Vigenere Cipher - Decryption (Unknown Key)

  Рет қаралды 300,711

Theoretically

Theoretically

Күн бұрын

This video shows the process (thoroughly) of how to find the key when you don't have it.
English alphabet frequencies: www.math.cornell.edu/~mec/2003...
Decryption (known key): • Vigenere Cipher - Decr...
Encryption: • Vigenere Cipher - Encr...

Пікірлер: 377
@SittingTheApple
@SittingTheApple Жыл бұрын
This is great. I majored in mathematics and, still today, dabble around in cryptography just for fun. I really wish these helpful videos were around when I was in school.
@nickalvarez97
@nickalvarez97 6 жыл бұрын
I've been looking all over to find someone to explain the frequency analysis step. You're video is great and well explained. Keep up the good work
@jasvlogs9142
@jasvlogs9142 6 жыл бұрын
This was so helpful, used this to help me with my technology assignment and I got an A!
@antigonipapapetrou9433
@antigonipapapetrou9433 3 жыл бұрын
Good Job!
@manjimaspramod6502
@manjimaspramod6502 3 жыл бұрын
Great 👍👍👍
@IHateYoutubeHandlesVeryMuch
@IHateYoutubeHandlesVeryMuch 2 жыл бұрын
@@jedidiahwesley8522 and you too
@tsvetkovamaria52
@tsvetkovamaria52 3 жыл бұрын
Thank you for the awesome video. From your video I learned what it means "vigenere cypher is vulnerable to frequency analysis", which I didn't get from the book Serious Cryptography.
@jacktraveller8290
@jacktraveller8290 6 жыл бұрын
So, I do LARP, and last year a guild I'm found out about a plot which could have serious repercussions for all factions in the game. We tracked the plotters and intercepted a coded message, and the guild launched an investigation. Unfortunately, at one of the events, the guy leading the investigation was killed, and the head of the guild gave me this guy's diary, with his notes on the plot and a copy of the coded message and asked me to figure it out. So, I've been scouring the internet trying to figure out how to decrypt this message (for context I don't know anything about cryptography). It's not a caesar cipher. I'm struggling to guess two letter words because it seems like there aren't enough vowels in english to make them work. Frequency analysis doesn't seem to yield anything conclusive. Then I heard about polyalphabetic encryption. This was the first video I watched on it, and I've just spent 4 hours working out a key for the message. Finally came up with a two number key and... *drumroll* it doesn't work when applied to the message. BUT. I don't feel like it was a waste of time, because I had fun working out the key and trying to solve the puzzle, & even if my guess about the type of cipher was wrong, at least that's vigenere eliminated from the list. So thanks for helping me out and giving me an evening's entertainment. Great video. :)
@5488suman
@5488suman 5 жыл бұрын
Very nicely illustrated! Thank you so much.
@DoYouHaveAName1
@DoYouHaveAName1 5 жыл бұрын
Thank you for all the explanations, you really simplified it and it really helped me understand. I'm making a game for my friend and she is going to have to take her time with this
@Acryte
@Acryte 5 жыл бұрын
Was just tasked with writing a vigenere crack on Tuesday and due Thursday morning in an unfamiliar programming language. Couldn't really test for accuracy after seeing that the key length was the appropriate size, I trucked on until the end and... IT WORKED! Thanks for the help! :)
@suqlainsherazi4766
@suqlainsherazi4766 3 жыл бұрын
You are so great at teaching .. Keep it up.. Amazing way of teaching..
@BrianR-ML
@BrianR-ML 8 жыл бұрын
Really good and clever video... Thank you!
@clrk1234
@clrk1234 4 жыл бұрын
when you shift the frequency probabilities, does it have to be in order?
@gokou0017
@gokou0017 9 жыл бұрын
oh thank you very much ! i was hearing the video at coursea about this topic like more than 5 times and understood nothing ,til now ,now i get it.thank you teacher
@ddxfraxinusdne
@ddxfraxinusdne 8 жыл бұрын
michael jordan So glad it helped!!
@PuneetKumar-rr2vt
@PuneetKumar-rr2vt 8 жыл бұрын
Multitude of resources .. This is the only one that made me understand :)
@ddxfraxinusdne
@ddxfraxinusdne 8 жыл бұрын
+Puneet Kumar I'm so glad you got it!
@_sidereal
@_sidereal 6 жыл бұрын
What is the best way of analyzing ciphertext of around 40 letters or so? Would this method be useful, or is it too short for the results to be accurate?
@srinjoychoudhury2246
@srinjoychoudhury2246 6 жыл бұрын
Great explanation i wanted to know that 2 things:What is the math behind finding the length like why do we follow that algorithm secondly thier is a slight chance right that the key we found may not be correct(a very small chance as it is all statistical) in that case what how do we proceed further.
@Rajath_2001
@Rajath_2001 Жыл бұрын
Thank you so much ❣️ I had a very hard time understanding this concept, thanks to you its done now ✅
@Rajath_2001
@Rajath_2001 Жыл бұрын
@ROROROSEEEEE HAPPY BDAY!!!! That is the frequency of usage of alphabets in the English language. It's constant.... In any examination, they will specify the frequency of each letter in the question itself, no need to memorize it.
@Rajath_2001
@Rajath_2001 Жыл бұрын
@ROROROSEEEEE HAPPY BDAY!!!! I don't know about the general usage of the English language. But, in the example she gave; yes, C is more frequent
@vinigfer
@vinigfer 4 жыл бұрын
Do you have the method/technique name used in your video? Awesome explanation :)
@MKAB503
@MKAB503 8 жыл бұрын
damn that's a lotta steps. I am learning cryptography on my free time. I always thought it was interesting, but I never realized how much work it was. The Ceaser cipher is way easier. Any hints for saving time, yet still getting an accurate answer?
@ddxfraxinusdne
@ddxfraxinusdne 8 жыл бұрын
Computers. Computer programs save time. I'f you're interested in math and crypto and happen to be into programming, I would recommend learning to also use Maple or Matlab or the like. Good luck with your learning!
@MKAB503
@MKAB503 8 жыл бұрын
Thanks!
@sobbleissad7061
@sobbleissad7061 3 жыл бұрын
Yeah all the complicated steps and make computer do the iteration thats why math strong with computer science
@DragonRazor9283
@DragonRazor9283 3 жыл бұрын
make a Python algorithm that’s able to decrypt messages in an instant using the Vigenere Cipher
@yevheniyk5358
@yevheniyk5358 4 жыл бұрын
What is the math principle behind the first part, the discovering of the length?
@helloworld-tx6qp
@helloworld-tx6qp 3 жыл бұрын
Index of Coincidence
@TheMetalKiwi
@TheMetalKiwi 3 жыл бұрын
Thank you very much for the clear explanation!
@pixelated.dreams
@pixelated.dreams 8 жыл бұрын
You seem to know your stuff regarding Decryption so i ask this. Would it be possible to find a key in a 752 Hex code where characters are limited to 0 to 9 and A to F. Its part of a alternate reality game thats currently going on called "The Pizza Code Mystery" we have been stuck trying to figure out how to decode this 752 character long HEX code for almost 2 years and were trying to figure out what method we need to use to crack it.
@MohamedIbrahim-re1nc
@MohamedIbrahim-re1nc 5 жыл бұрын
Thank you for the video! I just wanted to ask if the shifting and multiplying method has a name? Are there any references for it?
@buggydama
@buggydama 5 жыл бұрын
After getting the keyword size wouldn't be more suitable to apply statistical analysis straight into the plain text? In this case you can generate multiple possible plaintexts and match them to get the most probable one. Afterwards find the keyword. *Also you avoid cases that the keyword is not word from any language. *I was thinking like this, because it's more likely for the plaintext to be in some language than the keyword itself.
@whoizali
@whoizali Жыл бұрын
you are a gem
@TheNuclearBolton
@TheNuclearBolton 7 жыл бұрын
What happens if there are spaces in the ciphered text? Ex. aicbs akova ps sjkhal ...Would I just combine it all do it like what you did it in the video?
@bencegyulakis3824
@bencegyulakis3824 3 жыл бұрын
I still don't understand one thing. How do you get the frequencies for the letters (in the example a .10 b .20 c .70)? Because as far as I know you would have to collect data and recalculate the frequencies every time till it wont change anymore and that's about an eternity later. Someone please help!
@Beverlypen
@Beverlypen 7 жыл бұрын
+Theoretically i have been given a challenge cipher in my geometry class, and my teacher said i could use any outside resources. i have been trying to solve this cipher for about 7 hours and I'm wondering if I could send you it and if you could confirm that it is a Vigenere cipher. Thanks!
@kitfisto5416
@kitfisto5416 2 жыл бұрын
One thing I didn't quite get was how you find the original frequency of the sequence e.g in yours it was a=10 b=20 c=70, how did you get that
@rerun3283
@rerun3283 2 жыл бұрын
Fascinating!! Thanks for the video.
@prajit1988
@prajit1988 7 жыл бұрын
Got the overall idea.It was good explanation. Still looking for base intuition...if possible can anyone provide any related link?
@Gary-Seven-and-Isis-in-1968
@Gary-Seven-and-Isis-in-1968 3 жыл бұрын
You're an absolute genius, thank you for a fascinating video. Could you tell me if it is possible to find the encryption key for an Android photo file if the owner mistakenly wiped the encryption key from the phone?. Yes it happened to me and so far nobody has been able to shed some light on this commonly occurring problem with Android phones. By default from Android 6 upwards all data is encrypted.
@averageevil801
@averageevil801 Жыл бұрын
Hey awesome video, but if someone doesn’t mind helping I don’t quite understand what it means that the frequencies of a, b, and c are .10, .20, and .70 or how we know that
@carolinesiniard1447
@carolinesiniard1447 2 жыл бұрын
This was super helpful but I’m completely lost on the “frequency” of the letters: A = .10; B = .20; C = .70 but that doesn’t correlate with the frequency in which those letters appear in the example cypher (as A&B appear 4 times and C 3) nor the English alphabet (as each letter only appears once) so where is the “frequency” derived from? Side note: what’s the name of the mathematical proof used when finding the greatest sum of products for that combination of numbers provided? I believe the example was 1, 2, 5 and 1, 2, 5. Thank you!
@ahmadghaemi2192
@ahmadghaemi2192 2 жыл бұрын
It is a made up example in this case since we assume a language with only three letters (9:05), but my guess is that it is usually derived through analyzing a large amount of texts in a language and seeing how often each letter appears on average in each of them.
@adaiban5102
@adaiban5102 Жыл бұрын
.10, .20, and .70 is the frequency of those letters in the cipher text without counting every 4?
@diggity1039
@diggity1039 Жыл бұрын
I have this encoded message I'm trying to decode, I've creates that table 5:30 in Excel. But I can't figure out the number. The frequency for coincidences is weird. It goes 0,1,1,0,0,1,1,4,2,1,0,0,0,1,0,1,1,0,0,0,0,0,0. Not sure how to count that.
@UnreaL9
@UnreaL9 8 ай бұрын
How do you find the length of the key if the cipher text is very long?
@davideaureli2859
@davideaureli2859 5 жыл бұрын
Sorry, but when you make the multiplication between the alphabetical frequency and that in the cyphertext , you are considering only the letters into that part of the cyphertext or all the alphabetic letters ?
@leowang6470
@leowang6470 4 жыл бұрын
Hi there do you have a series of affine cipher decryption with no keys? Thanks a lot :)
@bhalsodnirva104
@bhalsodnirva104 3 жыл бұрын
How can I do this with programming? Please help. I can not find any videos on youtube for this.
@danielthompson2299
@danielthompson2299 3 жыл бұрын
sort of got it...but how do i get the averages and the averages of the numbers?
@kennethbird4656
@kennethbird4656 2 жыл бұрын
I have a kappa cryptogram puzzle I bought at a grocery store could you make a video on how to solve these? Thank you in advance.
@zainabiraq9921
@zainabiraq9921 Жыл бұрын
How u calculate The biggest no 30 25? And in step 2 From where u bring 125
@quirkyquester
@quirkyquester 5 жыл бұрын
Great video! thank you so much!
@jcarawllnyd9706
@jcarawllnyd9706 2 жыл бұрын
How did you reveal the whole of the letters in the description part? What is the general rule ?
@ahmadghaemi2192
@ahmadghaemi2192 2 жыл бұрын
Thanks, this was really helpful. What would happen if, instead of a shift, the letters in the key would each map to a permutation of the alphabet? Is it about as easy to break and if so, how would one go about breaking that?
@valfrancs
@valfrancs 2 жыл бұрын
You can break it with reverse encrypting, its like you did substitution (another method) and then Vigenere so now you have to do the reverse operation
@SyrBasel
@SyrBasel 2 жыл бұрын
so if i have 200 letter as a encrypted text, should i do the process and find the coincidences ??
@JetNekko
@JetNekko 6 жыл бұрын
all understood , one single thing is why .50 with the shift of 2 was the key what math principle was that?
@bobthebuilderhecanbuildit
@bobthebuilderhecanbuildit 4 жыл бұрын
Thanks so much for this. I used it to code a program that can decipher any vigenere text without knowing the key! So Cool!
@YamChopp
@YamChopp 4 жыл бұрын
where can i check it out?
@MrMikeydrum
@MrMikeydrum 4 жыл бұрын
@@YamChopp I wrote one years ago here excuse the music kzbin.info/www/bejne/h2TPZ2CBmLp_qcU
@midnightgloom69420
@midnightgloom69420 2 жыл бұрын
The math edu link doesn't work btw (well for me at least) so can someone tell me the frequencies for the english abc XD
@PapaSmurff660
@PapaSmurff660 3 жыл бұрын
Helped me very much, thank you
@henryyancey1117
@henryyancey1117 2 жыл бұрын
how do you know the frequencies for the alphabet before hand? is it a universal truth?
@sazzadsaju7598
@sazzadsaju7598 4 жыл бұрын
what if the calculated key is not working? how to change the key then?
@triciaopoku7400
@triciaopoku7400 6 жыл бұрын
Hi,I am not understanding how to find a corresponding encryption key. For example, A message M = Mario is Vernam encrypted into ciphertext C = AOAMV. The key is 5 letters long is all I know.
@realpiee
@realpiee 3 жыл бұрын
Should I be doing one word at a time? Sentence? How should I do this?
@davidomarf
@davidomarf 6 жыл бұрын
This was great. Thank you for doing this.
@pyotrleflegin7255
@pyotrleflegin7255 7 жыл бұрын
You obviously know what you are doing but you really haven't explained it well enough for my old brain. Perhaps a Kasiski search might be better -- if you had a much longer ciphertext, of course. Thank you for trying so hard to tell us about your way of setting about the search!
@EthanConrad123
@EthanConrad123 8 жыл бұрын
This video was really helpful tbf and I understand this a lot better now. One thing I'm struggling to understand is how I can apply this to when we use 26 letters instead of just the A, B and C you used? If my keyword length is 5, that means I would have to do what you did 5 times right? And with 26 letters, that leaves 130 computations and in an exam situation I wouldn't have time for that haha! I've been given part of the plain text though, so can I use this to find my key? Thanks!
@ddxfraxinusdne
@ddxfraxinusdne 8 жыл бұрын
+Ethan Conrad Hi Ethan, 1. Yes it takes forever by hand, most people use computer programs. But read point 3! :) 2. "If my keyword length is 5, that means I would have to do what you did 5 times right?" - Exactly 3. If you already have the some plaintext AND key length, it becomes much easier. Say you had a key length of 3 and your plain text started out "test" and your ciphertext was "UGVJPJ." Then we know that t=U, e=G, and s=V, so we could count and see that t and U are 1 apart, e and G are 2 apart, and s and V are 3 apart in the alphabet. So our key is (1, 2, 3) and we can apply that to the rest of the cipher text. Now instead say you had (for the same example) only "te" of the plaintext. Remember that you can easily figure out the first 2 key numbers. Then you could calculate the last one as usual and still have saving lots of time.
@EthanConrad123
@EthanConrad123 8 жыл бұрын
Theoretically Ah i see now! I managed to figure it out so thanks a lot :D
@adambakas13
@adambakas13 2 ай бұрын
this seems like the core complicated method of doing it.
@isiktantanis
@isiktantanis Жыл бұрын
Very good videos, thank you!
@rachnadesai8001
@rachnadesai8001 8 жыл бұрын
Thank you so much for your video.It helped me understood more clearly. But I had a question. What if my ciphertext is 500 characters long?Then your method of finding key length would be much more lengthy. Is there any other way to find key length?
@ddxfraxinusdne
@ddxfraxinusdne 8 жыл бұрын
+Rachna Desai I don't know of any other way of finding key length. Usually people use a computer program to do the work for them. For example you could use Maple as seen in this video: kzbin.info/www/bejne/qJ-1d62bZbyHr68
@vinayakmate1317
@vinayakmate1317 2 жыл бұрын
You need to use Kasiski's Method to find the key length. Its much easier and works for any length of the cipher text.
@jesseharding3254
@jesseharding3254 8 жыл бұрын
You lost me when you stopped using the primary example, no matter how many times I re-watch this.
@valkon_
@valkon_ 8 жыл бұрын
+Jesse Harding Exactly...I was very happy with her explanations but when I saw A, B and C I was disappointed
@cosma_one
@cosma_one 8 жыл бұрын
+Valkon katse kala
@godfreycharles3600
@godfreycharles3600 6 жыл бұрын
Even me ,I experience the same pain as you.
@antasmax5480
@antasmax5480 5 жыл бұрын
Ikr
@awaismanzoor2920
@awaismanzoor2920 5 жыл бұрын
@@antasmax5480 you can not break this cipher using a text of length
@MohitSingh-jj4ld
@MohitSingh-jj4ld 6 жыл бұрын
Thanks a lot...It really helped me
@danielbrunk9121
@danielbrunk9121 2 жыл бұрын
4:50 wait... thats insane!!! Thamk you for yoir Video already. I didnt watched it fully yet but at this point im convinced its legit
@wretch1300
@wretch1300 2 жыл бұрын
Can this method work to find a Gronsfeld key?
@ibrahimcekirri3790
@ibrahimcekirri3790 3 жыл бұрын
The first number key was 2 , what is its corresponding letter , C ???
@SoloPro
@SoloPro 7 жыл бұрын
love your vids! keep it up ur amazing!
@anshumandash4244
@anshumandash4244 5 жыл бұрын
Does it decrypt rio 256 encryption.
@JV-pt2rz
@JV-pt2rz 5 жыл бұрын
I love you, u saved me
@user-dk3nd9pb3r
@user-dk3nd9pb3r 8 жыл бұрын
this was very helpful.. You are AWESOME!
@MaxsRoost
@MaxsRoost 6 жыл бұрын
So this channel explains ciphers and codes? Ill subscribe if you have more like this
@bkstroh
@bkstroh 5 жыл бұрын
have you tried to crack the 340 cipher?
@jakestorrie6889
@jakestorrie6889 2 жыл бұрын
Where you get the .10 .20. and .70 from?
@davidlambrakis4096
@davidlambrakis4096 8 жыл бұрын
@Theoretically When you say that the order is important when writing down the Frequency, the first thing I need to write down is the Frequency of the Letters in the (English) Alphabet? In the order of the Alphabet itself? so A, B, C, D - NOT the order of Highest Frequency to Lowest Frequency? Second question, when I align the Cipher Text (in my case every 4th letter) under the alphabet, again I enter that in correct alphabetic order? or frequency order? Last question for now, do i remove the letters that are not used in the cipher text altogether? or do i just allow the calculation to be 0? Example: A B C D E F G H I A B C D E F G H I If there are no E's in my cipher text do I remove the column altogether (both cipher and alphabet) or just the cipher. A B C D F G H I A B C D F G H I or A B C D E F G H I A B C D F G H I I hope this makes sense, thanks for your help, great demonstration
@ddxfraxinusdne
@ddxfraxinusdne 8 жыл бұрын
Hi, Yes, you write the letters in alphabetical order, not order of frequency in both cases. Allow the frequency to be 0 rather than removing the letters in the cipher text. How many E's do you have? Zero, then make the frequency 0/total, which = 0. Basically, you have to make you have a full alphabet every time you multiply the actual frequency times the frequency in the cipher text. Hope that makes sense! Feel free to ask again if that doesn't answer the question.
@neelgorasiya7199
@neelgorasiya7199 5 жыл бұрын
How can you define frequencies of a,b, c as 0.1,0.2,0.7?? Is all alphbets have their particular frequencies like this or not and how can i get it??
@piotrskrzypek7903
@piotrskrzypek7903 5 жыл бұрын
They were predefined for alphabet {a,b,c}. Yes all alphabets (of course associated with real languages) has their own letters frequencies. For example check english letters frequencies. If you want to crack Vigenere Cipher with ciphertext only, you should know the plain text language at least.
@christineyvonnemercado4327
@christineyvonnemercado4327 4 жыл бұрын
Hello!😊 Can you teach me how to get the alphabet frequencies (how did you know that a has a frequency of .10 and so on)? I'm stuck with that part. Thank you
@rahuldham8396
@rahuldham8396 4 жыл бұрын
Christine Yvonne Mercado me too
@aaronmedel2174
@aaronmedel2174 4 жыл бұрын
hey did you ever find the answer to this I am also confused on this part
@daboss5447
@daboss5447 4 жыл бұрын
You dont have to know, have a chart with you handy, unless you want to memorize all of them. There is no way of getting an accurate calculation of the frequency without hundreds of thousands of words. So either memorize, or have a chart.
@LuxRust.
@LuxRust. 5 жыл бұрын
So I have one that I do not know what type of cipher it is, but It contains these characters: A,C,G,I,L,S,T,U,V,Y,Q,0,4,8 If someone could help me on how to solve it, I would be very grateful. It is a huge thing over 2000 letters
@amandeepsinghsokhi7685
@amandeepsinghsokhi7685 7 жыл бұрын
what if i have a cipher text as AGVAR and the length of the key is given same as the number of letters in the cipher text.?
@ddxfraxinusdne
@ddxfraxinusdne 7 жыл бұрын
Do you have a key? If so, see kzbin.info/www/bejne/pXnGe2eHgc6chpo If not, that ciphertext is really too short to do this type of analysis on.
@anjali3395
@anjali3395 Жыл бұрын
What if your cipher text is much longer?
@maxdonahue210
@maxdonahue210 4 жыл бұрын
I have a cypher that the pattern of large numbers is very random. It’s a 50 character message but the coincidences are always low. Never more than 6
@angelicaungurean883
@angelicaungurean883 4 жыл бұрын
Max Donahue same
@ChindoEnyidah
@ChindoEnyidah 7 жыл бұрын
Explained perfectly, thanks.
@mahash7601
@mahash7601 7 жыл бұрын
what if I rewrite the cipher text and check for constants but I get only one large number which's 2 the rest of numbers were all one and zeroes!! how to find the key length then?
@ddxfraxinusdne
@ddxfraxinusdne 7 жыл бұрын
Is your ciphertext too short?
@mirmohsinali732
@mirmohsinali732 5 жыл бұрын
I don't understand why you only did the shift twice . Like you said 0.60 is the largest but 0.26 is also greater than 0.24 so why not stop there and fill the blank for the first letter of the key as 1?
@saracapdevila2221
@saracapdevila2221 4 жыл бұрын
its because she found out the length of the key and therefore had to shift it 3 times (the 4th would've been the start of the key again)
@cmanna285
@cmanna285 5 жыл бұрын
at 4:02 why haven't you wrapped the text around to teh beginning?
@1LizzyCore1
@1LizzyCore1 3 жыл бұрын
I would like to know that to tbh
@VictorHazali
@VictorHazali 8 жыл бұрын
I understand how the decryption works, but why does it work? Is there any good resources that I can refer to for the explanation behind this attack? I'm guessing the step 2 is related to frequency of each character? But i can't explain why the counting of coincidences gives the key length for step 1.
@ddxfraxinusdne
@ddxfraxinusdne 8 жыл бұрын
+Victor Hazali I'm not sure if this directly answers your question, but here is an explanation I gave someone previously. Maybe this will help you understand the "why." (sorry it's quite long) Why it happens is really quite interesting, but hard to put in words. I'll try with an example: Say the key length was 3, and the key was (2, 9, 5). Then every third letter will be "on the same shift." So in the ciphertext, the 1st, 4th, 7th, 10th, 13th etc letter will be shifted 2 places. Now we also know that the letters in an alphabet have constant frequencies. For example, in English, "e" is the most common letter. But when we shift it two spaces over (as in the first shift of our key), it becomes "G" in the ciphertext, and hence G will be the most common letter in the 1st, 4th, 7th, 10th, 13th etc position in the ciphertext, not "e." So now we know that G is the most common (for our shift 2 letters), and likewise we could figure out how common all the other letters of shift 2 are in the ciphertext. But when we line up the letters in an offset manner (like this we do in practice with all the rows offset from each other), what is the most common overlap of the same letter? Generally when G overlaps on G because it's the most common, right? Let's take a step back and think about the other shifts as well. If we were to look at the 2nd, 5th, 8th, 11th, etc letter in the plaintext, the "e" would be shifted 9 places to "N", so for the 2nd, 5th, 8th, 11th, etc letter in the ciphertext, "N" would be the most common letter. In the same way, in the 3rd, 6th, 9th, 12th etc letter in the plaintext, the "e" would shift 5 places over to "J", so J would be the most common letter in the 3rd, 6th, 9th, 12th etc place in the ciphertext. Now we have determined that for the first, second, and third shift, the letters G, N, and J, respectively would be most common (and of course we could find second most common, third most common, etc for each). So how do we use this fact? Well, any time the letters are lined up in multiples of the key (multiples of 3), there is the greatest chance of our G's in the top line lining up with G in the offset line (because they are the most common in the 1st, 4th, 7th, 10th, 13th etc position) in the first shift. In contrast, if the top line is, say for example, over a line with an offset of two (not a multiple of 3, the key), G will be the most common in the 1st, 4th, 7th, 10th, 13th etc position in top line, but in the offset line, J will be the most common in the 1st, 4th, 7th, 10th, 13th etc position (places still relative to the top line). HENCE, you won't get as many matches, called "coincidences," because the same letter is not the most common in both cases. The number of coincidences will be a little be lower because there are fewer J's than G's in the top line. Now remember that the while I just talked about how you get the most matches in the first shift, the same idea applies to all other shifts. So, IN SUMMARY: you obtain the most coincidences when the shift is at multiples of the key, which is what we see in practice.
@VictorHazali
@VictorHazali 8 жыл бұрын
+Theoretically Thanks so much for the explanation! It's very clear with the example, and I think I understand why it works now.
@coderdimhat6821
@coderdimhat6821 8 жыл бұрын
All understood. Only a single thing: How did you find the value of a, b, c as .10, . 20 & .70. Please elaborate. thanks..
@ddxfraxinusdne
@ddxfraxinusdne 8 жыл бұрын
Those are the "normal" frequencies in the hypothetical language. For the normal frequencies in the English language see: www.math.cornell.edu/~mec/2003-2004/cryptography/subs/frequencies.html
@Mindraker1
@Mindraker1 7 жыл бұрын
Yeah, she was working with a theoretical example with only four letters. Were she to draw out the frequencies for all 26 letters on a dry erase board, this video would have been painful.
@siddharthmishra2123
@siddharthmishra2123 6 жыл бұрын
but how 0.1 0.2 and 0.7
@jami4724
@jami4724 6 жыл бұрын
only three* letters
@sdetwil
@sdetwil 5 жыл бұрын
In her pretend language of only three letters you would see the letter C 70% of the time, B 20% and A %10. She just picked whatever she felt like because it's a pretend language meant to make the example shorter and easier
@raybroomall8383
@raybroomall8383 4 жыл бұрын
Great start.. Keep doing this sort of thing. But get a bitter board, maybe even ast to use a classroom at a local collage. at about 15.4 in thee video you say to count the A, B, Cs again... we did that in the first round, so is the next round different? If so how?
@andrewrussell586
@andrewrussell586 4 жыл бұрын
You count every "x" letters, where x is your key length, but start from the next letter along. Then the next. Etc.
@Jaime_Protein_Cannister
@Jaime_Protein_Cannister 8 жыл бұрын
Say in this example knowing the key length and hunting for key numbers , you're only using A-B-C to multiply the two frequency tables. If your ciphertext after counting up all the letters uses only 14 while the alphabet is 26 long. Do you simply input 0 for all the missing characters?
@ddxfraxinusdne
@ddxfraxinusdne 8 жыл бұрын
+MoralReformXGames If I understand your question correctly, then yes. The reason for counting the letters is to find the frequency of them. If they never occur in your text, then their frequency is 0/X.
@Jaime_Protein_Cannister
@Jaime_Protein_Cannister 8 жыл бұрын
+Theoretically Thanks a lot xd
@CozySeeker291
@CozySeeker291 8 жыл бұрын
Can you show how to solve a ADFGX cipher with and without the key?
@horsefuntinitan8274
@horsefuntinitan8274 Жыл бұрын
I only had 1 "big" number? Whatvdo i do in this case-
@hichamloukili3910
@hichamloukili3910 2 жыл бұрын
witk witk 3la 9o9a niice thank you very much
@pepelepepe
@pepelepepe 2 жыл бұрын
Isn't row 7 supposed to have 1 coincidence? Just to make sure I'm understanding.
@dannuttle9005
@dannuttle9005 4 жыл бұрын
This was great. I'm going to code this and see if I can make it work.
@NATHALIAAVILAIndiGoddess1147
@NATHALIAAVILAIndiGoddess1147 4 жыл бұрын
Did it work?
@dannuttle9005
@dannuttle9005 4 жыл бұрын
@@NATHALIAAVILAIndiGoddess1147 Heh...gonna need a little more time
@jammer1993
@jammer1993 4 жыл бұрын
@@dannuttle9005 so.... did it work ?
@ShirakoTheFirst
@ShirakoTheFirst 7 жыл бұрын
Lets say you already some of the known text, how could you use this in order to figure out the key? Let me rephrase, you know part of the encrypted message. Could you use these decrypted letters to solve for the key?
@ddxfraxinusdne
@ddxfraxinusdne 7 жыл бұрын
If you have encrypted and decrypted of the same part of the message, yes. Just do the subtraction between each set of corresponding letters to find the key. Assuming the key it's longer than your known text.
@gamehawk24
@gamehawk24 6 жыл бұрын
I know I have Vigenere cipher but the key is unknown. I've done the whole letter pyramid thing, but there are 160 characters, I did the math and finding all the coincidences would take me 13 hours to complete. Does anyone know of any digital methods that would make this easier?
@gamehawk24
@gamehawk24 6 жыл бұрын
never mind i'm already 1 third of the way there
@logancopper5913
@logancopper5913 7 жыл бұрын
I was given the letters KCO and was told to use the Vigenere Cipher to decode it, and I seem to be stuck, how could I decode this?
@ddxfraxinusdne
@ddxfraxinusdne 7 жыл бұрын
kzbin.info/www/bejne/pXnGe2eHgc6chpo
@Alex_MB
@Alex_MB 3 жыл бұрын
Really helpful, thanks
@prayagmehta9738
@prayagmehta9738 3 жыл бұрын
How did you find .10 .20 .70
@brad4297
@brad4297 3 жыл бұрын
What is this used for?
@mikeramirez1695
@mikeramirez1695 4 жыл бұрын
It was as clear as mud but it was also very interesting. I think this process could be better explained on an Excel spreadsheet. You should consider a re-do. If you do, I would watch it.
@TheChunkBoi
@TheChunkBoi 7 жыл бұрын
What if you don't have all letters of the alphabet i.e. a blank column when performing shits?
@peshodge5305
@peshodge5305 7 жыл бұрын
I would guess you mean shifts... :D Also im not sure ive just begun learning decryption, but I see you don`t have a response so maybe you just multiply by 0 and you get a zero... after this its just adding so it wont make the whole sum a zero
@ddxfraxinusdne
@ddxfraxinusdne 7 жыл бұрын
If I am understanding you're question correctly, yes. You are correct, make it zero.
Affine Cipher - Decryption (Known Plaintext Attack)
7:04
Theoretically
Рет қаралды 59 М.
Cryptanalysis of Vigenere cipher:  not just how, but why it works
15:33
Proof of Concept
Рет қаралды 30 М.
КАРМАНЧИК 2 СЕЗОН 6 СЕРИЯ
21:57
Inter Production
Рет қаралды 511 М.
Кәріс өшін алды...| Synyptas 3 | 10 серия
24:51
kak budto
Рет қаралды 1,2 МЛН
I Need Your Help..
00:33
Stokes Twins
Рет қаралды 161 МЛН
Vigenere Cipher Cryptography (PicoCTF 2022 #29 'vigenere')
25:48
John Hammond
Рет қаралды 17 М.
Playfair Cipher
19:18
Videos By Kevin
Рет қаралды 180 М.
Vigenere Cipher - Encryption
5:09
Theoretically
Рет қаралды 48 М.
Public Key Cryptography: RSA Encryption Algorithm
16:31
Art of the Problem
Рет қаралды 927 М.
Affine Cipher Decryption - Known Key
9:29
Theoretically
Рет қаралды 79 М.
Vigenere Cipher Explained (with Example)
6:47
Aladdin Persson
Рет қаралды 31 М.
Шифр Виженера
10:18
Diana Dvoryak
Рет қаралды 39 М.
How to Use a Basic Cipher to Encode and Decode a Secret Message
22:36
Andrew Bustamante
Рет қаралды 59 М.
The Mystery of the Copiale Cipher
10:23
hochelaga
Рет қаралды 619 М.