The Encryption That Can't Be Cracked: OTP

SdĂ­let
VloĆŸit
  • čas pƙidĂĄn 28. 07. 2024
  • Go to NordVPN.com/rogue and use code ROGUE to get 75% off a 3 year plan and use code ROGUE for an extra month free!
    🡇 -------------- get your own OTP keys + chart & accreditation -------------- 🡇
    sunrise arm motion - outline can in the air motion - taps nose motion - tugs on brim of hat and then brushes side of shoulder motion - morpheus hand motion
    ------------------------------------------------------------------------------
    Unedited footage for this video ($5+ patrons):
    / 29076666
    ------------------------------------------------------------------------------
    Additional Information
    Generate your own psuedorandom OTP keys
    learningselfreliance.com/one_...
    Get the OTP conversion chart here
    learningselfreliance.com/down...
    How to use a one time pad from the person who offers those resources
    ‱ Communications Encrypt...
    Alternate OTP conversion chart that we made
    i.imgur.com/S4AFMdq.png
    "We're Not So Different, You and I" | Dr. James Grime on Numberphile
    ‱ "We're Not So Differen...
    Information on Benedict Arnold's ciphers
    web.archive.org/web/201006110...
    A transcription and photo of one of his cryptic messages
    web.archive.org/web/201006081...
    A decoded transcription of the same message
    web.archive.org/web/201006110...
    More detail on the books Benedict Arnold used
    cryptiana.web.fc2.com/code/arn...
    Benford's Law on wikipedia
    en.wikipedia.org/wiki/Benford...
    Benford's Law on wolfram
    mathworld.wolfram.com/Benfords...
    One Time Pads on wikipedia
    en.wikipedia.org/wiki/One-tim...
    M. Rohe, 2003, RANDy - A True-Random Generator Based On Radioactive Decay
    citeseerx.ist.psu.edu/viewdoc/...
    A History of U.S. Communications Security (Volumes I and II)
    www.governmentattic.org/18doc...
    ------------------------------------------------------------------------------
    Music used in this video:
    "Vino" by Cap Kendricks
    chillhop.bandcamp.com/track/vino
    "Sinkerator (feat. Dilip & quickly, quickly)" by weird inside
    chillhop.bandcamp.com/track/s...
    "All Us" by Nokiaa x nofeels
    chillhop.bandcamp.com/track/a...
    "Grass" by baaskaT
    chillhop.bandcamp.com/track/g...
    Most of the music from the show: bit.ly/mrspotify
    ------------------------------------------------------------------------------
    Post-production powered by Doghouse Systems
    ------------------------------------------------------------------------------
    This video was made with the help of:
    Brian Brushwood - host -- / shwood
    Jason Murphy - host -- / captainmurphy
    Brandt Hughes - camera operator / editor / caption editor -- / gatowag - / gatowag
    Bryce Castillo - live audio engineer -- / brycas
    John Rael - camera operator -- / skepticallypwnd
    Annaliese Martin - production assistance - / amuseliese
    Jiaying L. (Rev) - caption first draft
    ------------------------------------------------------------------------------
    Our Mailing Address
    Modern Rogue
    539 W. Commerce #1975, Dallas TX 75208
    ------------------------------------------------------------------------------
    Scam Nation: / scamschool
    Patreon: / modernrogue
    Discord (patron reward): / discord
    MR Articles: themodernrogue.com
    Outtakes & BTS: / scamstuff
    Subreddit: modernrogue.reddit.com
    Merch: shop.themodernrogue.com
    Twitter: / modernrogueshow
    Instagram: / modernrogueshow
  • ZĂĄbava

Komentáƙe • 451

  • @ModernRogue
    @ModernRogue  Pƙed 5 lety +56

    Tell a friend, gosh-gee-darnit!
    This week, we're giving away a powerhouse deck of cards. It's beveled, it's one-way, AND it's marked--of course I'm talking about the APEX Deck. Whether you're a beginner or an old-hand, this three-in-one deck will open up a new world of possibilities.
    Enter our free weekly giveaway and you could be one of six winners of the APEX Deck. Just sign up at gimme.scamstuff.com and you could win! (No purchase necessary, giveaway ends 8/15/2019)

    • @KamenRiderRaiden
      @KamenRiderRaiden Pƙed 5 lety

      _pauses at __6:30_ Wait.... HA HA!! I know what this is!

    • @aidenburnside6380
      @aidenburnside6380 Pƙed 5 lety +2

      Please get your license to broadcast so that you guys can make a number station for us

    • @johnathanhulse8
      @johnathanhulse8 Pƙed 5 lety

      I just went back and watched the pepper ball gun episode and got a bad idea for you guys to try. The pepper ball gun shot at around 320 FPS and was semi auto. For a while now I’ve been into airsoft and some of those non-lethal guns can shoot in excess of 600 FPS while shooting near 20RPS in full auto. Why not give some a try?

    • @ethandickinson-grant7268
      @ethandickinson-grant7268 Pƙed 5 lety

      The Modern Rogue you got sunrise right so good job kid Brian

    • @kirkw1740
      @kirkw1740 Pƙed 5 lety

      Love that Simpsons reference! lol Grimy Grimes

  • @gigglesgames1
    @gigglesgames1 Pƙed 5 lety +120

    How to do a modern rogue intro:
    Person 1: have you ever done a weirdly specific random thing?
    Person 2: reluctantly answers 'yes'
    Person 1: *laughs*
    Person 2: explains what they specifically did

    • @gigglesgames1
      @gigglesgames1 Pƙed 4 lety +1

      @@johnnyparsnips7641 I know this. I'm not hatinf on them lol. I love them. I was just observing something I noticed.

  • @GogiRegion
    @GogiRegion Pƙed 5 lety +50

    I once took a cryptological mathematics class, and after talking about how to crack the Vigenere cipher, the teacher told us about this perfect cipher called the “One Time Pad,” that’s so strong that it’s even been mathematically proven to be impossible to crack. And even RSA, which is what banks and militaries use is still theoretically crackable, even if near impossible to. Of course, we then asked how that’s possible, and that it obviously had to have a downside. She then said, “It’s called the one time pad because you can only use it once per key, or else it’s just like any other Vigenere cipher.” It was really funny to see Brian’s reactions to a lot of the stuff here.

  • @VhenRaTheRaptor
    @VhenRaTheRaptor Pƙed 4 lety +8

    A surprisingly effective way to generate randomness for a OTP is in fact dice.
    Some versions on one-time-pads use numbers purely instead of letters to generate the OTP... so rolling something like a ten-sided dice over and over can generate random enough numbers to generate a pad.

  • @MiWill1988
    @MiWill1988 Pƙed 5 lety +40

    That's not a bad patreon bonus. Patrons get the OTP. Videos on CZcams deliver a coded message

  • @redcatjack
    @redcatjack Pƙed 5 lety +93

    Surprised they didn't talk about Cloudflare using Lava Lamps to get truly random numbers

    • @waitwhat6062
      @waitwhat6062 Pƙed 5 lety +10

      Tom scott fans where you at?

    • @Deliphin11
      @Deliphin11 Pƙed 5 lety +2

      They didn't because it's not truly random, it's just practically random enough for any use case. Technically, everything they do is predictable, there's just so much to predict that it's practically impossible. Truly random would be literally impossible- no amount of data you could have would get you there.

    • @JooJingleTHISISLEGIT
      @JooJingleTHISISLEGIT Pƙed 5 lety +6

      it is practically truly random, thus it's worth mentioning

    • @Lambda_Ovine
      @Lambda_Ovine Pƙed 5 lety +2

      @@Deliphin11 You're mostly right, but you're wrong by saying that everything they do is technically predictable. Due to the uncertainty principle of quantum mechanics, you can only go as close as have probabilities of what could happen, but you cannot predict what will happen.

  • @asdrugrohl
    @asdrugrohl Pƙed 5 lety +179

    Haha! I watch too much Modern Rogue. I knew it was Grilled cheese since the "G"

    • @nickwilson940
      @nickwilson940 Pƙed 5 lety +3

      I thought this the second I counted the letters

    • @user-vn7ce5ig1z
      @user-vn7ce5ig1z Pƙed 5 lety +1

      Why did I think of Frank Grillo? đŸ€” That doesn't even start with a 'g'. 😕

    • @asdrugrohl
      @asdrugrohl Pƙed 5 lety +4

      @@user-vn7ce5ig1z but Grank Frillo does

    • @markmcculfor6113
      @markmcculfor6113 Pƙed 5 lety

      Yep lol

    • @jeremiahdavis7904
      @jeremiahdavis7904 Pƙed 5 lety

      @@user-vn7ce5ig1z Grillo, Frank legal document style fixes that issue lol

  • @ryanwilson3483
    @ryanwilson3483 Pƙed 5 lety +155

    Your "made up" sign for day, is actually really close to American Sign language sign for day!!

    • @JZStudiosonline
      @JZStudiosonline Pƙed 5 lety +6

      The opposite motion is night. But sign language is kind of weird since it seems to change over time.

    • @jameslwjtoler
      @jameslwjtoler Pƙed 5 lety

      I noticed that too. It's signed "now" then "day" if I remember correctly.

    • @TristanJCumpole
      @TristanJCumpole Pƙed 5 lety

      On a related note, the closed captions have terrible grammar errors.

    • @andymcl92
      @andymcl92 Pƙed 5 lety +4

      @@JZStudiosonline As opposed to thee spoken word which be famously unchanging?

    • @FreeER
      @FreeER Pƙed 5 lety +1

      @@JZStudiosonline "sign language is kind of weird since it seems to change over time"
      Wilcumian stĂȘpan word−cwide mĂŠcca - Welcome to (all) language(s) mate, lingojam.com/OldEnglishTranslator
      my knight loves having knives with silent letters in their names for no reason lol
      (unless you mean it literally changes depending on the time of the day when it's signed, in which case I never came across that in the tiny bit of ASL I tried to learn on memrise lol... gave up because internet is bad and it'd take forever to load the gifs)

  • @djsnackcakes2795
    @djsnackcakes2795 Pƙed 5 lety +26

    When I was little, I would use a keypad as the key. Somethinf like "hello" would be 42 32 53 53 63. I still use this to store passwords in notebooks since most people wouldn't think about that

    • @samuelmashil
      @samuelmashil Pƙed 5 lety +2

      Damnnnnnn that's smart

    • @djsnackcakes2795
      @djsnackcakes2795 Pƙed 5 lety +1

      @John Melvin the ones you would find on a candybar phone

    • @destrata6616
      @destrata6616 Pƙed 5 lety

      What's your current YT password in the code

    • @djsnackcakes2795
      @djsnackcakes2795 Pƙed 5 lety

      @@destrata6616 81 42 21 81 74 21 53 21 74 74 43 33 43 32 31

    • @djsnackcakes2795
      @djsnackcakes2795 Pƙed 5 lety

      @John Melvin not really from my experience

  • @silentwraithgaming8631
    @silentwraithgaming8631 Pƙed 5 lety +31

    codded message from end:
    hidden in plain sight code remains unsolved. clues come in pairs six in all. 1 code and one place tell you the goal. freshen up on base 2 and much will be told.

    • @DeLegend27
      @DeLegend27 Pƙed 5 lety +1

      base 2 is binary. I wonder if there was a secret binary code hidden here too.

    • @mfultimate
      @mfultimate Pƙed 5 lety +1

      The code in the thumbnail says "wpechme cowards", although I might have done it wrong

    • @joblakh
      @joblakh Pƙed 5 lety +1

      it's probably reffering to the "5 Secret Codes Hidden in Plain Sight" video. At the end there was an SSTV signal that led to this image: imgur.com/gUiE9Sn

    • @YourOwnDemize
      @YourOwnDemize Pƙed 4 lety

      @@mfultimate welcome cowards

    • @mfultimate
      @mfultimate Pƙed 4 lety

      @@YourOwnDemize ahh, that makes a lot more sense lol

  • @JakeSnake07
    @JakeSnake07 Pƙed 5 lety +3

    What you were saying about the lottery actually reminded me of an experience the other day that I had.
    I had my phone out, and I started playing music from one of my playlists, and after I hit play, I noticed that it wasn't set to Random, so I turned that on. Six songs later, and I'd noticed that it'd played all 8 Siousxie and the Banshees songs in the playlist in a row. Obviously, I assumed that it'd justed played down the list in order, until I looked, and saw that it *was* playing randomly. It just happened to randomly choose to play those 8 songs first out of the 200 in the list.

    • @BrandtHughes
      @BrandtHughes Pƙed 5 lety +2

      I swear I remember hearing an anecdote ages ago that what you experienced is effectively what Apple had to engineer their shuffle feature against. They would get complaints about it not being random because of instances like that or repeated songs or whatever, so they made it less random so that it _felt_ more random on the surface. Hopefully I'm remembering that correctly!

  • @richardpowell4281
    @richardpowell4281 Pƙed 5 lety +3

    Without going into detail. This is basically how Cryptology works in the military. Its usually kept in a safe, that can only be accessed with people that have the appropriate clearance. and each day they input these alpha numeric codes into the system to ensure proper communications.

    • @libertyts
      @libertyts Pƙed 5 lety

      No... not it isn't... not for normal communication networks up to Top Secret at least. There may be exceptions where this is used, but very few and far between. Having been a Signaler for almost 8 years, I had to deal with crypto on a daily basis. It is no secret that most militaries use hardware encryptors with multiple "entry" options for the keys. Manual entry (typing) of keys is extremely rare.

    • @richardpowell4281
      @richardpowell4281 Pƙed 5 lety +1

      @@libertyts I should have been more specific. I was an officer on a ship so I know how crypto works. I said "without going into detail" Because yes obviously you don't just sit there and manually send back and forth garbled messages deciphering them manually. However you do input crypto keys using a one time pad that allows your computer systems to decrypt messages being sent that are only good for a certain period. We always knew when crypto hadn't been loaded properly because it would mess with certain systems and call signs would be off. But ya know I kind of didn't want to go into all that..... because its kind of faux pas to discuss cryptology protocol even if the knowledge is available elsewhere. But ya had to chime in...... hope it felt good.

  • @Brady482
    @Brady482 Pƙed 5 lety +19

    Me: *Looks at title* "Hmm, it would be a good opportunity for a Nord VPN spons-
    Brian: "This episode is sponsored by Nord VPN"

  • @Gunbudder
    @Gunbudder Pƙed 5 lety +6

    The US Navy used to use a literal pad of flash paper to do OTP communications. Pretty cool stuff

  • @lane1639
    @lane1639 Pƙed 5 lety

    Great video! You guys always brighten my day when I watch a video of yours. They've been great since the start of this channel and I can't wait to see more!

  • @slpk
    @slpk Pƙed 5 lety +4

    A quick clarification:
    What make pseudo-randomness different from true randomness is not its origin (like the human who built the algorithm), but the fact the such algorithms run on deterministic computers, and a deterministic machine can't create true randomness.
    The bugs or errors in the algorithm would be sources of weakness in the pseudo-random data.

  • @FalconicofPern
    @FalconicofPern Pƙed 5 lety +2

    As a linguist and a Deaf Culture/ASL geek: pidgin sign like that can be a good stepping stone to a desire to learn a real sign language, you guys should do a series on learning ASL and local deaf culture interpretation from interpreters/deaf folk!
    Like to signal boost!!!

  • @kavalogue
    @kavalogue Pƙed 5 lety +23

    Literally what I wanted right now thanks lads

  • @christopherreed4723
    @christopherreed4723 Pƙed 5 lety +1

    My personal favorite pen-and-paper encryption is a late WW2 German system called RasterschlĂŒssel 44. From what I've been able to find on it, it was significantly harder to crack than Enigma. Since it was used primarily for tactical communications, it simply wasn't useful to take a large percentage of the hardware that was being used to attack Enigma traffic offline and allocate it to breaking individual RS44 messages, since the content would have had little operational value by the time it was read. And the machines would *not* have been available to break Enigma messages in that time. Until quite recently the majority of RS44 messages intercepted were unbroken. It was simply too much trouble to attack the system.

  • @moebest
    @moebest Pƙed 5 lety +13

    hidden in plain sight... so far so good. *thinking intensifies*

  • @mmmmmatthewwwww
    @mmmmmatthewwwww Pƙed 5 lety +4

    A lot of respect to you Brian, for respecting who and what Grant Thompson did not only as a youtuber but also as a friend
    Thank you
    May he Rest In Peace
    (A part of the journey is the end) RDJ

  • @IceDragon978
    @IceDragon978 Pƙed 5 lety +1

    The concept of passing messages that only a selected group/individual can understand is so fascinating to me. I've used a book cipher, a transposition cipher, and hiding-information-in-plain-sight-behind-what-appears-to-be-nonsense codes; but I'd never heard of One-Time pads. I'll definitely have to dig deeper into that, it seems amazing.

  • @Sen-ey5fg
    @Sen-ey5fg Pƙed 5 lety +18

    Candidate Jeep Jop was the first member of TMZ Cobra to be converted into a changeling hybrid creature

  • @oblonggrape7580
    @oblonggrape7580 Pƙed 5 lety

    Sweet!! I love how you guys are delving back into all of the cold war tech you explored earlier in the show's history

  • @stephenburley4581
    @stephenburley4581 Pƙed 5 lety +32

    Candidate Jeep Jop?! You're dating your content! He's The Right Honourable Jeep Jop now!

    • @1224chrisng
      @1224chrisng Pƙed 5 lety +3

      the scary thing is that Rt.-Hon. Former Mayor Jeep Jop of Greater London is in charge of the trident sub nukes, and it's not even with like a complicated password system, it's literally a letter in a safe in another safe with instructions on it

    • @LuxFerre4242
      @LuxFerre4242 Pƙed 5 lety +1

      @@1224chrisng Sounds good to me. You can't hack a letter in a safe.

    • @stephenburley4581
      @stephenburley4581 Pƙed 5 lety +2

      @@1224chrisng Now, I wasn't gonna get that political... But that made me laugh so hard.

  • @TheEraihiryuu
    @TheEraihiryuu Pƙed 5 lety +8

    Yet another brilliant episode. With privacy being harder and harder to secure, something like this is always a interesting subject. Thank you! Oh and no injuries...other than Brian's pride. ^.^

  • @vitus4514
    @vitus4514 Pƙed 4 lety +7

    "1 1 1 1 1 1" Well, d&d players knows that it happens

  • @MrNutrio6
    @MrNutrio6 Pƙed 5 lety

    These episodes are so fun to watch. Thanks again guys :)

  • @thatrandomperson8263
    @thatrandomperson8263 Pƙed 5 lety +1

    You should do more of this ciphers are so cool!

  • @1224chrisng
    @1224chrisng Pƙed 5 lety +32

    yes, One True Pairing(s) are very convoluted

  • @WinsTooLittle
    @WinsTooLittle Pƙed 5 lety

    Notification popped up and I immediately hit the video. Love the vids, keep going lads!

    • @robbzooi
      @robbzooi Pƙed 5 lety

      that makes you special

  • @libertyts
    @libertyts Pƙed 5 lety +1

    Ya' killing me! I've spent WAAAAAAAY too long trying to figure this code out. The first layer is simple enough if not a little time-consuming (regretting not writing some code to figure it out for me rather than doing it manually...). Finding those extra clues is not going well though. I feel like you guys did an episode that touched on binary at some stage, but I can't for the life of me figure out which one?!?! Hmmmm, good play boys, good play!

  • @NinjaProofVest
    @NinjaProofVest Pƙed 5 lety

    Reminds me of the infinite improbability drive from The Hitchhiker's Guide to the Galaxy. When Brian said the lottery numbers being all ones, it reminded me how the IID would take you exactly where you wanted to go because it's so improbable to randomly blink to the location you suggest that it works. Lol. Silly but fun to think about.

  • @tigerarabia383
    @tigerarabia383 Pƙed 5 lety +10

    Teacher sees 8:27
    **Wikipedia isn’t a real reference REEEEEEEEEEEEEEEEE**

  • @GatlinsFuckinCornfield
    @GatlinsFuckinCornfield Pƙed 5 lety +1

    I like more educational episodes like this please do more of these.

  • @moose43h
    @moose43h Pƙed 5 lety

    I was waiting for this for years

  • @tzisorey
    @tzisorey Pƙed 5 lety +1

    I remember statistics class in the 90's. Because the internet wasn't really a thing, and computers are as bad as people at generating true randomness - we had to buy a book (same sort of size as an exercise book) filled with just random numbers. The fact they could be used as a One Time Pad did come up in class.

  • @zachdeany626
    @zachdeany626 Pƙed 5 lety

    I would like to say thank you for some really personal stuff that I don't really want to say on this public site I just want you to know that you helped me recently

  • @dead-wi2el
    @dead-wi2el Pƙed 5 lety +13

    we all have been trained to know it ws grilled cheese

  • @MissCin101
    @MissCin101 Pƙed 5 lety +1

    So really really similar to the diana cipher. I have the cipher wheel for that one and it also uses the one time pad.

  • @ClokworkGremlin
    @ClokworkGremlin Pƙed 5 lety +1

    I'd always kind of wondered how One-Time Pads work. This basically explains everything and now I want to write a program to use it.
    So the OTP can't be cracked because there's *nothing to crack.* As Jason explains in the episode, each individual letter uses a different encryption key, which is only ever used once and then thrown away.
    Normally, you use an encryption key for an entire message or to identify a person (see PGP signatures... actually that could be a fun episode), but if the key gets compromised somehow, then that entire channel is compromised.

  • @idogtv
    @idogtv Pƙed 5 lety

    Whoa. I kid you not, just today at work I was working on implementing OTP. Although, in this case, OTP stood for "One Time Password" (essentially the same concept, though). But it was interesting to get home after working on "OTP" all day only to see "OTP" in my subscription box.

  • @739redrose
    @739redrose Pƙed 5 lety +5

    This could be improved by pairing it up with a fountain pen filled with Noodler's Blue Ghost ink. Why that ink? It's waterproof, write the message on the envelope instead of the letter. They won't see that coming LOL
    EDIT: if you want to make a random OTP by hand, use a bag of scrabble pieces. Dip your hand in and record the letters.

  • @ContentCalvin
    @ContentCalvin Pƙed 5 lety

    The dank meme material able to be extracted from this one episode is threw the roof son

  • @calebdaily1049
    @calebdaily1049 Pƙed 5 lety +1

    when I was in 7th or 8th grade, the science textbook showed how certain groups of three nucleotides corresponded to specific amino acids. so I started making a similar code that used a pool of five letters instead of DNA's four. this yielded 125 possible results where as if I had gone with four, I would have had only 64

  • @graceatkins7486
    @graceatkins7486 Pƙed 5 lety

    As someone who knows American Sign Language, Brain actually signed "today" correctly. One hand rising on the other can be day, Sunrise, or sunset (depending on how you're sign) though sunset is normally going down.

  • @brianzetzer4227
    @brianzetzer4227 Pƙed 5 lety

    Always interesting and funny! Thank you!

  • @monazach
    @monazach Pƙed 5 lety +30

    Don’t say first I have a blue shell
    Edit: sorry for doing this but thanks for the likes! It really makes my day!😀

  • @stormflyer6574
    @stormflyer6574 Pƙed 5 lety +15

    The cool kids use the dovah language from skyrim

  • @RafaelZolet
    @RafaelZolet Pƙed 5 lety

    The sign used by Brian for "today" is actually very similar with the sign used in brazilian sign language for "morning", because it represents the sunrise, only diference is the hand configuration: in bsl it is with the thumb touching the index finger, like an ok sign

  • @andrew5689
    @andrew5689 Pƙed 4 lety

    Damn, I love this channel so much.

  • @upinarms79
    @upinarms79 Pƙed 5 lety +1

    If I recall correctly, some number stations had some of their messages decoded because they supposedly got lazy and were re-using OTP keys. Of course it could have just as well been intentional.

  • @toaster9123
    @toaster9123 Pƙed 5 lety

    This is a great video. Thanks!

  • @cipherpunk7409
    @cipherpunk7409 Pƙed 5 lety

    It's interesting to note the reason that you cannot reuse the one time pad to encrypt a second message. If someone gets a hold of two messages encrypted with the same key, the security is completely compromised. An attacker would only need to guess at a small portion of the plaintext in either message (a probable word, for example) and test the hypothesized key on the other message to see if it produces additional plaintext. The attack jumps back and forth between the two messages until it totally unravels. It might be a little tedious to do by hand but a computer would crack it nearly instantly.

  • @vikingtenfifty
    @vikingtenfifty Pƙed 5 lety +1

    There is also a (MM) in the encoded message that corresponds to two different letters in the decoded message, D and C.

  • @jeffryvaughan3167
    @jeffryvaughan3167 Pƙed 5 lety +5

    Actually, your sign for day was pretty close to ASL. Essentially what you did, but backwards.

  • @rekeamohcsreed7719
    @rekeamohcsreed7719 Pƙed 5 lety

    Amazing timing for this one guys 😂

  • @caydenmcgough8841
    @caydenmcgough8841 Pƙed 5 lety

    how do they not have more subs i mean there so good they deserve so much better than this i guess the youtube algorithm doesnt put them on peoples recomended hey keep goin though i think anyone would love these guys if they were more represented

  • @PlagueHD1080p
    @PlagueHD1080p Pƙed 5 lety +1

    Love it guys!

  • @Performak_YT
    @Performak_YT Pƙed 5 lety +2

    You can encrypt a message, and encrypt the encryption, making it even more secure (but probably you don't need that kind of security...)

    • @TheStrangerous
      @TheStrangerous Pƙed 4 lety +1

      Performak Ah. Yeah. Good point. Multiple layers.

    • @p4nz9r60
      @p4nz9r60 Pƙed 4 lety

      In the case of OTP, re-encrypting the already encrypted message would not make it more secure, due to the nature of how OTP works.

  • @curtishoffmann6956
    @curtishoffmann6956 Pƙed 4 lety

    As mentioned in other comments below, the table used in the video is basically the Vigenere table. There are a few variations on this, including Beaufort, Variant and Gronsfeld. OTP by itself is nothing really special. If you use a short keyword or phrase, you just keep repeating it to make the full key for the message you're sending. Doing this, though, makes the key periodic, and once someone else figures out what the period is, it's easy to crack the cipher. OTP is just the use of a key that's the same length as the message, so it's not periodic. Reusing an OTP key doesn't automatically compromise the system, because there's no guarantee that your two different messages will contain the same important words. That is, one message could be a weather report, and the other could be "escape now, your cover is blown". What's important, though, is to keep the messages short.
    What makes OTP so secure is that, with the Vigenere table, any message can be created just by changing the key. If the ciphertext is "ccccc", one OTP key could give you "CHESS" and another one could give you "MARTY", yet both keys could be wrong and you'd never know. The real weakness in using pseudo-random number generators is not so much in the predictability of digit strings in a particular OTP key, but that there's going to be repeated strings of digits from one OTP key to the next. If you've captured enough enemy traffic, no matter how many OTP keys have been used, that non-random part in making up ALL the keys on your one-time pad is going to mean that you're going to be able to read parts of different messages.
    As for how to get the OTP to the guy you want to communicate with, how about putting the keys on an SD card and using dead drops?

  • @daniellbondad6670
    @daniellbondad6670 Pƙed 5 lety

    Knew about the Vigenere cipher and one time pad.But not about adding numbers to the grid.

  • @phonicleproductions
    @phonicleproductions Pƙed 5 lety +3

    I knew it was gonna be grilled cheese as soon as I saw the G. I've been watching too much of these two.

  • @m4rt_
    @m4rt_ Pƙed 2 lety

    If you have a VigenĂšre cipher where the key is longer or just as long as the input text, then it is essentially unbreakable, unless you want to do brute forcing and figuring out what outputs might be the right answer, manually or through algorithms or ai.

  • @erwingifslang
    @erwingifslang Pƙed 5 lety

    radioactive decay is seen as random because we haven't found any pattern in it and we don't know all variables that may come in in to it. it is possible that some variables haven't been discovered yet

  • @GogiRegion
    @GogiRegion Pƙed 5 lety +1

    I’m surprised you guys didn’t talk about how the only way to get truly random results is with quantum states. The easiest way to do this is with radioactive decay, because the exact intervals and strengths at a given time are truly random. You also can use a quantum computer to generate true random numbers.

    • @BrandtHughes
      @BrandtHughes Pƙed 5 lety

      We did touch on that, although briefly, at 2:42

  • @RabidPorkupine
    @RabidPorkupine Pƙed 5 lety

    Assuming that this method does not code word breaks, some information can be inferred by the length of words. It also does not change the overall length of the message.

  • @josephrissler9847
    @josephrissler9847 Pƙed 5 lety

    A desktop computer can generate random numbers from human input. The exact timing between keystrokes, for example, is unpredictable. I believe they also incorporate numbers from hardware events (e.g. exactly how long a disk read takes, for example). This works because if you add two random numbers together modulo some maximum value (such as the maximum value that the computer holds in one integer) then you get a number that is more random than either number.

  • @phauntis
    @phauntis Pƙed 5 lety

    Me and a friend came up with the Hopilop language as kids. Stupidly easy to break but it counts. Clue is in the name and its soooo inefficient. But also have a kind of understood hand/body language thing going with a mate i've played airsoft for years with. Its gotten to a point where we can convey quite complex details across without a word though misinterpretations have happened a plenty

  • @jacobyoung7000
    @jacobyoung7000 Pƙed 3 lety

    Jason reminds me of Daniel Stern... but funnier. Love the video!

  • @reggiep75
    @reggiep75 Pƙed 5 lety

    3:52 - I always remember the number stations vid as it started with 'Man, I miss the Cold War!' and my eyes went like plates and I burst out laughing.
    It was also one the first MR vids I watched and thought 'Where has this true gangstah sh*t been? I shall binge it at once!'

  • @darkhero6303
    @darkhero6303 Pƙed 5 lety

    Loved this video

  • @Darth_Callous
    @Darth_Callous Pƙed 5 lety

    I remember watching something about a science experiment that used two telescopes which observed separate stars in the night sky and used their twinkling to generate randomness can't remember the specifics or why it was needed but still cool :)

  • @ancientsled4778
    @ancientsled4778 Pƙed 5 lety +5

    Brian's made up name in the Nord commercial is "Jeep Jop".
    Brian drives a Jeep.
    Brian's brain is not random.

  • @jamespreston5661
    @jamespreston5661 Pƙed 5 lety

    YEAAH NEW UPLOAD

  • @Zwedgy
    @Zwedgy Pƙed 5 lety +1

    You guys should do the Diffie-Hellman key exchange by hand. This way you can generate a secret between two people without letting anyone listening know the secret.

  • @PhazonBlaxor
    @PhazonBlaxor Pƙed 5 lety

    One time pad encrypted messages are like library of babel: the message can be every combination of words within the number of letters it contains. So, you can try to brute force it and find a message that makes sense, but it's not necessarily the real message.

  • @johnechelbarger7832
    @johnechelbarger7832 Pƙed 4 lety +1

    YES! The Rogues need to have a secret communication network!

  • @iout
    @iout Pƙed 5 lety

    From what I remember from a book on ciphers and codes I had in middle school, the Vigenere Cipher (the one used in this episode), actually isn't all that secure. Don't get me wrong, It's very secure to the average person, like myself, but to someone with enough experience there is a method of approximation that can get decently close to deciphering a message. I can't remember what it was though.
    Obviously it's a lot easier to crack if you encrypt the message poorly, though. To encrypt the message well use a random key, make the key as long if not longer than the message itself, block your enciphered message so the word lengths don't remain the same as before, keep the message short, etc. All of which are done in this video. It's also possible to make the cipher more secure by rearranging the reference alphabets. So instead of making the top alphabet "abcdefg...", make it "dfgcbae...". Same for the side alphabet. Taking these steps makes the Vigenere cipher more secure, and now that I think about it, it seems like it _should_ be impossible to decode as is, but I seem to recall that there are ways to decode it. And not even with a computer. I could be wrong on that part though.
    Also, coincidentally enough, just this week I finished making a spreadsheet that could encipher and decipher a vigenere encrypted message with given alphabets, input message, and key. Unfortunately, I made it so that it uses just letters and no numbers, so it's annoyingly useless in deciphering that last message in the video.
    Edit: Hmm, Hidden in plain sight, much will be told.

  • @bravok1lo
    @bravok1lo Pƙed 5 lety

    Nice haircut Brian 👍

  • @Guysm1l3y
    @Guysm1l3y Pƙed 5 lety

    You can get "random entropy generators" for computers that look like a USB flash drive to get truly random numbers from quantum processes like the breakdown of a diode junction.

  • @jamescritchlow3445
    @jamescritchlow3445 Pƙed 5 lety

    if im correct that is either the actual sign for day or really close

  • @sr-xv7eu
    @sr-xv7eu Pƙed 3 lety

    Honestly was good to hear you say Scotland.

  • @TheMaritimeHorror
    @TheMaritimeHorror Pƙed 5 lety +1

    "First letter is going to be G" immediately knew the phrase would be grilled cheese.

  • @beni9129
    @beni9129 Pƙed 5 lety +1

    Nowadays truly random number generators use atmospheric noise to create numbers. Since electrons are truly moving in a random orientation we can discern a number value to certain orientations of an election as it's moving in space. this is how we create random numbers for since related matters like determining where to study a population in a micro population study. Now it's possible that electrons are not random however, we don't know enough about quantum physics to understand them in that way.

  • @DarkKnightofIT
    @DarkKnightofIT Pƙed 3 lety

    You could go a step further and start from a predetermined number of characters in, like start decrypting from the second line in the key.

  • @jasonpatterson8091
    @jasonpatterson8091 Pƙed 5 lety

    The other quality that a one time pad MUST have is that the pad must be as long or longer than the message that is sent. If not, then it becomes a Vigenere cipher instead, and if the message is longer than the pad and the users cycle through it multiple times, it can be quite easy to determine the key using letter frequency analysis alone (it's not a ONE TIME pad anymore, you know?) This was actually done on some occasions when users weren't given new pads and simply reused old ones. Again, the "one time" part of one time pad is vital.

  • @AFrogInTheStars
    @AFrogInTheStars Pƙed 5 lety

    Never been this early wow. And youtube did not notify me
    Also the beginning was gold

  • @Keyumiz
    @Keyumiz Pƙed 3 lety

    How is the number distribution affected when time is used as a factor for generating the random numbers

  • @wanna877
    @wanna877 Pƙed 5 lety

    The cool part is that you can have 2 pseudo random machines that produce the OTP key, which are synchronized........ and it can be something as small as a thumb drive, or can be made to look like a normal app in a cellphone.

    • @wanna877
      @wanna877 Pƙed 5 lety

      (This is pretty much how garage door controller work)

  • @june012006
    @june012006 Pƙed 5 lety +2

    Perhaps I missed it, but one critical requirement is that the key is as long, or longer than the message. Otherwise you have to reuse, which removes the unbreakability of the cipher. Technically though, it's not unbreakable, but if you follow the rules (never reuse), every possible translation is equally probable. The moment your opponent has two messages with the same key, there is a pattern, and it is simple to break.

    • @june012006
      @june012006 Pƙed 2 lety

      @Joe King if the key is equal to or greater in length than the message, and is only used for encryption once, then it is actually unbreakable, because literally every possible decrypted value is equally probable. Sure the enemy may correctly guess the translation, but they have no way of knowing that. It has nothing to do with computational power. As soon as the rule is broken though, both messages are vulnerable, as there is only one possible key that will give an intelligible message out of both.

    • @june012006
      @june012006 Pƙed 2 lety

      @Joe King the problem has nothing to do with time, or computational power. Every letter in the message effectively has its own key, with no relation to any other letter. Assume a 26 letter character set, for every character X in the encrypted message, there are 26 equally probable possibilities, and the previous and following Xs have no relevance. There is no pattern to discern. Once there is a second message encrypted with the same key however, a pattern will emerge, and decryption is easy. The one time use rule is the only thing that keeps it "unbreakable".

    • @june012006
      @june012006 Pƙed 2 lety

      @Joe King computers are great at finding patterns, and in nearly every cipher, there is a pattern to find. With a one time pad, there is no pattern whatsoever. Computers aren't magical, if there is a mathematical way of deriving the answer, a computer will eventually find it, but if there is no mathematical way of finding the answer, the computer is powerless.

    • @june012006
      @june012006 Pƙed 2 lety

      @Joe King you clearly haven't understood a thing I've said. A computer cannot find an answer when every single possible answer is equally valid. Most forms of encryption can be broken given enough time, but that's because there is only one correct answer. The one time pad has an infinite number of equally valid possible answers, with no way of determining which is correct.

  • @washinthewind
    @washinthewind Pƙed 5 lety

    I would totally listen to a Brian Brushwood Hearthstone podcast! How do I make that happen?

  • @thearrogantcorndog5704
    @thearrogantcorndog5704 Pƙed 5 lety

    CUZ IM A MODERN ROUUUUUGE!!
    Boy oh boy, Mason Jurphey and his grilled cheese, well played... Ryan Bushwood, wtf.... "sunrise??" 😂😂😂
    Love the spycraft episodes... love it all

  • @erustownsend9790
    @erustownsend9790 Pƙed 5 lety +1

    In programming random number that special pattern is called a Seed

  • @DeltaDS
    @DeltaDS Pƙed 5 lety

    great video!
    any chance of an upcoming mixology video with Trevor?

    • @TheStrangerous
      @TheStrangerous Pƙed 5 lety +1

      Delta Gaming Soon!

    • @DeltaDS
      @DeltaDS Pƙed 5 lety

      @@TheStrangerous Awesome! Those videos are some of my favourites, but I love every single one you guys do :D

  • @hakachukai
    @hakachukai Pƙed 5 lety

    Did anyone decode the OTP message 10:43? I'[m kinda curious what it says, but not willing to put in the 30 or so minutes it would take to find out.

  • @ChozoSR388
    @ChozoSR388 Pƙed 5 lety

    Hey, you guys have the same computer speakers I have! :D Cyber Acoustice CA-3602 FFP, right?

  • @user-vn7ce5ig1z
    @user-vn7ce5ig1z Pƙed 5 lety +2

    2:40 - Half the Internet's security runs on lava lamps (yes that's a simplification and generalization): czcams.com/video/1cUUfMeOijg/video.html
    5:39 - It's tricky to do key-exchange, but especially so in-band. But out-of-band key-exchange isn't always practical (Internet).
    6:12 - What you thought is also valid. It doesn't make a difference in which order you index the array, as long as it's consistent.
    Like you said, OTPs aren't practical in some situations like the Internet, so asymmetric/public-key cryptography endures.

  • @robertfrank16
    @robertfrank16 Pƙed 4 lety

    When I was a freshman in high school, I used Norse runes to ask a girl out to homecoming instead of actually asking in person. Bad at dating then, bad at dating now.

  • @denverneal5292
    @denverneal5292 Pƙed 5 lety

    I just saw the original code pop up on the screen and in my head went “yeah thats enough letters for “grilled cheese”