The Science of Codes: An Intro to Cryptography

Sdílet
Vložit
  • čas přidán 5. 08. 2015
  • Were you fascinated by The Da Vinci Code? You might be interested in Cryptography! There are lots of different ways to encrypt a message, from early, simple ciphers to the famous Enigma machine. Michael Aranda takes you through a fun and cryptic episode of SciShow, all about codes!
    ----------
    SciShow has a spinoff podcast! It's called SciShow Tangents. Check it out at www.scishowtangents.org
    ----------
    Dooblydoo thanks go to the following Patreon supporters -- we couldn't make SciShow without them! Shout out to Justin Ove, John Szymakowski, Fatima Iqbal, Justin Lentz, David Campos, and Chris Peters.
    ----------
    Like SciShow? Want to help support us, and also get things to put on your walls, cover your torso and hold your liquids? Check out our awesome products over at DFTBA Records: dftba.com/scishow
    Or help support us by becoming our patron on Patreon:
    / scishow
    ----------
    Looking for SciShow elsewhere on the internet?
    Facebook: / scishow
    Twitter: / scishow
    Tumblr: / scishow
    Instagram: / thescishow
    Sources:
    www.simonsingh.net/The_Black_C...
    book.itep.ru/depository/crypto...
    www.cs.trincoll.edu/~crypto/hi...
    www.sans.org/reading-room/whit...
    ftp.stmarys-ca.edu/jsauerbe/m1...
    www.turing.org.uk/scrapbook/ww...
    enigma.louisedade.co.uk/howitw...
    www.codesandciphers.org.uk/eni...
    www.pbs.org/wgbh/nova/military...
    www.cs.miami.edu/~burt/learnin...

Komentáře • 1,4K

  • @scabiniful
    @scabiniful Před 8 lety +284

    passing notes in class just got a lot more interesting

    • @afeishalopez4524
      @afeishalopez4524 Před 2 lety +5

      hahah😂😂😂😂 true

    • @Combes_
      @Combes_ Před rokem +5

      @@xingyuliu1890 i bet they won't when they don't get caught passing test anwsers because they used the cipher

    • @erlynvasquez1962
      @erlynvasquez1962 Před rokem +4

      I gave this to a crush I had

    • @bitonic589
      @bitonic589 Před 8 měsíci +1

      hah, ik this is from 8 years ago, but imagine a teacher so confident aboutta bust a student, but then seeing "faojnfb hbba klpp hanv kkso"

    • @l_e__m___o____n_____.
      @l_e__m___o____n_____. Před 5 měsíci +1

      Thanks for the idea

  • @TheYafaShow
    @TheYafaShow Před 8 lety +1548

    Two cryptographers walk into a bar.
    Nobody else has a clue what they're talking about.

    • @ShallowBeThyGames
      @ShallowBeThyGames Před 8 lety +9

      ***** Who'd have known a cryptographer would be scuppered by predictive text.

    • @stuvs830
      @stuvs830 Před 8 lety +3

      @Ka P that took me a sec.

    • @TaylorYarick
      @TaylorYarick Před 8 lety +2

      +Stu VS I'm not gonna lie. I don't get it

    • @user-nf3hh8kn5r
      @user-nf3hh8kn5r Před 8 lety +2

      +TheYafaShow lol i got it in less than a minza

    • @TaylorYarick
      @TaylorYarick Před 8 lety +2

      I get Ka P's joke now. I thought you'd all like to know that. It only took 3 months

  • @NukeIvex
    @NukeIvex Před 8 lety +429

    When you crack Caesar ciphers, do they ask "Et tu, Brute force?"
    Hides from impending mob.

  • @squee6970
    @squee6970 Před 8 lety +236

    Brute force is pretty effective on Caesar

  • @d.tt.wilding7740
    @d.tt.wilding7740 Před 3 lety +82

    he's telling me this so enthusiastically like if he's helping me get away with a top secret. I almost feel bad for having nothing to hide

  • @MetaBloxer
    @MetaBloxer Před 7 lety +268

    "This should look like gibberish to you"
    *Gestures towards ad*

  • @chaz8837
    @chaz8837 Před 8 lety +117

    Enigma is a truly brilliant approach to cryptography. The weakness is the common wording of course. So we can take common words out of the cipher altogether. When using enigma one must not use common words at all. so we can make different substitutes for common words like "the"

    • @JamesDavy2009
      @JamesDavy2009 Před 7 lety +4

      Or »das«, »der«, »die« and »Fuehrer« back when they operated them. In fact, Enigma messages began with a three-letter operator code (at first repeated once to make a six-letter operator code).

    • @gecsus
      @gecsus Před 2 lety +4

      The answer is too simple. Simply group all the words into 5 letter groups and there are no common words to find. It comes out like this "thisi sames saget hatus esfiv elett ergro upsin itfin" It's just not translated for clarity. If you can't read it, it says "this is a message that uses five letter groups in it fin."

    • @himesilva
      @himesilva Před rokem

      @@gecsus That somehow seems too obvious. Would it really work?

    • @gecsus
      @gecsus Před rokem

      @@himesilva It actually is used by military. When a message is encoded it must be grouped into 5 letter groupings so that the common word sequences are not obtainable. Otherwise it would be easily decoded. Could you even recognize the message example even though it wasn't encoded? The next problem is letter frequencies. Like "E" is the most commonly used letter in the alphabet for English words. Words like it, we, us, be, etc, are limited in number. Single letter words a very easy as well, as they are VERY limited in number (I, & A)

  • @manguy01
    @manguy01 Před 8 lety +315

    I learned the Caesar Cipher in 4th grade. My teacher was awesome.
    _edit: 5th grade._

    • @SeaZucchini
      @SeaZucchini Před 8 lety +66

      ***** For 8 year-olds. That's kinda... I dunno, the point?

    • @batman88891
      @batman88891 Před 8 lety +8

      Matthew DeLeon Most fourth graders would be 9, wouldn't they?

    • @GhostKreep
      @GhostKreep Před 8 lety +1

      batman88891 nope

    • @AkwardCheeseIsAkward
      @AkwardCheeseIsAkward Před 8 lety +2

      batman88891 Depends on where you started.

    • @QuickLs3ns3
      @QuickLs3ns3 Před 8 lety +7

      MicManGuy Wtf SciShow i rewatched numberphiles videos about the enigma machine and then 3 hours later u post this video about Cryptography.. Are u spying on me? Spooky

  • @Suedocode
    @Suedocode Před 8 lety +136

    No mention of public/private key encryption (RSA/ECC) or the current symmetric key encryption (AES)? The schemes you provided are technically symmetric key encryption, and it's such an important word/concept that I'm surprised it wasn't specifically pointed out.
    RSA, ECC, and AES are the most important and relevant encryption schemes. A topic about cryptography is rather silly without them, even if it's only rudimentary stuff. You don't need to describe the math behind it, but mention the concepts at the very least.

    • @tipomartins
      @tipomartins Před 8 lety +23

      Jeremy Joachim I think they will do it in future videos, this was just the first part!

    • @RSP13
      @RSP13 Před 8 lety +13

      Jeremy Joachim It's better to present properly just a few topics then to simply scratch the surface of several ones. I would be pissed if they attempt to explain RSA is 30 seconds.

    • @thegingersheep
      @thegingersheep Před 8 lety +3

      Jeremy Joachim While I understand the reasoning behind what you said I have to say I partially disagree. While it is true they could of gone into more advanced/modern encryption methods. This show is primarily intended to provide and introduction to topics. This allows those who are interested to explore additional information and those who are not interested to learn some and then move on.

    • @filipepontelima8305
      @filipepontelima8305 Před 8 lety +2

      Jeremy Joachim This video was clearly only about the history of cryptography. It's very complicated to explain all that for everyone and expect it from an 8 minute video is unreasonable. But the concepts introduced in the video were great and all the information absolutely correct.
      The only thing that the video could have mentioned is the illogical use of the one time pad: "if you have a secure way to send the secret key, why not send the message itself through this comunication, since it has the same size?"
      But the video was amazing.

    • @Suedocode
      @Suedocode Před 8 lety +2

      +Filipe Ponte Lima
      "This video was clearly only about the history of cryptography."
      But it says "The _Science_ of Making and Breaking Codes". This is like titling a video "The Science of Light" and then talking about aether the entire time.
      "if you have a secure way to send the secret key, why not send the message itself through this comunication, since it has the same size?"
      You can hand them an enormous one-time pad in person once, and then have secure communications thereafter. It's much more preferable than handing them messages in person every time.

  • @theoneshad0w508
    @theoneshad0w508 Před 8 lety +255

    How about a crash course series on this? Like if you agree.

  • @NotronLP
    @NotronLP Před 8 lety +113

    6:16 There is a movie about that called ''The imitation game''

  • @DampeS8N
    @DampeS8N Před 8 lety +61

    Very nice primer on encryption with examples. Great job! I hope you do a part 2.

  • @filipepontelima8305
    @filipepontelima8305 Před 8 lety +14

    I work with cryptography and I have to say: this video is amazing.
    Great way to teach the history of cryptography in a way easy to understand.
    Also very accurate and covered the most important topics of the history of cryptography

    • @lunam7249
      @lunam7249 Před rokem

      your comment was very clear,...i doubt your a codewriter....hahaha

  • @laurafleming4377
    @laurafleming4377 Před 8 lety +96

    You should cover quantum cryptography - it's actually unbreakable

    • @NearlyInfinity
      @NearlyInfinity Před 3 lety +17

      It is to current regular computers but not so much to other quantum computers

    • @RevolutionibusOrbiumCoelestium
      @RevolutionibusOrbiumCoelestium Před 3 lety +17

      Laura Fleming - Actually that’s incorrect. Quantum cryptography is easily breakable with other quantum computers.

    • @NearlyInfinity
      @NearlyInfinity Před 3 lety +5

      @@RevolutionibusOrbiumCoelestium Only as much as current encryption on normal computers is to break on normal computers, but quantum cryptography is un breakable to regular computers which I think they are talking about

    • @onyanchamotanya973
      @onyanchamotanya973 Před 3 lety

      The dai I saw a chain break through a tarmac road I knew everything is breakable

  • @Imedge6
    @Imedge6 Před 8 lety +44

    One of the best interesting episode ever !

    • @Flashzinh0
      @Flashzinh0 Před 8 lety

      Mat G For sure !

    • @stevie-ray2020
      @stevie-ray2020 Před 8 lety

      Despite the fact that hours could be spent explaining the cracking of codes, this is an excellent and concise explanation of ciphers and deciphering!

    • @resisx07
      @resisx07 Před 8 lety

      Mat G " "Cribs". HA !

    • @rich3of3
      @rich3of3 Před 8 lety

      Mat G yes, I agree

    • @stevenroyalton7789
      @stevenroyalton7789 Před 8 lety +1

      Mat G One of the best interesting grammar ever !

  • @Kneedragon1962
    @Kneedragon1962 Před 8 lety +16

    It may be worth mentioning that the 'Bombe' made by Allen Turing and Tommy Flowers, was in many ways the world's first real electronic computer. It predated the American Colossus computer by about 4 years, and inspired it. Subsequently, Von Neuman (who had worked on Colossus) made a set of recommendations, should anyone attempt to build another one of these things. His recommendations led to the building of the first Von Neuman machines. All modern computers could reasonably be described as Von Neuman machines, because 75 years later they still comply almost exactly with Von Neuman's recommendations. Codes, specifically the Enigma, gave birth to modern computers. And, much as the NSA may annoy us, without espionage, there would be no computers.

  • @Gruggo
    @Gruggo Před 8 lety +8

    This was an incredibly interesting episode, I ended up spending at least an hour reading about encryption and hashing after watching it.
    Very, very interesting indeed.

  • @shattywack
    @shattywack Před 8 lety +3

    Never really gave this subject any thought before. Man, I love this channel

  • @EcceJack
    @EcceJack Před 8 lety

    This was a very nice overview for those hearing about this for the first time - but also a nice summary for those of us who have heard more about some of these methods (especially Enigma), but really don't mind being reminded of the *big picture* every now and again.
    So all in all: great job! :)

  • @catebrooks6779
    @catebrooks6779 Před 8 lety

    Possibly the best SciShow episode ever... brought me back to reading Cryptonomicon. Good job!

  • @SittingGuy
    @SittingGuy Před 8 lety +105

    This stuff is way too advanced for me. So I'll just keep sitting on things :D

    • @Mazzolli
      @Mazzolli Před 8 lety +24

      Sitting Guy do you babysit?

    • @willlegok9
      @willlegok9 Před 8 lety +3

      This is extremely simple.

    • @Leitilumo
      @Leitilumo Před 8 lety

      What...?

    • @perspectivedetective
      @perspectivedetective Před 8 lety

      ***** Ok, I don't know if this will work, but it's the only thing I could find:
      First, hover your mouse over the user's profile pic. That should bring up the google plus hover-over menu. Click on the little 'g+' logo to go to their google plus profile. Once there, look for the little down arrow below their profile pic/circles info on the left side of the page. Click the little down arrow, and you'll see "Mute (user)" and "Report / block (User)" options.
      I don't know exactly what muting a user does, but it might be worth a try.

    • @ellmuffin
      @ellmuffin Před 8 lety

      I admire your honesty. Everyone, listen, Sitting Guy for President

  • @GelidGanef
    @GelidGanef Před 8 lety +11

    Crash Course: Cryptography & Cybersecurity?
    PLLLZZZZZ!!!

  • @only20frickinletters
    @only20frickinletters Před 8 lety

    2:50 Thank you for reminding me that this is a thing. I have rewatched it and smiled.

  • @cheerios428
    @cheerios428 Před 8 lety

    This video is great! My girls who code class is doing our Cyber Security/ Cryptography unit this week and this is such a perfect video to show them! Thanks SciShow!!!!

  •  Před 8 lety +58

    "When websites announce that hackers know everything about you, that's because their encryption methods were breakable"
    That's not true. Most of the time the website are broken into because of unpatched or misconfigures software. It's extremely rare to be hacked because of a flaw in in the encryption methods.

    • @PirateTHESteam1
      @PirateTHESteam1 Před 8 lety +1

      Toni Lähdekorpi Well, you are partially right. You see when you hack a website you usually retrive a database filled with information. The information in this database can often be encrypted, so if you want to be able to login to lets say one of the admin accounts, you'll have to decrypt the usernames and passwords first.
      The method of encryption varies greatly from AES to no encryption(plain text).

    • @isaackarjala7916
      @isaackarjala7916 Před 8 lety +1

      PirateTHESteam1 in the case where an encrypted database containing passwords or credit cards is stolen, they advise changing your password and credit card out of an abundance of caution not because they believe that there is a credible risk of cryptanalysis cracking the crypto.

    •  Před 8 lety +3

      PirateTHESteam1 If they access your servers and database, they will most likely also gain access to the code itself and the keys required for decrypting anything decryptable.
      Passwords aren't (or shouldn't ever be) ecrypted with anything other than a one way hash that by design can not be decrypted, but rather the password is always rehashed and compared to the stored one on login.
      But even with the decryptable data, the problem isn't a flaw in the encryption itself.

    • @Fenriswaffle
      @Fenriswaffle Před 8 lety

      PirateTHESteam1 So if I encrypt all the passwords with MD5 I'm safe rite? I'm kidding.
      Though I have to ask, if say for instance you DO have a database where the passwords are encrypted using MD5 for whatever reason, would it be possible to switch to another algorithm and update the password rows accordingly?

    •  Před 8 lety

      ***** Yo dawg, you could always hash the easily brute-forceable MD5 hash and then remove the MD5 part on login.

  • @Acq49
    @Acq49 Před 8 lety +21

    my brain hurts

  • @marciparks3377
    @marciparks3377 Před 8 lety +1

    Wow Michael! I really love how into detail this episode is.

  • @israelch100
    @israelch100 Před 8 lety

    I just watched the imitation game yesterday, and this question was in my head the entire day, thanks guys!

  • @IronDruids
    @IronDruids Před 7 lety +9

    Seems to me you can get the same effect as an undecipherable code without it actually being unbreakable. Letter shift the message with the Caesar cipher, code the end result with the polyalphabetic cipher, and then use whatever other ciphers you so choose on top of all that. It should be such a momentous hassle full of trial and error while trying to figure out what ciphers were used that by the time it's decoded, the message is already unimportant with you being long gone and the scheme already accomplished. You bury them under so much busy work that you can do whatever you want in the meantime completely unhindered. Unless I'm misunderstanding how ciphers work?

    • @FalbertForester
      @FalbertForester Před 5 lety +2

      You're right in separating "undecipherable" and "unbreakable". Most modern cryptography schemes are sets of rules that are fairly simple for computers to implement. As of yet, most of them are not proven "unbreakable", just "we think that these aren't decipherable in a reasonable amount of time". Which can be "good enough".

  • @Seraphii874
    @Seraphii874 Před 8 lety +37

    It's so weird not seeing youtube views freeze at 301 anymore O_o

    • @manurmad1539
      @manurmad1539 Před 4 lety +3

      Has it really been 4 years since that was a thing?

    • @Needformadness2
      @Needformadness2 Před 4 lety +1

      @@manurmad1539 longer actually

    •  Před 3 lety

      those were the days

  • @Kio_Kurashi
    @Kio_Kurashi Před 8 lety +2

    I've made several cyphers most of which were variations of the basic ones such as Caesar's. Two of which I'm somewhat proud of. The second one is newer and not yet refined but the first one operates as such: You pick a two digit number. In this case we will use 27. Now we write out the alphabet in order in a line. Using the number of letters in the first word of our message as a key we write the 10's digit out as many times as there are letters in the word above the alphabet. Continue in this pattern going up in numbers. So 3, 4, 5... Once you have finished on top we take the one's digit and work are way down. In this case 7, 6, 5, 4... The difference here though is that we are skipping letters equivalent to half of the key rounded up. You still use the number the same amount of times. Using the top number you will create groups of the same number which would give you different numbers on the bottom. If we were to encode "This is easier than expected." then you should have something that looks like this:
    2222 3333 4444 5555 6666 7777 88
    abcd efgh ijkl mnop qrst uvwx yz
    5375 3753 7527 4264 2642 6416 31
    We now put the groups in order listing the lower numbered groups from lowest to highest. in this case we get yz qrst efgh mnop abcd uvwx ijkl. Now we take our original number which will become our second key (and a guide for the receiver) and count through all of the letters that number of times.what we land on we then take out and use for our letters in order. I.e:
    ABCD EFGH IJKL MNOP QRST UVWX YZ
    ZREM BXSA LCFK IJTP GQOH UWDN VY
    But there's more! Capitol letters get shifted to the left by a factor of the first key (the letters in the first word). This means that instead of the 'T' in 'This' becoming a 'H' it becomes a 'P.'
    Fully translated it goes as follows:
    "This is easier than expected."
    "Palo lo bzolbq hazj bnpbehbm."

  • @lfmm97
    @lfmm97 Před 8 lety +1

    This was one of the most interesting episodes so far. Great job.

  • @AdvosArt
    @AdvosArt Před 8 lety +33

    It's funny cause I just watched top 10 memes top 10 facts gravity falls and at the start he talked about codes

  • @EvelynDayless
    @EvelynDayless Před 8 lety +7

    When hackers get data it's usually because either they got access to the decrypted data or the company didn't bother encrypting it at all. They don't usually break the encryption themselves.

  • @jpeg1991
    @jpeg1991 Před 8 lety

    Just want to say, i love this show. Keep up the good work guys!

  • @JohnSF93
    @JohnSF93 Před 8 lety

    I learned to use the Playfair cipher a couple of years ago. Very simple to use, and very hard to crack. It's still possible to do letter pair frequency analysis, but you need a really large ciphertext to even get started

  • @glorvalmacglorvas171
    @glorvalmacglorvas171 Před 7 lety +7

    Here is how to make an unbreakable code: Write down random letters and just remember what you meant. :D

  • @kathyphilip7925
    @kathyphilip7925 Před 8 lety +5

    Gotta love Alan Turing!

  • @favian95
    @favian95 Před 8 lety

    The logic is so simple and yet the execution is so complicated

  • @Tryangetbetter
    @Tryangetbetter Před 8 lety

    Fantastic video! In my third year of university we had to encrypt a message using any combination of substitution ciphers, Caeser shifts, Vigenere, and affine ciphers before then decrypting each others ciphertext. If our message got decrypted we lost marks and we gained marks by decrypting other peoples messages, it was a fun piece of coursework, especially after making a document in Excel to do all of the manual work for me :D

  • @YUSOMEAN
    @YUSOMEAN Před 8 lety +6

    New and better cyphers, drop some hot bars, bruv

  • @MosukaDreamer
    @MosukaDreamer Před 8 lety +10

    The guy from Vsause is named michael. Coincidence?

  • @oceannuclear
    @oceannuclear Před 8 lety +1

    The animation team has done a great job on this one!

  • @wow5212
    @wow5212 Před 4 lety +1

    Tips for simple but effective encryption (can be programmed in python) :
    1) Include spaces, commas and dots in your alphabet list as 27, 28 and 29 respectively.
    2) Carry out alphabet substitution. Example : a - t, b-k, c-s ......
    3) Then, apply vigenere cipher with long key. Example : "thispasswordissohardnobodywilleverguessit"
    4) Don't use capitals. It makes it MUCH easier to crack.
    Your end text will be completely gibberish with random dots, comma and spaces. There will be no common word lengths such as 3 for "the", 1 for "I" and others.

    • @franatrturcech8484
      @franatrturcech8484 Před 2 lety

      the problem is that you can only encrypt text, and with a long enough message, even frequency analysis can still be done. there is no diffusion, the mapping is still 1->1

  • @LukeScottgamer
    @LukeScottgamer Před 8 lety +32

    Thanks Gravity Falls for teaching me this.

    • @Phoenixmage50
      @Phoenixmage50 Před 7 lety

      lol for me it was the overwatch arg with all that encryption and salted shit

    • @Chriael
      @Chriael Před 5 lety

      Same dude!!

  • @MagicTurtle643
    @MagicTurtle643 Před 8 lety +12

    Wow, great episode. I was rapt the whole time.

  • @CSGDuncan11
    @CSGDuncan11 Před 8 lety

    Great episode! This was my favourite so far!

  • @JoeBribiesca
    @JoeBribiesca Před 8 lety +1

    INDEED, ONE OF THE BEST EPISODES OF SCISHOW YET! Way to go, team! And way to host, Michael!

  • @godqueenbidoof
    @godqueenbidoof Před 8 lety +7

    This was great I wish you had talked some about Steganography though, which amusingly enough google chrome's spell check doesn't recognise as a word XD

    • @EvelynDayless
      @EvelynDayless Před 8 lety

      Jeff Cyr Hmm, it does for me.

    • @godqueenbidoof
      @godqueenbidoof Před 8 lety

      Munashiimaru Really? I guess it's cause I have it set to UK english then

    • @General12th
      @General12th Před 8 lety

      Jeff Cyr Chrome spell check doesn't recognize a lot of the technical words I use, like "apoapsis". I'm not sure why its dictionary is so limited.

    • @heinrichthurston6961
      @heinrichthurston6961 Před 8 lety

      ***** I only know that word thanks to Artifexian. The math may not make sense but it works.

    • @Fenriswaffle
      @Fenriswaffle Před 8 lety

      ***** Uncommon word perhaps? Usually peri/apo are in reference to peri/aphelion which isn't common to begin with. Also I learned peri/apoapsis from the same place most people did.

  • @jk844100
    @jk844100 Před 8 lety +167

    Actually the Polish cracked the enigma code first.

    • @tomshraderd4915
      @tomshraderd4915 Před 8 lety +9

      jk844100 Yes, it was mentioned in the video at 6:53 under the picture.

    • @videogyar2
      @videogyar2 Před 8 lety +2

      ***** The british havent decoded it fully either. In the movie The imitation game its highly overrated.

    • @TheApollotd
      @TheApollotd Před 8 lety +3

      The polish cracked enigma (easy) Alan Turing (British) and his machine decrypt ed the code out of 159,000,000,000,000,000,000 possible combinations that kept changing every day

    • @habiblevi5369
      @habiblevi5369 Před 8 lety +54

      ***** The original Enigma machine landed in a Polish customs office courtesy of Berlin. It was promptly followed by a German official claiming the crate had been sent by mistake, and to return it immediately before passing through customs. This aroused suspicion, so the customs officials took the crate apart and photographed everything they could so that a working model could be reproduced. This was in 1929, by 1932 the Poles had developed a working model and were able to decode messages, but in 1938 Germany made a new and improved model that was no longer breakable in the same way. Poland was able to smuggle all their work to the British just before they were invaded. Without that lucky circumstance, and Poland's hard work, Enigma may have never been broken during the war.

    • @Quadsie
      @Quadsie Před 8 lety +2

      But Britain can into space

  • @sakeneden
    @sakeneden Před 8 lety +1

    This is a superbly explanatory and interesting video about cryptography. Good job!

  • @TheBigangrytexan
    @TheBigangrytexan Před 5 lety +1

    Fascinating. Thank you for the video!

  • @kroen
    @kroen Před 8 lety +20

    If every cipher can be cracked with enough time and determination, then how come no one has yet to crach the voynich manuscript? that book has been around for over 600 years and countless people have tried and failed to crack it.

    • @Andytlp
      @Andytlp Před 8 lety +10

      Kroen Redstone the only logical answer is.. it's plain gibberish. I can tell cuz there was illustrations of people having sex. In a herbal journal of some sort. Lmao.

    • @1serhiy
      @1serhiy Před 8 lety +6

      Kroen Redstone people at harvard uni studies the book and noticed that most of the words inside the book are too long to form a coherent and useful language, therefore they concluded that the book is gibberish and have created a way of mimicking the gibberish via a set of rules.

    • @isaackarjala7916
      @isaackarjala7916 Před 8 lety +8

      Not every cipher can be broken, one-time-pads are mathematically impossible to crack if implemented correctly, several other algorithms might also be impossible to crack when implemented correctly, but that hasn't been proven mathematically.
      Also, you can't translate a language using only the written language.

    • @Darticus42
      @Darticus42 Před 8 lety

      tulp35000 Maybe there's some secrets the author really didn't want people to know about ;)

    • @thatguyitzme5725
      @thatguyitzme5725 Před 5 lety +1

      Kroen Redstone jibberish

  • @DarthObscurity
    @DarthObscurity Před 8 lety +7

    Why do things get brittle when they dry out?

    • @eightplusone7512
      @eightplusone7512 Před 8 lety +3

      Because moisture offer more flexible movements and typically when that happens that means it was already pretty brittle

  • @b00gi3
    @b00gi3 Před 2 lety

    Fantastic video, really enjoyed it, learned a lot in a short time. Thanks Sci Show.

  • @StreetKingEvolution
    @StreetKingEvolution Před 8 lety

    Agreed! One of the most interesting episodes yet!

  • @tuxino
    @tuxino Před 8 lety +32

    I'm not really concerned with North Korea reading my email - and unless you're doing sensitive government work and and have documents related to that in your email, you probably shouldn't be either.
    A whole different concern is my own government or other organizations working within my country.

  • @ColtaineCrows
    @ColtaineCrows Před 8 lety +23

    More interested in keeping the USA out of my e-mails to be honest.

  • @esscee96
    @esscee96 Před 8 lety

    This was really interesting! :D One of my favorite SciShow videos yet! :D

  • @joettaxoxo
    @joettaxoxo Před 8 lety

    This was the coolest video! Thanks SciShow

  • @vincensiusa4578
    @vincensiusa4578 Před 8 lety +14

    use encrypted klingon

    • @TomKellyXY
      @TomKellyXY Před 8 lety +6

      While the Enigma was cracked, the Germans never managed to crack messages from the New Zealand WWII troops who spoke plain unencrypted Te Reo Māori into the Radio

    • @IwulikeLOLZ
      @IwulikeLOLZ Před 7 lety +1

      +Tom Kelly lmao the axis couldnt really crack any first nation languages. So when they intercepted messages usually coming from the commonwealth they didnt know what they said

    • @IwulikeLOLZ
      @IwulikeLOLZ Před 7 lety

      +Tom Kelly lmao the axis couldnt really crack any first nation languages. So when they intercepted messages usually coming from the commonwealth they didnt know what they said

    • @IwulikeLOLZ
      @IwulikeLOLZ Před 7 lety

      +Tom Kelly lmao the axis couldnt really crack any first nation languages. So when they intercepted messages usually coming from the commonwealth they didnt know what they said

    • @vlchltsemsdbscrlbrs8624
      @vlchltsemsdbscrlbrs8624 Před 5 lety

      you are looking

  • @sunofslavia
    @sunofslavia Před 8 lety +11

    "Nice Things About Hitler" that's a pretty edgy post-punk cold-wave band name.

  • @kujmous
    @kujmous Před 8 lety

    I made an encryption process is even more powerful in that it iterated through a polyalphabetic cypher for every character just to regenerate a unique key for the subsequent character. This key regeneration was done for every ASCII character, 1 through 255. Pretty proud of it.

  • @SlyPearTree
    @SlyPearTree Před 8 lety +1

    Nice episode. I didn't learn anything but cryptography is always an interesting subject. Can't wait for the promised follow up.

  • @rowboogs1
    @rowboogs1 Před 8 lety +6

    My brain just got brain fucked.

    • @KarasGamer
      @KarasGamer Před 8 lety

      same here

    • @cldream
      @cldream Před 6 lety

      Oddly enough, there's a language called Brainfuck. ;P

  • @MukaMoko
    @MukaMoko Před 8 lety +5

    Would the Rosetta Stone be considered as an unbreakable message?

    • @ShaudL
      @ShaudL Před 8 lety +4

      Um no.... I'd think not at least. I mean we have most of the languages on it learned and we did that by analyzing surrounding languages.... With some time given it'll be broken

    • @departmentofeducation7212
      @departmentofeducation7212 Před 8 lety

      Primid King He wasn't talking about the language learning program, he was talking about the actual Rosetta Stone, which helped us understand the hieroglyphic writing system of the Egyptians.

    • @ShaudL
      @ShaudL Před 8 lety +1

      +Malboro Overking so was I 😂😂

    • @ShaudL
      @ShaudL Před 8 lety

      +Malboro Overking so was I 😂😂

    • @ShaudL
      @ShaudL Před 8 lety

      +Malboro Overking so was I 😂😂

  • @008abdullah
    @008abdullah Před 8 lety

    Brilliant episode, absolutely loved it

  • @arcclite1144
    @arcclite1144 Před 8 lety

    I work in healthcare programming. Cryptography up a lot, it's nice to see a SciShow video on it!

  • @przemysawzych1866
    @przemysawzych1866 Před 8 lety +3

    I don't understand why it is so common in English programs/films not to mention about three polish cryptographers who decoded Enigma before Turing.
    You should have done your research more reliable.

    • @luckynater
      @luckynater Před 8 lety

      source?

    • @przemysawzych1866
      @przemysawzych1866 Před 8 lety

      +luckynater
      BBC for example. you can dig deeper but this source seems easiest and still reliable.
      www.bbc.com/news/magazine-28167071

    • @someperson5506
      @someperson5506 Před 7 lety

      Didn't know that. Thank you :)

    • @dmitrixallo7072
      @dmitrixallo7072 Před 6 lety

      Because the UK want to glorify their 'Great' country, which is falling apart, and good that was made by other countries, they will take it, whatever they did bad, they give it to other countries.
      Pozdrawiam

  • @HalcyonSerenade
    @HalcyonSerenade Před 8 lety +1

    Aw, I was actually hoping for some of the newer, digital encryption information! Fun stuff regardless, though. Frequency analysis would've been my go-to for the standard Caesar cipher, but being able to apply it against a varying rule is fascinating. Human ingenuity is astounding.

  • @Robot_Overlord
    @Robot_Overlord Před 8 lety

    That was one of the best ones yet. Keep going

  • @ramadanhasani
    @ramadanhasani Před 8 lety

    This video was great, really enjoyed and learned something awesome.

  • @gffypopcorn123
    @gffypopcorn123 Před 8 lety

    THIS!! Please do more like this!

  • @Atronin
    @Atronin Před 8 lety

    yes please do a part two i am super interested.

  • @vitalymilavsky9451
    @vitalymilavsky9451 Před 8 lety +1

    This was a great episode, please make a follow up

  • @crazyd3mon968
    @crazyd3mon968 Před 6 lety +1

    I had trouble understanding the vigenere cipher before watching this it's really helped me to make sense of it thanks.
    Edit: Just used a vigenere cipher to test my friends hopefully I did it right

  • @ma6inka
    @ma6inka Před 8 lety

    One of the best episodes ever !

  • @bbpoltergeist
    @bbpoltergeist Před 8 lety +1

    This was amazing ! I would love to see more videos regarding cryptography.

  • @ferrous719
    @ferrous719 Před 8 lety

    I read a book once in which they used two Identical prints of a book and a three number code. 12-18-4 referred to pg 12, line 18, word 4. easy to send msgs with common words and nearly unbreakable without the key, especially because you could use different combinations for the same word. obviously wouldn't work for data transfer, but cool for word based msgs.

  • @Lorbeary
    @Lorbeary Před 8 lety

    wow! great episode! thank you!

  • @WilkerLucio
    @WilkerLucio Před 8 lety

    great video! thanks for all the hard work.

  • @ZachTheGreek
    @ZachTheGreek Před 8 lety

    Seriously cool episode. More long form stuff for sure.

  • @RonN448
    @RonN448 Před 8 lety

    Absolutely and utterly fascinating. But, I think my mind blew a fuse!

  • @alicered4198
    @alicered4198 Před 8 lety +2

    3:23 Vigenere has always been my favorite cipher.

  • @laurenford7232
    @laurenford7232 Před 8 lety

    Remembering the rules of this video helped me figure out a code during a mystery game with friends today. Thanks!

  • @leonard_4083
    @leonard_4083 Před 8 lety

    Awesome video! One of my favorites in a while :D

  • @voINNOCENTov
    @voINNOCENTov Před 8 lety

    Sick episode man. Kudos

  • @Kpac_
    @Kpac_ Před 8 lety

    Learned so much about Alan Turing watching The Imitation Game. Didn't realize how forward thinking he was when it came to modern computers.

  • @ardalanhusin1726
    @ardalanhusin1726 Před 6 lety

    very useful and short tips a bout encryption, well done

  • @recordingice4388
    @recordingice4388 Před 8 lety

    Well spoken and informative :) Good video, thumbs up.

  • @bluberrystar7486
    @bluberrystar7486 Před 8 lety

    This episode reminds me of a book I read, Digital Fortress by Dan Brown. It's a great read.

  • @IsaacComelli
    @IsaacComelli Před 8 lety

    I would very much like to see an episode on modern encryption. Please make a Part 2, and soon.

  • @kanz831021
    @kanz831021 Před 8 lety

    Excellent episode! Great !!

  • @EqualsThreeable
    @EqualsThreeable Před 8 lety

    Very well done episode!

  • @vatsalamolly
    @vatsalamolly Před 8 lety

    I enjoyed this.
    A brief summary of my Data Security class from college, hehe.

  • @PrimalBeard
    @PrimalBeard Před 8 lety

    Well done on this episode!

  • @Jollofloff
    @Jollofloff Před 8 lety

    Best video in quite while! :)

  • @athief
    @athief Před 8 lety

    Really cool! I'd like to hear more in details from you about this :)

  • @benuscore8780
    @benuscore8780 Před 8 lety

    This was a great video on cryptography. Double liked.

  • @jessiebullock
    @jessiebullock Před 8 lety

    Super interesting! Thank you!