Cryptography Lesson #1 - Block Ciphers

Sdílet
Vložit
  • čas přidán 9. 06. 2015
  • This tutorial video will help provide an understanding of what block ciphers are, and how they are used in the field of cryptography.

Komentáře • 88

  • @malluk4127
    @malluk4127 Před 5 lety +113

    Ryan, Why did you stop man? You are skilled at this, I think you should continue making these videos and organize them into your playlists.

    • @codeaperture
      @codeaperture Před 2 lety +5

      😭❤️ he's saving my semester. But content is limited here

  • @youngjuls
    @youngjuls Před 7 lety +8

    Very nicely done! Thank you for a good, simple and comprehensive video about this!

  • @m__6930
    @m__6930 Před 6 lety +12

    This was exactly what I was looking for, thanks!

  • @tammieknuth6020
    @tammieknuth6020 Před 3 lety +1

    great idea to organize them. It makes it easier. Great suggestion!!

  • @paulblade6064
    @paulblade6064 Před 2 lety

    Pretty cool. I want more. Your voice works well with the content

  • @mrdhksan
    @mrdhksan Před 5 lety +2

    Hi, this is fantastic. Thank you.

  • @Sebby049
    @Sebby049 Před 3 měsíci

    wish you had more of these, this is very very useful for my studies
    thank you!

  • @nikhilmahajan4129
    @nikhilmahajan4129 Před 3 lety +1

    short and sweet...thanks for this information.

  • @ricp
    @ricp Před rokem

    Great explanation!! thank you for posting this

  • @blueeyes8194
    @blueeyes8194 Před 6 lety +4

    Best cypher I can come up with, just bored to was something to do

  • @arshad8658
    @arshad8658 Před 8 lety +17

    amazing video.............thanx guys for this videos..........thnk u so much

  • @valb4184
    @valb4184 Před 5 lety +2

    Is IV used in both Stream and Block cipher, because it is used in CBC as well. Also does hash provide non-repudiation? Thanks!

  • @mrdhksan
    @mrdhksan Před 5 lety +2

    Can you please let me know what software you used to make this video? I'd appreciate it. Thanks.

  • @saatyakibhat915
    @saatyakibhat915 Před 4 lety +5

    It's a Caesar Cipher with different Shifts

  • @zackjames2409
    @zackjames2409 Před 4 lety +1

    3C12A46B7UK10C, a = 1, b=2, ... z=26 shifted numbers and letters like 1 = A, 2 = B... used to map text to cipher and back to the text. Teachers in school never figured it out lol. Worked for more than 5 years

  • @freepointsgals609
    @freepointsgals609 Před 6 lety +2

    I have successfully learned the term "block cipher" exists.

  • @yvfg326
    @yvfg326 Před 6 lety +1

    nice video thank u

  • @gauravjoshi9348
    @gauravjoshi9348 Před 7 lety +5

    Nice Video
    Quick and full of knowledge @Ryan Kral

  • @annmariyajohnson8295
    @annmariyajohnson8295 Před 3 lety +4

    I have homework to do but
    why am I here again

  • @kyilinn7907
    @kyilinn7907 Před 5 lety +1

    Yes sir

  • @samiragadri5370
    @samiragadri5370 Před 7 lety +3

    thank you, this is the best explanation of block ciphers on the internet!

  • @thelookofdisapproval8234
    @thelookofdisapproval8234 Před 5 lety +45

    isnt this ceaser cipher?

  • @mhm7532
    @mhm7532 Před 3 lety

    doing this is really cool

  • @zichronyeeyah2184
    @zichronyeeyah2184 Před 4 lety +1

    I have spent all of my time decoding messages I haven't encoded but only one, is beer cold?
    Unique encodes were "given" to me. Expect some pies.

  • @blueeyes8194
    @blueeyes8194 Před 6 lety +1

    K=%Random Amount of letters replaced% (line one figure 1 numbers 1-9) %Random Line and figure positions for equivalents string% (line 1 figure’s 2-3 numbers 1-9) %random letter string% %random letter string% (first letters are equivalent to second letters makes equivalents string) this cypher is perfect for long paragraph and can be made a little harder , the decoder determines every variable based on the first 3 numbers but these numbers can be put anywhere in the code, the code can also be made more complex by using number letter and symbols as the generated letters strings equivalents making the 3 number nearly impossible to find in the file finally these 3 numbers can be put in a place given a range so the decrypted has to search multiple places to find the correct one meaning hackers can’t use the decrypted code to easily determine the first part of the keys position this would be a pretty good cypher technique for programming and ensure safety from something around 85% if hackers at a guess those left capable would be unlikely to try , the best thing about this is it can be programmed in a simple batch fine and with an exe converted vertion of the encrypted and decrypted it would be really hard to decode the programs

  • @Babe_Chinwendum
    @Babe_Chinwendum Před 3 měsíci

    Thank youuuuuuuuuu

  • @MusicBreak116
    @MusicBreak116 Před 6 lety +1

    thaks allot

  • @kentoraya9289
    @kentoraya9289 Před 5 lety +1

    How did you get the word face

  • @harisrees3548
    @harisrees3548 Před 3 lety

    Nice

  • @LucyFur.
    @LucyFur. Před rokem

    Goos but lets say you have the key's as 1 and 4 wouldn't it just be a shift cipher of 5?

  • @patutyamaniaki6045
    @patutyamaniaki6045 Před měsícem

    Is not this also called Caesar cypher? Can anyone explain? Kind of new to this stuff.

  • @ggm3743
    @ggm3743 Před 10 měsíci

    Can someone please explain to me what the difference between a Pseudorandom Permutation and Pseudorandom Function is?

  • @chri3rblx944
    @chri3rblx944 Před 4 lety +3

    OK!!! I lose my brain cells
    I can't even understand

  • @jgarcia8881
    @jgarcia8881 Před 7 lety +3

    This is what Julius Caesar used to encrypt his message but he shift it to the right 3 times.

  • @Chris_Hetherington
    @Chris_Hetherington Před 4 lety +6

    This is a Caesar Cypher. The A-Z alphabet is shifted by a certain number (the key). The caesar cypher is very easy to break, apps exist that can break a caesar cypher instantly. Secure networks do not use this method. What is used in cyber security is way more advanced.

  • @bubblesgrappling736
    @bubblesgrappling736 Před 3 lety +1

    im confused, is the bottom row, keys or ciphers?

    • @LucyFur.
      @LucyFur. Před rokem

      Probally useless now but the bottem is a shift of the key above it like if you have key 1 and key 2, key 2 would be a shift of key 1 by the number of key 2, or just add all the keys and it's basically the same.

  • @yashpatel8632
    @yashpatel8632 Před 2 lety

    Can please answer my question
    EWAZX TFVBHY UIOKM
    DECRYPT this to original message of length 3 character

  • @KevinsCaninesAndAquatics
    @KevinsCaninesAndAquatics Před 7 lety +2

    Isn't it just like the shift cipher

  • @ummye7654
    @ummye7654 Před 5 lety +1

    Caesar cipher

  • @burryaga1361
    @burryaga1361 Před 4 lety +4

    Excellent video. However, I do think you should be more explicit in identifying the "right-shifting" as "right-rotation", because that's what it really is, and also because I often see students oblivious to the difference. People often say "right-shift" when they mean "right-rotate", and it helps to make students explicitly aware of this "from the jump".
    Also, to clear up confusion, a block cipher CAN use Caesar shifting (as in this video). A block cipher, however, unlike Caesar ciphers generally, must operate on fixed-length "blocks" (sets of bits) of data. Keep in mind that block does not mean anything relating to squares or cubes as implied by another comment on this video. Blocks are just sets of bits of fixed length. A block cipher, therefore, simply needs to operate on such a "family" of blocks. (A family is a well-defined set of sets, so a message can be seen as a family of sets of bits.)

  • @ramilhugo2459
    @ramilhugo2459 Před 4 lety

    search this cryptography research language

  • @grantmoffatt8501
    @grantmoffatt8501 Před 3 lety +1

    Who else is here while playing CALL OF DUTY BLACK OPS COLD WAR?

    • @veixal
      @veixal Před 3 lety

      4 months late but you’re not alone brother! :)

  • @khalidhasan3601
    @khalidhasan3601 Před 4 lety

    Bola

  • @TheMedievalShow
    @TheMedievalShow Před 4 lety

    Can someone help ke decipher this please
    Cipher Codes
    1) From many,one. First cipher: the number of orders
    2) From many,one. Second cipher: the creators of the world
    3) From many,one. Third cipher: the number of years
    4) from many,one, Cipher: 23-8-19-15-4-1
    5) from many,one. Cipher: Night Guest In Sorrow
    6) from many,one. Cipher: .htlqxubtpkxqpcb

  • @jernylauriceanova8869
    @jernylauriceanova8869 Před 4 lety

    Caesar cypher

  • @gooseontheloose6366
    @gooseontheloose6366 Před rokem

    I forgot face was a word and kept pronouncing it 'fack-eh'

  • @tgtes2720
    @tgtes2720 Před 3 lety +2

    This isn't block cipher🤨

  • @retrofilmwork
    @retrofilmwork Před 5 lety

    Abdef
    Fabcde

  • @user-tz6bc7zx9x
    @user-tz6bc7zx9x Před 5 lety

    This is ceaser cipher

  • @to.kanali
    @to.kanali Před 3 lety +1

    ん乇レレの

  • @thenarrator1464
    @thenarrator1464 Před 2 lety

    Idk. I’m here bcoz of zodiac killer

  • @jasonjase8661
    @jasonjase8661 Před 4 lety +1

    have you take a crack at kryptos

  • @Rassamdul
    @Rassamdul Před 7 lety +171

    YES! HE ISN'T INDIAN!!!!

    • @marcd4144
      @marcd4144 Před 6 lety +47

      I remember back in the day when the word "Racist" actually meant something.

    • @enkh-uliraldechin7071
      @enkh-uliraldechin7071 Před 6 lety +7

      hehe I felt same

    • @johnarbuckel3498
      @johnarbuckel3498 Před 6 lety +9

      Yugi_oh88 Hes probaly american and cant understand a thick indian accent

    • @prasadwants
      @prasadwants Před 6 lety +7

      you bitch....appreciate the way he teaches....not his citizenship

    • @ninjabunny101
      @ninjabunny101 Před 5 lety +2

      Racism.