interested to explore additional information and those who are not interested to learn some and then move on.
@filipepontelima8305
@filipepontelima8305 9 жыл бұрын
Jeremy Joachim This video was clearly only about the history of cryptography. It's very complicated to explain all that for everyone and expect it from an 8 minute video is unreasonable. But the concepts introduced in the video were great and all the information absolutely correct. The only thing that the video could have mentioned is the illogical use of the one time pad: "if you have a secure way to send the secret key, why not send the message itself through this comunication, since it has the same size?" But the video was amazing.
@Suedocode
@Suedocode 9 жыл бұрын
+Filipe Ponte Lima "This video was clearly only about the history of cryptography." But it says "The _Science_ of Making and Breaking Codes". This is like titling a video "The Science of Light" and then talking about aether the entire time. "if you have a secure way to send the secret key, why not send the message itself through this comunication, since it has the same size?" You can hand them an enormous one-time pad in person once, and then have secure communications thereafter. It's much more preferable than handing them messages in person every time.
@laurafleming4377
@laurafleming4377 9 жыл бұрын
You should cover quantum cryptography - it's actually unbreakable
@NearlyInfinity
@NearlyInfinity 4 жыл бұрын
It is to current regular computers but not so much to other quantum computers
@RevolutionibusOrbiumCoelestium
@RevolutionibusOrbiumCoelestium 4 жыл бұрын
Laura Fleming - Actually that’s incorrect. Quantum cryptography is easily breakable with other quantum computers.
@NearlyInfinity
@NearlyInfinity 4 жыл бұрын
@@RevolutionibusOrbiumCoelestium Only as much as current encryption on normal computers is to break on normal computers, but quantum cryptography is un breakable to regular computers which I think they are talking about
@onyanchamotanya973
@onyanchamotanya973 3 жыл бұрын
The dai I saw a chain break through a tarmac road I knew everything is breakable
@Gruggo
@Gruggo 9 жыл бұрын
This was an incredibly interesting episode, I ended up spending at least an hour reading about encryption and hashing after watching it. Very, very interesting indeed.
@Kneedragon1962
@Kneedragon1962 9 жыл бұрын
It may be worth mentioning that the 'Bombe' made by Allen Turing and Tommy Flowers, was in many ways the world's first real electronic computer. It predated the American Colossus computer by about 4 years, and inspired it. Subsequently, Von Neuman (who had worked on Colossus) made a set of recommendations, should anyone attempt to build another one of these things. His recommendations led to the building of the first Von Neuman machines. All modern computers could reasonably be described as Von Neuman machines, because 75 years later they still comply almost exactly with Von Neuman's recommendations. Codes, specifically the Enigma, gave birth to modern computers. And, much as the NSA may annoy us, without espionage, there would be no computers.
@NotronLP
@NotronLP 8 жыл бұрын
6:16 There is a movie about that called ''The imitation game''
@annashklover3023
@annashklover3023 8 жыл бұрын
That's my favorite movie!
@Adjuni
@Adjuni 8 жыл бұрын
Love that film. Made me really sad how they treated Turing after the war. :(
@beecomesover
@beecomesover 8 жыл бұрын
yeah, watch 2 times and still love it though
@grantreynolds_1
@grantreynolds_1 8 жыл бұрын
Fantastic film
@fairlylocaldreamer7917
@fairlylocaldreamer7917 7 жыл бұрын
Yes! One of my favorite movies ever!
@wow5212
@wow5212 4 жыл бұрын
Tips for simple but effective encryption (can be programmed in python) : 1) Include spaces, commas and dots in your alphabet list as 27, 28 and 29 respectively. 2) Carry out alphabet substitution. Example : a - t, b-k, c-s ...... 3) Then, apply vigenere cipher with long key. Example : "thispasswordissohardnobodywilleverguessit" 4) Don't use capitals. It makes it MUCH easier to crack. Your end text will be completely gibberish with random dots, comma and spaces. There will be no common word lengths such as 3 for "the", 1 for "I" and others.
@franatrturcech8484
@franatrturcech8484 3 жыл бұрын
the problem is that you can only encrypt text, and with a long enough message, even frequency analysis can still be done. there is no diffusion, the mapping is still 1->1
@Imedge6
@Imedge6 9 жыл бұрын
One of the best interesting episode ever !
@Flashzinh0
@Flashzinh0 9 жыл бұрын
Mat G For sure !
@stevie-ray2020
@stevie-ray2020 9 жыл бұрын
Despite the fact that hours could be spent explaining the cracking of codes, this is an excellent and concise explanation of ciphers and deciphering!
@resisx07
@resisx07 9 жыл бұрын
Mat G " "Cribs". HA !
@rich3of3
@rich3of3 9 жыл бұрын
Mat G yes, I agree
@stevenroyalton7789
@stevenroyalton7789 9 жыл бұрын
Mat G One of the best interesting grammar ever !
@cheerios428
@cheerios428 9 жыл бұрын
This video is great! My girls who code class is doing our Cyber Security/ Cryptography unit this week and this is such a perfect video to show them! Thanks SciShow!!!!
9 жыл бұрын
"When websites announce that hackers know everything about you, that's because their encryption methods were breakable" That's not true. Most of the time the website are broken into because of unpatched or misconfigures software. It's extremely rare to be hacked because of a flaw in in the encryption methods.
@PirateTHESteam1
@PirateTHESteam1 9 жыл бұрын
Toni Lähdekorpi Well, you are partially right. You see when you hack a website you usually retrive a database filled with information. The information in this database can often be encrypted, so if you want to be able to login to lets say one of the admin accounts, you'll have to decrypt the usernames and passwords first. The method of encryption varies greatly from AES to no encryption(plain text).
@isaackarjala7916
@isaackarjala7916 9 жыл бұрын
PirateTHESteam1 in the case where an encrypted database containing passwords or credit cards is stolen, they advise changing your password and credit card out of an abundance of caution not because they believe that there is a credible risk of cryptanalysis cracking the crypto.
9 жыл бұрын
PirateTHESteam1 If they access your servers and database, they will most likely also gain access to the code itself and the keys required for decrypting anything decryptable. Passwords aren't (or shouldn't ever be) ecrypted with anything other than a one way hash that by design can not be decrypted, but rather the password is always rehashed and compared to the stored one on login. But even with the decryptable data, the problem isn't a flaw in the encryption itself.
@Fenriswaffle
@Fenriswaffle 9 жыл бұрын
PirateTHESteam1 So if I encrypt all the passwords with MD5 I'm safe rite? I'm kidding. Though I have to ask, if say for instance you DO have a database where the passwords are encrypted using MD5 for whatever reason, would it be possible to switch to another algorithm and update the password rows accordingly?
9 жыл бұрын
***** Yo dawg, you could always hash the easily brute-forceable MD5 hash and then remove the MD5 part on login.
@Kio_Kurashi
@Kio_Kurashi 9 жыл бұрын
I've made several cyphers most of which were variations of the basic ones such as Caesar's. Two of which I'm somewhat proud of. The second one is newer and not yet refined but the first one operates as such: You pick a two digit number. In this case we will use 27. Now we write out the alphabet in order in a line. Using the number of letters in the first word of our message as a key we write the 10's digit out as many times as there are letters in the word above the alphabet. Continue in this pattern going up in numbers. So 3, 4, 5... Once you have finished on top we take the one's digit and work are way down. In this case 7, 6, 5, 4... The difference here though is that we are skipping letters equivalent to half of the key rounded up. You still use the number the same amount of times. Using the top number you will create groups of the same number which would give you different numbers on the bottom. If we were to encode "This is easier than expected." then you should have something that looks like this: 2222 3333 4444 5555 6666 7777 88 abcd efgh ijkl mnop qrst uvwx yz 5375 3753 7527 4264 2642 6416 31 We now put the groups in order listing the lower numbered groups from lowest to highest. in this case we get yz qrst efgh mnop abcd uvwx ijkl. Now we take our original number which will become our second key (and a guide for the receiver) and count through all of the letters that number of times.what we land on we then take out and use for our letters in order. I.e: ABCD EFGH IJKL MNOP QRST UVWX YZ ZREM BXSA LCFK IJTP GQOH UWDN VY But there's more! Capitol letters get shifted to the left by a factor of the first key (the letters in the first word). This means that instead of the 'T' in 'This' becoming a 'H' it becomes a 'P.' Fully translated it goes as follows: "This is easier than expected." "Palo lo bzolbq hazj bnpbehbm."
@shattywack
@shattywack 9 жыл бұрын
Never really gave this subject any thought before. Man, I love this channel
@kujmous
@kujmous 9 жыл бұрын
I made an encryption process is even more powerful in that it iterated through a polyalphabetic cypher for every character just to regenerate a unique key for the subsequent character. This key regeneration was done for every ASCII character, 1 through 255. Pretty proud of it.
@GelidGanef
@GelidGanef 9 жыл бұрын
Crash Course: Cryptography & Cybersecurity? PLLLZZZZZ!!!
@favian95
@favian95 9 жыл бұрын
The logic is so simple and yet the execution is so complicated
@Seraphii874
@Seraphii874 9 жыл бұрын
It's so weird not seeing youtube views freeze at 301 anymore O_o
@manurmad1539
@manurmad1539 5 жыл бұрын
Has it really been 4 years since that was a thing?
@Needformadness2
@Needformadness2 4 жыл бұрын
@@manurmad1539 longer actually
@vyrin
@vyrin 4 жыл бұрын
those were the days
@crazyd3mon968
@crazyd3mon968 6 жыл бұрын
I had trouble understanding the vigenere cipher before watching this it's really helped me to make sense of it thanks. Edit: Just used a vigenere cipher to test my friends hopefully I did it right
@SittingGuy
@SittingGuy 9 жыл бұрын
This stuff is way too advanced for me. So I'll just keep sitting on things :D
@Mazzolli
@Mazzolli 9 жыл бұрын
Sitting Guy do you babysit?
@willlegok9
@willlegok9 9 жыл бұрын
This is extremely simple.
@Leitilumo
@Leitilumo 9 жыл бұрын
What...?
@perspectivedetective
@perspectivedetective 9 жыл бұрын
***** Ok, I don't know if this will work, but it's the only thing I could find: First, hover your mouse over the user's profile pic. That should bring up the google plus hover-over menu. Click on the little 'g+' logo to go to their google plus profile. Once there, look for the little down arrow below their profile pic/circles info on the left side of the page. Click the little down arrow, and you'll see "Mute (user)" and "Report / block (User)" options. I don't know exactly what muting a user does, but it might be worth a try.
@ellmuffin
@ellmuffin 9 жыл бұрын
I admire your honesty. Everyone, listen, Sitting Guy for President
@catebrooks6779
@catebrooks6779 9 жыл бұрын
Possibly the best SciShow episode ever... brought me back to reading Cryptonomicon. Good job!
@EvelynDayless
@EvelynDayless 9 жыл бұрын
When hackers get data it's usually because either they got access to the decrypted data or the company didn't bother encrypting it at all. They don't usually break the encryption themselves.
@arcclite1144
@arcclite1144 9 жыл бұрын
I work in healthcare programming. Cryptography up a lot, it's nice to see a SciShow video on it!
@IronDruids
@IronDruids 7 жыл бұрын
Seems to me you can get the same effect as an undecipherable code without it actually being unbreakable. Letter shift the message with the Caesar cipher, code the end result with the polyalphabetic cipher, and then use whatever other ciphers you so choose on top of all that. It should be such a momentous hassle full of trial and error while trying to figure out what ciphers were used that by the time it's decoded, the message is already unimportant with you being long gone and the scheme already accomplished. You bury them under so much busy work that you can do whatever you want in the meantime completely unhindered. Unless I'm misunderstanding how ciphers work?
@FalbertForester
@FalbertForester 5 жыл бұрын
You're right in separating "undecipherable" and "unbreakable". Most modern cryptography schemes are sets of rules that are fairly simple for computers to implement. As of yet, most of them are not proven "unbreakable", just "we think that these aren't decipherable in a reasonable amount of time". Which can be "good enough".
@CultureStress
@CultureStress 9 жыл бұрын
I'm a little bummed you didn't finish with a bit about the Navajo Codetalkers. I know it's not exactly "encryption", but it seems relevant.
@YUSOMEAN
@YUSOMEAN 8 жыл бұрын
New and better cyphers, drop some hot bars, bruv
@JoeBribiesca
@JoeBribiesca 9 жыл бұрын
INDEED, ONE OF THE BEST EPISODES OF SCISHOW YET! Way to go, team! And way to host, Michael!
@AdvosArt
@AdvosArt 9 жыл бұрын
It's funny cause I just watched top 10 memes top 10 facts gravity falls and at the start he talked about codes
@amadoudiallo8557
@amadoudiallo8557 9 жыл бұрын
Omg, me too i was about to comment that lol
@Digging4AnswersOfficial
@Digging4AnswersOfficial 9 жыл бұрын
Oh gosh same here...
@neutronstar6739
@neutronstar6739 9 жыл бұрын
Same
@stevenroyalton7789
@stevenroyalton7789 9 жыл бұрын
Holy shet a combo breaker oppurtunity! Jk same here so we are all part of this internet genius club that subbed to Lemino and scishow
@lfmm97
@lfmm97 9 жыл бұрын
This was one of the most interesting episodes so far. Great job.
@kroen
@kroen 9 жыл бұрын
If every cipher can be cracked with enough time and determination, then how come no one has yet to crach the voynich manuscript? that book has been around for over 600 years and countless people have tried and failed to crack it.
@Andytlp
@Andytlp 9 жыл бұрын
Kroen Redstone the only logical answer is.. it's plain gibberish. I can tell cuz there was illustrations of people having sex. In a herbal journal of some sort. Lmao.
@1serhiy
@1serhiy 9 жыл бұрын
Kroen Redstone people at harvard uni studies the book and noticed that most of the words inside the book are too long to form a coherent and useful language, therefore they concluded that the book is gibberish and have created a way of mimicking the gibberish via a set of rules.
@isaackarjala7916
@isaackarjala7916 9 жыл бұрын
Not every cipher can be broken, one-time-pads are mathematically impossible to crack if implemented correctly, several other algorithms might also be impossible to crack when implemented correctly, but that hasn't been proven mathematically. Also, you can't translate a language using only the written language.
@Darticus42
@Darticus42 9 жыл бұрын
tulp35000 Maybe there's some secrets the author really didn't want people to know about ;)
@thatguyitzme5725
@thatguyitzme5725 6 жыл бұрын
Kroen Redstone jibberish
@oceannuclear
@oceannuclear 8 жыл бұрын
The animation team has done a great job on this one!
@Acq49
@Acq49 9 жыл бұрын
my brain hurts
@thegingersheep
@thegingersheep 9 жыл бұрын
As someone who has a degree in Cyber Security I can say that encryption really is a double edged sword. From one site it's a great way to protect data. On the other it prevents through investigation after a breach due to the attackers using their own encryption. Sadly is its one of those situations where many develop a love/hate relationship with it.
@kathyphilip7925
@kathyphilip7925 9 жыл бұрын
Gotta love Alan Turing!
@Tryangetbetter
@Tryangetbetter 9 жыл бұрын
Fantastic video! In my third year of university we had to encrypt a message using any combination of substitution ciphers, Caeser shifts, Vigenere, and affine ciphers before then decrypting each others ciphertext. If our message got decrypted we lost marks and we gained marks by decrypting other peoples messages, it was a fun piece of coursework, especially after making a document in Excel to do all of the manual work for me :D
@glorvalmacglorvas171
@glorvalmacglorvas171 8 жыл бұрын
Here is how to make an unbreakable code: Write down random letters and just remember what you meant. :D
@288theabe
@288theabe 9 жыл бұрын
The enigma machine was the first thing that came to mind when I saw the title of this episode. Fun fact: There's one sitting in the Canadian War Museum for people to play with and it's mind-blowing how the letters changes every time. But now that I know certain letters can't be used for the same word, I just may spend more time there....until little Susie kicks my ass out of it. On a related note, the Navajo language was never broken by the Japanese in WWII either, but if the atomic bombs were never dropped and the Pacific war stretched on, I think it would've been with time.
@LukeScottgamer
@LukeScottgamer 8 жыл бұрын
Thanks Gravity Falls for teaching me this.
@Phoenixmage50
@Phoenixmage50 8 жыл бұрын
lol for me it was the overwatch arg with all that encryption and salted shit
@Chriael
@Chriael 5 жыл бұрын
Same dude!!
@marciparks3377
@marciparks3377 9 жыл бұрын
Wow Michael! I really love how into detail this episode is.
@MosukaDreamer
@MosukaDreamer 8 жыл бұрын
The guy from Vsause is named michael. Coincidence?
@SlyPearTree
@SlyPearTree 9 жыл бұрын
Nice episode. I didn't learn anything but cryptography is always an interesting subject. Can't wait for the promised follow up.
@godqueenbidoof
@godqueenbidoof 9 жыл бұрын
This was great I wish you had talked some about Steganography though, which amusingly enough google chrome's spell check doesn't recognise as a word XD
@EvelynDayless
@EvelynDayless 9 жыл бұрын
Jeff Cyr Hmm, it does for me.
@godqueenbidoof
@godqueenbidoof 9 жыл бұрын
Munashiimaru Really? I guess it's cause I have it set to UK english then
@General12th
@General12th 9 жыл бұрын
Jeff Cyr Chrome spell check doesn't recognize a lot of the technical words I use, like "apoapsis". I'm not sure why its dictionary is so limited.
@heinrichthurston6961
@heinrichthurston6961 9 жыл бұрын
***** I only know that word thanks to Artifexian. The math may not make sense but it works.
@Fenriswaffle
@Fenriswaffle 9 жыл бұрын
***** Uncommon word perhaps? Usually peri/apo are in reference to peri/aphelion which isn't common to begin with. Also I learned peri/apoapsis from the same place most people did.
@HalcyonSerenade
@HalcyonSerenade 8 жыл бұрын
Aw, I was actually hoping for some of the newer, digital encryption information! Fun stuff regardless, though. Frequency analysis would've been my go-to for the standard Caesar cipher, but being able to apply it against a varying rule is fascinating. Human ingenuity is astounding.
@tuxino
@tuxino 9 жыл бұрын
I'm not really concerned with North Korea reading my email - and unless you're doing sensitive government work and and have documents related to that in your email, you probably shouldn't be either. A whole different concern is my own government or other organizations working within my country.
@Okaiako
@Okaiako 5 жыл бұрын
Exactly, true
@strifera
@strifera 7 жыл бұрын
I legitimately just guessed the cryptogram from the start of the episode as "scishow is the best" within a second or two of seeing it with no conscious input on my end. Admittedly this ended up being obviously wrong after a second or two of consideration, but it was so in the ballpark that it might as well be on first base. I'm really proud of my brain right now.
@jk844100
@jk844100 9 жыл бұрын
Actually the Polish cracked the enigma code first.
@tomshraderd4915
@tomshraderd4915 9 жыл бұрын
jk844100 Yes, it was mentioned in the video at 6:53 under the picture.
@videogyar2
@videogyar2 9 жыл бұрын
***** The british havent decoded it fully either. In the movie The imitation game its highly overrated.
@TheApollotd
@TheApollotd 9 жыл бұрын
The polish cracked enigma (easy) Alan Turing (British) and his machine decrypt ed the code out of 159,000,000,000,000,000,000 possible combinations that kept changing every day
@habiblevi5369
@habiblevi5369 9 жыл бұрын
***** The original Enigma machine landed in a Polish customs office courtesy of Berlin. It was promptly followed by a German official claiming the crate had been sent by mistake, and to return it immediately before passing through customs. This aroused suspicion, so the customs officials took the crate apart and photographed everything they could so that a working model could be reproduced. This was in 1929, by 1932 the Poles had developed a working model and were able to decode messages, but in 1938 Germany made a new and improved model that was no longer breakable in the same way. Poland was able to smuggle all their work to the British just before they were invaded. Without that lucky circumstance, and Poland's hard work, Enigma may have never been broken during the war.
@Quadsie
@Quadsie 9 жыл бұрын
But Britain can into space
@EcceJack
@EcceJack 9 жыл бұрын
This was a very nice overview for those hearing about this for the first time - but also a nice summary for those of us who have heard more about some of these methods (especially Enigma), but really don't mind being reminded of the *big picture* every now and again. So all in all: great job! :)
@ColtaineCrows
@ColtaineCrows 9 жыл бұрын
More interested in keeping the USA out of my e-mails to be honest.
@alicered4198
@alicered4198 9 жыл бұрын
3:23 Vigenere has always been my favorite cipher.
@MagicTurtle643
@MagicTurtle643 9 жыл бұрын
Wow, great episode. I was rapt the whole time.
@JohnSF93
@JohnSF93 9 жыл бұрын
I learned to use the Playfair cipher a couple of years ago. Very simple to use, and very hard to crack. It's still possible to do letter pair frequency analysis, but you need a really large ciphertext to even get started
@DarthObscurity
@DarthObscurity 9 жыл бұрын
Why do things get brittle when they dry out?
@eightplusone7512
@eightplusone7512 9 жыл бұрын
Because moisture offer more flexible movements and typically when that happens that means it was already pretty brittle
@laurenford7232
@laurenford7232 9 жыл бұрын
Remembering the rules of this video helped me figure out a code during a mystery game with friends today. Thanks!
@MukaMoko
@MukaMoko 9 жыл бұрын
Would the Rosetta Stone be considered as an unbreakable message?
@ShaudL
@ShaudL 9 жыл бұрын
Um no.... I'd think not at least. I mean we have most of the languages on it learned and we did that by analyzing surrounding languages.... With some time given it'll be broken
@departmentofeducation7212
@departmentofeducation7212 9 жыл бұрын
Primid King He wasn't talking about the language learning program, he was talking about the actual Rosetta Stone, which helped us understand the hieroglyphic writing system of the Egyptians.
@ShaudL
@ShaudL 9 жыл бұрын
+Malboro Overking so was I 😂😂
@ShaudL
@ShaudL 9 жыл бұрын
+Malboro Overking so was I 😂😂
@ShaudL
@ShaudL 9 жыл бұрын
+Malboro Overking so was I 😂😂
@TheBigangrytexan
@TheBigangrytexan 5 жыл бұрын
Fascinating. Thank you for the video!
@sunofslavia
@sunofslavia 9 жыл бұрын
"Nice Things About Hitler" that's a pretty edgy post-punk cold-wave band name.
@jhosioja
@jhosioja 9 жыл бұрын
Would've been a perfect episode to give a nod towards Numberphile, and the fairly detailed, yet comprehensible bits they did about the Enigma, how it works and how the Poles cracked it, and why the Brits had to crack it again.
@rowboogs1
@rowboogs1 9 жыл бұрын
My brain just got brain fucked.
@KarasGamer
@KarasGamer 9 жыл бұрын
same here
@cldream
@cldream 7 жыл бұрын
Oddly enough, there's a language called Brainfuck. ;P
@israelch100
@israelch100 9 жыл бұрын
I just watched the imitation game yesterday, and this question was in my head the entire day, thanks guys!
@vinvint
@vinvint 8 жыл бұрын
use encrypted klingon
@TomKellyXY
@TomKellyXY 8 жыл бұрын
While the Enigma was cracked, the Germans never managed to crack messages from the New Zealand WWII troops who spoke plain unencrypted Te Reo Māori into the Radio
@IwulikeLOLZ
@IwulikeLOLZ 8 жыл бұрын
+Tom Kelly lmao the axis couldnt really crack any first nation languages. So when they intercepted messages usually coming from the commonwealth they didnt know what they said
@IwulikeLOLZ
@IwulikeLOLZ 8 жыл бұрын
+Tom Kelly lmao the axis couldnt really crack any first nation languages. So when they intercepted messages usually coming from the commonwealth they didnt know what they said
@IwulikeLOLZ
@IwulikeLOLZ 8 жыл бұрын
+Tom Kelly lmao the axis couldnt really crack any first nation languages. So when they intercepted messages usually coming from the commonwealth they didnt know what they said
@vlchltsemsdbscrlbrs8624
@vlchltsemsdbscrlbrs8624 6 жыл бұрын
you are looking
@nERVEcenter117
@nERVEcenter117 9 жыл бұрын
Hey SciShow, Alan Turing isn't just recognized as a mathematician, but also one of the founding geniuses of the field of computer science. If we want knowledge and interest in computer science to spread, we shouldn't hide the history of the field or its greatest contributors, especially when the topic of the video is an essential problem space in computer science.
@przemysawzych1866
@przemysawzych1866 8 жыл бұрын
I don't understand why it is so common in English programs/films not to mention about three polish cryptographers who decoded Enigma before Turing. You should have done your research more reliable.
@luckynater
@luckynater 8 жыл бұрын
source?
@przemysawzych1866
@przemysawzych1866 8 жыл бұрын
+luckynater BBC for example. you can dig deeper but this source seems easiest and still reliable. www.bbc.com/news/magazine-28167071
@someperson5506
@someperson5506 8 жыл бұрын
Didn't know that. Thank you :)
@dmitrixallo7072
@dmitrixallo7072 6 жыл бұрын
Because the UK want to glorify their 'Great' country, which is falling apart, and good that was made by other countries, they will take it, whatever they did bad, they give it to other countries. Pozdrawiam
@mrfriendlyguy
@mrfriendlyguy 8 жыл бұрын
You guys need to talk about quantum communications, and how it makes it harder to hack. It would go nicely with all this talk about encryption.
@annikaorly629
@annikaorly629 3 жыл бұрын
whos here for school?
@camillaadrain8566
@camillaadrain8566 3 жыл бұрын
I~n~v~e~s~t~i~n~B~T~C~~{}~{}~E~T~H{}{}{} W~H~A~T~S~A~P~P +~ 1 ~3 ~1 ~2 ~2 ~1 ~9 ~5 ~0 ~ 0 ~4 ~~~~~........
@froot3839
@froot3839 3 жыл бұрын
me
@prahladsaldanha568
@prahladsaldanha568 3 жыл бұрын
Really well done
@admin.....901
@admin.....901 2 жыл бұрын
Thanks~~~~~
@Robot_Overlord
@Robot_Overlord 9 жыл бұрын
That was one of the best ones yet. Keep going
@vitalymilavsky9451
@vitalymilavsky9451 9 жыл бұрын
This was a great episode, please make a follow up
@Kaalyn_HOW
@Kaalyn_HOW 9 жыл бұрын
This gave me such a headache. ...but like a good kind. Like a learning, puzzle-solvers kind. ...awesome.
@Kpac_
@Kpac_ 9 жыл бұрын
Learned so much about Alan Turing watching The Imitation Game. Didn't realize how forward thinking he was when it came to modern computers.
@sakeneden
@sakeneden 9 жыл бұрын
This is a superbly explanatory and interesting video about cryptography. Good job!
@Alifnukman
@Alifnukman 4 жыл бұрын
i dont even do anything remotely connected to this video, i dont do coding, i never learn computer science, i Dont know a single thing about cryptography, yet, i still understand your video even though its a fast pace video, thanks, now im gonna go to sleep because its 4 a.m and somehow i manage to stumble upon this video
@misschelz1
@misschelz1 5 жыл бұрын
omg Michael Aranda!! It's been ages since I've seen him !
@vatsalamolly
@vatsalamolly 9 жыл бұрын
I enjoyed this. A brief summary of my Data Security class from college, hehe.
@RonN448
@RonN448 9 жыл бұрын
Absolutely and utterly fascinating. But, I think my mind blew a fuse!
@ferrous719
@ferrous719 9 жыл бұрын
I read a book once in which they used two Identical prints of a book and a three number code. 12-18-4 referred to pg 12, line 18, word 4. easy to send msgs with common words and nearly unbreakable without the key, especially because you could use different combinations for the same word. obviously wouldn't work for data transfer, but cool for word based msgs.
@StreetKingEvolution
@StreetKingEvolution 9 жыл бұрын
Agreed! One of the most interesting episodes yet!
@harryrussell154
@harryrussell154 8 ай бұрын
The Galaxy Cipher Machine: Unbreakable encryption. Then using the Kaliko encryption method. Set up: A disc cipher machine on a spindle, the discs are like checkers in that they have notches to fit into each other. 1st wheel is the set disc with the numbers 1-80 scrambled, etched around the side, and on the top edge are three alphabets, scrambled the same, with two empty spaces to make 80 digits around the top. Each letter on the top is over a number on the side. There are 26 body discs, each having two rows (top and bottom) of 1-80 on their sides. The first message is a four number code: 1234. This is first a security check. The number 23 on the disc, 4 to the right, plus 1, gives you the security response. For the set up: The number one represents which set disc is to be used. The 23 is the number on the set disc that is under the letter on the top "E". This letter is the first body disc to be put on the spindle under the set disc. Depending on what the users invented for themselves, an even number goes left, odd/right. So the order of the body discs is the E first, then of right for the rest of the letter order for the discs. The body discs are like checkers in that they have notches for them to fit into each other. There is a dot on the bottom of the set disc somewhere between two numbers, and a dot on each side of each body disc as well. The last number of the 1234, the 4, is how many (left or right) notches to shift the discs as they are being put on using the dots as beginning points. 4 was invented to mean right for the dots so each disc has their dots spaced 4 notches to the right of the one above it. It is also decided/invented which discs go on up-side down. Once all discs are in place a tightening bolt is screwed on the spindle to secure the discs. Operation: In the coded message sent, the first 30 numbers are still part of the set up. The message follows after them. In these 30 numbers you have invented the pattern that if there are two number 6s in the 5th, 13th, 18th, and 29th numbers, the message is authentic. If there are more or less than two number 6s the message is bogus and is disregarded. In the first 30 numbers, you take the 4th and 9th numbers to know which algorithms to use, in this case both numbers are 12,34. You have invented at least 10 algorithms. The first message letter is O. Find an O on the top of the set disc in one of the alphabets (using another alphabet for the next O), and go down to the number below it on the edge, say 57. Now the first four algorithms are made up by the two users of the machines so they can be anything their imaginations can come up with. Like, from 57, down five discs to the top row of 1-80 where the number is 32, find 32 on the bottom row and go down 7 more discs and do the same, then go straight up to the set disc. 2nd algorithm is a diagonal angling down to the right 8 discs to the lower number on that disc-46, then finding the 46 on the top row, and straight up the to the top set disc. 3rd algorithm is another imaginative pattern ending at the top number 78 on the set disc. 4th algorithm now has a sleeve that fits over the machine with holes randomly drilled into its side lining up with each disc's number lines, 15 holes per line. Now look again to the first 30 numbers and see the 18th and the 62nd numbers are 36, and 84. So now the 78 is lined up with the 3rd disc's top number 6 hole, this shows the number 69 in the bottom number row hole 8. This continues for 4 discs to the last number 51 that is sent in to the other communicating person. (36, 84 is third disc, holes 6 and 8, for 4 discs)They run it all backwards to find the letter O. Throughout the sent message there are many OOs. The pattern invented is that you go six numbers beyond the OO to see if there is a number 5 in that number (75). If there is, you know it is a body disc shift. The other number is how many notches to shift each dot.(Odd numbers one way, even the other). Do this at least once every message. If there is a 2 in that number (27) it means to replace the set disc with another one, in this case the number 7 set disc. You replace the old one and just line up the dots of the new set disc directly over the dot beneath it on the first body disc. Do this at least once every message for both set and body discs. Another code invented tells you to change the entire order of the set up with a 4 digit set up number following it. Another code tells you to change the number of algorithms to use. Golden rules: 1) Never use the same set up code more than once. 2) Always send at least 15 phony messages for every one authentic message. 3) Always shift both the set disc and body discs at least once every message. This cipher machine has ever changing/shifting number patterns, an infinite number of invented algorithms that are used in different orders, a large number of algorithms to constantly change, and every set of machines has a different operation. Each operating set of machines have virgin discs no other machines have. This cipher machine cannot be broken, not even by the largest computers in the world if used correctly. The confirmation that a code has been broken is that the message appears. With a 500 letter message, if 500 GCMs are used where each machine only encrypts one letter, there is no confirmation the letter that comes up when trying to break it is the actual letter that is in the message. Every letter has a machine with different discs, different algorithms, and different operators encrypting it. So the most any attempt to break the code can do is acknowledge that each letter position could be any of the letters in the entire alphabet (A-Z). To write out the possibilities on paper would be to have an entire alphabet under letter position #1, then another one under #2, an so on. In the end there would be 500 alphabets in a row as the only clue to what the message says. A wall of alphabets. Its like telling the hackers there are 500 letters in the message and the words are in the dictionary. With this small bit of information it is IMPOSSIBLE to even begin to try to find the message. Not even the biggest computer in the world, working on it for 10,000 years could find the message. This encryption form is called KALIkO ENCRYPTION, it is unbreakable, and is perfectly suited for the Galaxy Cipher Machine.
@gnuPirate
@gnuPirate 2 жыл бұрын
Fantastic video, really enjoyed it, learned a lot in a short time. Thanks Sci Show.
@Adlez27
@Adlez27 9 жыл бұрын
The chipspeech fandom had a lot of fun (read: crying for hours) decoding ciphers that led up to the reveal of a new character!
@jkkolham170
@jkkolham170 9 жыл бұрын
Adlez27 Do you want to know what Brock is doing?
@ma6inka
@ma6inka 9 жыл бұрын
One of the best episodes ever !
@gffypopcorn123
@gffypopcorn123 9 жыл бұрын
THIS!! Please do more like this!
@kinaya6402
@kinaya6402 2 жыл бұрын
this video was very useful to learn more about cryptography and to encode a message, something that has been very useful to me, because the it's the only way (apart from these commentsw) that i can communicate with the outside world without IT blocking me
@admin.....901
@admin.....901 2 жыл бұрын
Thanks~~~~~
@joettaxoxo
@joettaxoxo 9 жыл бұрын
This was the coolest video! Thanks SciShow
@asbestoz1123
@asbestoz1123 7 жыл бұрын
Dude I could see straight through that encrypted message easily
@chillsahoy2640
@chillsahoy2640 9 жыл бұрын
I don't think I'd understand the technicalities of modern digital encryption but I heard an analogy that made sense to me. If you're entering some private information on KZbin, you put it in a briefcase and close it with a lock to which only you have the key, then you send KZbin the locked briefcase containing the sensitive information. KZbin can't open the briefcase, but they add a second lock which only they have the key to, and send you back the now double-locked briefcase. When it gets to your computer, you can verify that KZbin's lock is authentic, so you open your own lock and send the briefcase back to KZbin. Then they see that you've opened your lock, and they can open their own. This way, there is no exchange of codes or locks between the two parties, each side only manipulates their own lock.
@ImmaterialDigression
@ImmaterialDigression 9 жыл бұрын
There were a lot of enigma code books stolen from boats/subs which helped a lot with breaking the codes.
@IsaacComelli
@IsaacComelli 9 жыл бұрын
I would very much like to see an episode on modern encryption. Please make a Part 2, and soon.
@scottecooke
@scottecooke 9 жыл бұрын
Me and a friend had a secret code in primary school. We would write backwards so anybody reading it wouldn't know what it meant. Worked well when other kids tried to read it.
@ZachTheGreek
@ZachTheGreek 9 жыл бұрын
Seriously cool episode. More long form stuff for sure.
@darbreslin5599
@darbreslin5599 9 жыл бұрын
MicManGuy you had an awesome teacher!
@youngjoo8091
@youngjoo8091 4 жыл бұрын
I love the way this makes more sense after you've watched the imitation game
FBI Confirms Zodiac Killer Cypher Has Been Cracked
14:14
The Infographics Show
Рет қаралды 7 МЛН
Secret Codes: A History of Cryptography (Part 1)
12:09
The Generalist Papers
Рет қаралды 82 М.
Do you love Blackpink?🖤🩷
00:23
Karina
Рет қаралды 17 МЛН
The Singing Challenge #joker #Harriet Quinn
00:35
佐助与鸣人
Рет қаралды 47 МЛН
Cryptography: Crash Course Computer Science #33
12:33
CrashCourse
Рет қаралды 852 М.
How Not Sleeping Actually Kills You
11:58
SciShow
Рет қаралды 952 М.
How to Break Cryptography | Infinite Series
15:37
PBS Infinite Series
Рет қаралды 253 М.
Cracking the Uncrackable Code 😏
6:22
Great Big Story
Рет қаралды 9 МЛН
How To Design A Completely Unbreakable Encryption System
5:51
Half as Interesting
Рет қаралды 499 М.
How did the Enigma Machine work?
19:26
Jared Owen
Рет қаралды 10 МЛН
LEARN MORSE CODE from a MEMORY CHAMP (in 15 minutes)
15:11
Nelson Dellis
Рет қаралды 9 МЛН
Cicada 3301: An Internet Mystery
17:54
LEMMiNO
Рет қаралды 36 МЛН
How Quantum Computers Break The Internet... Starting Now
24:29
Veritasium
Рет қаралды 9 МЛН
How Science Says You Should Pack
6:36
SciShow
Рет қаралды 57 М.