Zig Zag Decryption - Computerphile

Sdílet
Vložit
  • čas přidán 15. 09. 2015
  • XOR encryption is flawed. Professor Brailsford explains the zig-zag method that can reveal the precious key stream.
    Fishy Codes - Bletchley's Other Secret: • Fishy Codes: Bletchley...
    XOR and the Half Adder: • XOR & the Half Adder -...
    Colossus & Bletchley Park: • Colossus & Bletchley P...
    5 Hole Paper Tape: • 5 Hole Paper Tape - Co...
    The Professor's Supporting Documents:
    Sean/Dave ZigZag document: bit.ly/computerphileZigZag
    C Program to play with: bit.ly/ComputerphileZigZagCprog
    The real life decryption: bit.ly/ComputerphileTiltman
    Teleprinter codes: bit.ly/computerphile5holetape
    / computerphile
    / computer_phile
    This video was filmed and edited by Sean Riley.
    Computer Science at the University of Nottingham: bit.ly/nottscomputer
    Computerphile is a sister project to Brady Haran's Numberphile. More at www.bradyharan.com

Komentáře • 130

  • @ButzPunk
    @ButzPunk Před 8 lety +224

    17 minutes of Prof Brailsford feels like 5 minutes of any other video. The way he explains this stuff is just so engaging. I love it!

  • @Kilroyan
    @Kilroyan Před 8 lety +134

    His voice is incedibly relaxing. Great job putting everything in understandable terms!

    • @jcarlos100
      @jcarlos100 Před 8 lety +4

      He's voice is like velvet. I can hear him all day

  • @David-lb4te
    @David-lb4te Před 3 lety +13

    To watch this video is proof that teaching is a gift, and Prof Brailsford has it in bucket loads.

  • @Dagrond
    @Dagrond Před 8 lety +21

    I haven't seen green-bar paper since I was in college on a PDP-11.
    Love these series in more way than one.

  • @stephenphillip5656
    @stephenphillip5656 Před 7 lety +5

    I could listen to Professor Brailsford all day- his enthusiasm for the subject is captivating and the clarity of his explanations is most welcome. MORE PLEASE!!

  • @bmjames
    @bmjames Před 4 lety +7

    Forget Netflix, I am happy isolating and watching Professor Brailsford all day.

  • @mikepodella
    @mikepodella Před 5 lety +11

    Excellent teacher. Wish there were more of these at universities.

  • @Freakcent
    @Freakcent Před 8 lety +5

    More Bletchley Park stuff with the great Professor Brailsford please!
    I love this stuff and I love the way he explains and the passion he has telling about it.

  • @benaloney
    @benaloney Před 8 lety +26

    The David Attenborough of computer science!

    • @profdaveb6384
      @profdaveb6384 Před 8 lety +15

      +benaloney
      Thank you for the compliment ! I saw Sir David a few nights ago on BBC's "The One Show" . He is 18 years older than me, but I can only say that if I'm still alive in 18 years time, I can only hope I'm as fit, healthy and mentally alert as he seems to be ....

    • @benaloney
      @benaloney Před 8 lety +2

      +ProfDaveB Hand calculated decryption will keep anyone mentally alert! Thank you for sharing your insight on computer science, we all look forward to seeing more videos. Cheers

  • @cassia_cries
    @cassia_cries Před 8 lety +80

    Is there a Brailsfordettes fan club yet??!

    • @oneofspades
      @oneofspades Před 8 lety +7

      +Cassia Crichton Lets start up sign up sheet. One more vote for Brailsford

    • @U014B
      @U014B Před 8 lety +5

      +oneofspades And the sheet will be typed in Braille!

  • @thejskwared
    @thejskwared Před 6 lety +3

    I recently found this channel, and I've mostly been binging the videos with Professor Brailsford. He's very good at explaining things, a very well-spoken and captivating speaker, and I quite enjoy the topics he covers :) Also, great work with the video editing/animation in this video especially - the visual representation of what he was saying was very helpful as I was trying to understand the concept!

  • @itscomingoutofbothends8385

    "... then a very special technique could be used,
    to try and disentangle what these messages were
    without needing to know the key at all.
    Now that's an amazing property of XOR,
    you could perhaps say that it was a weakness or a flaw.
    But, in wanting to explain it to you exactly how this worked,
    I thought I'd better do it first of all, with a simple example"
    So poetic!

  • @iabervon
    @iabervon Před 8 lety +5

    One of my favorite problem sets from college (unfortunately now lost to history) consisted of two ASCII text documents XORed with the same random sequence, each about half a page from different books. Took a couple of hours to work out, including discovering a bunch of neat tricks that apply to D when P1 and P2 are ASCII text which make it a lot easier even when the plaintexts aren't otherwise related.

    • @profdaveb6384
      @profdaveb6384 Před 8 lety +3

      +iabervon
      Very interesting. Thanks for this! How did your ASCII-based system cope with the fact that XOR-ing two ASCII characters can all too often lead to a non-printable result e.g. NUL, NAK or even BEL ?! I'd be interested to hear about your ASCII special tricks because you're quite right in saying that unrelated texts using the same key are much tougher than related ones. Also, there are similarly quite a few properties of teleprinter 5-hole codes that greatly help when tackling same-key (but dissimilar) texts.

    • @iabervon
      @iabervon Před 8 lety +5

      The files we were given were plaintext XORed with the same binary file, so we were already dealing with binary files as input (including NUL not meaning the end of the string). IIRC, I just had a big char array, whose length I knew.
      The main trick I remember was that most of the characters were lower case letters, and two lower case letters XORed together gives a value less than 32, but a lower case letter XORed with a space gives the letter, upper case. This meant that it was easy to find word breaks. Also, capital letters were pretty obvious from bits 6 and 7, and there were some combinations that were obviously punctuation.
      I think I started from a capital letter after a space after punctuation, used the possible word lengths for the first word of that sentence, and tried some until I got something that looked like the middle of an English word in the other text. Then it was zig-zag continuing each sentence based on grammar and possible word lengths, along with the fact that you immediately knew the letter opposite a space. It helped that the documents were made of complete well-formed sentences, rather than headlines or sightings or something.

    • @allanrichardson1468
      @allanrichardson1468 Před 4 lety +1

      ProfDaveB In the five level (five bit) Baudot code, the state of the printer, LTRS or FIGS, was used as a sixth bit. While 26 of the 32 possible codes represented letters when the receiver was in LTRS case, and numbers, punctuation symbols, and actions like BELL when the receiver was in FIGS case, the remaining bit codes always represented the SAME action code:
      00000 = null, used for tape leaders
      11111 = force receiver to LTRS case; also, to correct a typo, use the tape punch backspace button to move the tape 1 or a few (maybe up to 5?) characters backward, overpunch the wrong characters with the RUBOUT key, making them RUBOUT characters, and type the correction.
      11011 = force receiver to FIGS case
      00100 = space bar
      00010 = carriage return (w/o linefeed)
      01000 = linefeed (without carriage return
      C/R and LF were always used together IN THAT ORDER, so that the first character of the next line would not print in the middle of the carriage movement back to the margin. They could also be used separately, to overprint a line, or to begin typing in the middle of a new line.
      The LTRS and FIGS shift codes DO NOT TOGGLE the case of the receiver; this ensures that even if a garbled shift character FAILS to alter the case, the incorrect printing will reset with the next shift character.
      The later 8 bit (on some networks, 7 bits with the 8th being used as a parity bit for error checking) ASCII code eliminated case shifting codes, since every printable character (and action code) had its own code. But the C/R and L/F remained separate,

  • @devdeckardCain
    @devdeckardCain Před 8 lety +5

    I would love to see more videos on encryption and compression!

  • @robinwells8879
    @robinwells8879 Před 3 lety +4

    To be able to “do” this stuff is human. To be able to teach it coherently is Devine!
    Sadly I am unable to do either but I enjoy watching others that can 🤣

  • @franklincerpico7702
    @franklincerpico7702 Před 8 lety +3

    AH! Another video with Professor Brailsford!

  • @j.dietrich
    @j.dietrich Před 8 lety +1

    Professor Brailsford is consistently fascinating.

  • @parttroll1
    @parttroll1 Před 8 lety +3

    Been waiting ages for this one

  • @bradbilbo6696
    @bradbilbo6696 Před 8 lety

    Very very cool stuff. The formula was explained well and his decipher example of two messages with the same key was awesome.

  • @anasotaibi
    @anasotaibi Před 8 lety +1

    I always love your vids professor! Thanks for the great explanation

  • @DFX2KX
    @DFX2KX Před 8 lety

    I took one of Stanford's online Crypto courses. And this was an amazingly easy way to put the method, never realized you could go back and forth like this, though, that's VERY clever!

  • @Tsunkuotaku
    @Tsunkuotaku Před 8 lety +2

    I would go back to school just to hear this guy talk.

  • @slinkytreekreeper
    @slinkytreekreeper Před 6 lety

    Fantastic series on encryption, juicy as can be

  • @HerrLavett
    @HerrLavett Před 8 lety +12

    Can I have some more of Prof B please?

  • @finthegeek
    @finthegeek Před 8 lety +6

    I was hoping for something more than just hoping someone sent something right and then guessing and verifying.... that said, that must have been damn hard work.
    I hope when sufficient messages were decrypted we could then spot the pattern of how the keys were generated :)

    • @profdaveb6384
      @profdaveb6384 Před 8 lety +9

      +Fin H
      Yes that's quite right. If you look at the "In real life" link (see Info Page for this video) you'll see that in real life John Tiltman they had the lucky break of getting 3800 characters of K from a zig-zag decode of a particularly long depth. But this just prompted the question of "what is the structure of this "Tunny machine" that can generate a 5-bit key sequence like this? ". And answering that question took another flash of genius from a man called Bill Tutte.

    • @finthegeek
      @finthegeek Před 8 lety +1

      ProfDaveB Brilliant. Thanks :) I really have no excuse not to head to bletchley park, living in Milton Keynes. Will make a point of it in the next few weeks.

  • @dasten123
    @dasten123 Před 8 lety +27

    4:19 ah I get it, so 'T' = 'A' ? So the guy in the plaintext is not David, it's Dtvid

    • @profdaveb6384
      @profdaveb6384 Před 8 lety +62

      +dasten123
      I was hoping that nobody would notice that I accidentally wrote down 'A' on the line-printer paper when I really meant 'T'. Sigh!

    • @harry8175ritchie
      @harry8175ritchie Před 8 lety +18

      +ProfDaveB You are the David Attenborough of the Computational world!!! This should definitely be broadcasted on TV as a documentary/series. Great stuff, David Computerborough.

  • @BAMBAMBAMBAMBAM-
    @BAMBAMBAMBAMBAM- Před rokem

    I wish Professor Brailsford would had been my teacher growing up

  • @woodywoodlstein9519
    @woodywoodlstein9519 Před 5 lety

    Simply amazing.

  • @alexhayden2303
    @alexhayden2303 Před 4 lety

    It's very depressing to have my mathematical inadequacies exposed!
    How satisfying, how exciting, to be involved in resolving these intangibles, under such pressures?

  • @zeromega
    @zeromega Před rokem

    Imagine being the person that found the zig zag, would have been a great day

  • @1st-Impressions
    @1st-Impressions Před 8 lety +7

    Instead of getting 2 messages with the same key why can't you simply divide one message into two halves and XOR the halves against each other?

    • @jennagentles1836
      @jennagentles1836 Před 6 lety +1

      No. The cipher key needs to be the same for both pieces. That is why this works on a repeated message. If you split the message in the middle then the cipher key is going to be different and it won't work/

  • @DemetryRomanowski
    @DemetryRomanowski Před 8 lety

    Its a great feeling of accomplishment when you break a cypher. The only cypher I have ever broken was for CATAPILLAR ECM passwords, I was overjoyed when I finally did it... I can only imagine how the people at Bletchley Park must have felt.

  • @bjornmu
    @bjornmu Před 8 lety +1

    I see how this is a shortcut to decrypting the messages, but it doesn't actually give you more power. If you can guess parts of P1, you can use that to determine what the key would need to be to generate the corresponding C1, then try decrypting the same part of C2 using that key and see if it makes sense. It gives you the same result. Of course this technique with the combined key may be more convenient, though not necessarily faster. You still need two xor's per letter.

  • @teinili
    @teinili Před 2 lety

    I wish the titles on these Videos would indicate more about the content because I know watched them in backwards order because I didn't know that they were so related :D

  • @amigojapan
    @amigojapan Před 8 lety

    so this may allow us to decrypt one or two messages that use the same key, but once the pseudo random key is reseeded(could it be reseeded?) everything would be back to unintelligible text?

  • @amreladawy3784
    @amreladawy3784 Před 8 lety +1

    What about finding the most frequent character in the encrypted text and map it to letter "E". Then the key can be obtained by doing K= E + C where C is the encrypted character.

    • @profdaveb6384
      @profdaveb6384 Před 8 lety +3

      +Amr ElAdawy
      Well the designers of the Lorenz/Tunny machine made great efforts to ensure that the frequency distribution of letters could, in principle, be smoothed out and randomized so that the ciphertext wasn't susceptible to statistical attack. However, it often happened that a "bad" choice of patterns and settings for the cipher wheels did allow the statistics to show through - in the way you suggest. Crucially in the Tiltman Break (see link labelled "In Real Life" on the Info Page of this video) not only was there a "depth" of two near-identical messages with the same key but also the poor choice of wheel patterns helped BP enormously.

    • @amreladawy3784
      @amreladawy3784 Před 8 lety +1

      +ProfDaveB
      Thank you Sir for your reply.
      One point that is being discussed a lot here, which is using wild guessing to attack the encrypted text.
      The Tiltman Break paper depends on the assumption of knowing the first part of the German message "message number ".
      We were looking for a way to attack the encrypted message without such assumption nor wild guessing.

  • @AureliusR
    @AureliusR Před 8 lety

    I love Prof Brailsford! He always does a great job. However, this is the first video I've seen with him where I felt he didn't do a great job explaining it. I already knew how it worked, and I feel that he missed a couple key points, and if I were a beginner I would have a hard time understanding it. That being said, he's an excellent Professor and I love his videos on Computerphile more than any of the other ones. Some of the other ones are kinda lame.

  • @talideon
    @talideon Před 8 lety

    This is why your choice of mode of operation is so important.

  • @ThatJay283
    @ThatJay283 Před 2 lety

    if you were to ask for a 3rd message then that would give you even more information and you would be able to verify the message with the 3rd message too

  • @syproful
    @syproful Před 8 lety +1

    What a mastermind he is.

  • @lassebom
    @lassebom Před 8 lety +9

    How can there be 44 views when the video is 17 minutes long, and it's 3 minutes ago it was uploaded?

    • @Lugitaro
      @Lugitaro Před 8 lety +9

      +Monticube What's the problem? A "view" means clicking on the video.

    • @subjectnamehere3023
      @subjectnamehere3023 Před 8 lety +2

      +fireluigi12 As far as I know it's a bit more complicated. Until around 311 views or so every click is taken as a view. Further on this is decided by an algorithm, which makes sure that you can't "farm" views. if you click on the video and immediatly switch to another/close the page it won't be counted.

    • @Measurity
      @Measurity Před 8 lety +11

      +Monticube CZcams has a new way to count views. It will no longer freeze at 301+ views. Instead it will batch collect views and validate them. If they're validated: it's added to the view count of the video.

    • @Ninquo
      @Ninquo Před 8 lety +2

      +Monticube the video was probably uploaded a few hours or days ago and set on unlisted

    • @Seegalgalguntijak
      @Seegalgalguntijak Před 8 lety

      +Monticube During the first 3 minutes of the video being live, 44 people clicked on it and started watching.

  • @gogokowai
    @gogokowai Před 2 lety

    Imagine having a time machine and introducing spies to base64 encoding or some other variant that changes the number of characters. I guess the 1:1 character ciphers were used to make decoding quicker on paper, but they just seem so easily cracked in retrospect.

  • @isbestlizard
    @isbestlizard Před 4 lety

    why even guess once the streams are out of sync just take what's being revealed and shove it back into the one that's running behind and it generates more and more

  • @ericsbuds
    @ericsbuds Před 8 lety +4

    If I was trying to be secretive, I would create a cypher that gives false messages when decrypted incorrectly! I wonder if that's even possible.

    • @Schindlabua
      @Schindlabua Před 8 lety +1

      I guess if you had some sort of ongoing messaging channel (like in a war), you could throw off unwanted listeners by deliberately sending a second message, which turns the first message into something else. I assume that works only for very short messages though and needs to be carefully crafted to not make it look too random or anything. It'll also probably only work a few times until the other party finds out about your bait messages.
      But in the general case, no! As soon as you send two messages with the same key, you're basically screwed. If you don't, you're fine, really.

    • @martonantoni575
      @martonantoni575 Před 8 lety +5

      +ericsbuds en.wikipedia.org/wiki/Deniable_encryption

    • @ericsbuds
      @ericsbuds Před 8 lety +1

      Márton Antoni excellent

    • @allanrichardson1468
      @allanrichardson1468 Před 4 lety

      Along the same lines, when Will Shortz designed the NYT crossword for the day after Election Day in 1992, several weeks before the election, he had a seven letter Across entry with the clue being “Last night’s winner.” The seven Down entries intersecting that one had clues that could refer to two words, depending on whether the winner was BOBDOLE or CLINTON, and either way would match with the other clues they intersected,

    • @georgehorton2717
      @georgehorton2717 Před 2 lety

      @@Schindlabua k

  • @mojosbigsticks
    @mojosbigsticks Před 8 lety

    Damn clever!

  • @St0ner1995
    @St0ner1995 Před 8 lety +1

    what if the "sudo random" generator just used the last cypher character? would that be easier or harder to decipher?

    • @mandolinic
      @mandolinic Před 8 lety +3

      +St0ner1995 That would be mindbogglingly simple to decode. You already have the sequence of cipher characters, so all you need to do is try each letter in the cipher text against the preceding character in the cipher text. The plaintext message then just falls out with almost no work required.

    • @klaxoncow
      @klaxoncow Před 8 lety +3

      +St0ner1995 It's spelt "pseudo", by the way. A sneaky silent "P" to trip you up there!

    • @cigmorfil4101
      @cigmorfil4101 Před 5 lety

      @@mandolinic
      Though that does suffer from interference - if any character is received wrong all the message from that point onwards will be gibberish.

  • @rickseiden1
    @rickseiden1 Před 8 lety +1

    Couldn't you split the cipher text in two, xor the two halves, and then play the guessing game on them?

    • @profdaveb6384
      @profdaveb6384 Před 8 lety +10

      +Rick Seiden
      No you can't. For zigzag to work, the two ciphertexts must be produced with exactly the same key stream, kept exactly in sync with the two plaintexts. This means the same initial settings and everything. You can't just split a ciphertext in two,at an arbitrary point in the key stream, and expect the un-synced second half to work OK with the first half.

    • @rickseiden1
      @rickseiden1 Před 8 lety +3

      Wow! A reply from the professor himself! That's so awesome! Thank you for taking the time to answer my question!

  • @user-xz7ok1ns5e
    @user-xz7ok1ns5e Před 11 měsíci

    Give me more !!!!! PLEASE !!!

  • @cxpKSip
    @cxpKSip Před 7 lety

    for any 2 cipher texts and key, I can get a new key K' that is also an acceptable key for BOTH messages.

  • @joealias2594
    @joealias2594 Před 8 lety +1

    Correct me if I'm wrong, but once he guesses "Hi Dave" and then gets back "Hello " on the other side, doesn't that more or less confirm that he's cracked it? And then, can't he compare the first six characters of p1 and c1 (the first cypher message and the plain text translation of the first message) to work out the key, and then just use the key? My understanding is that you only need to guess until you have a plausible start to the message, but you wouldn't have to guess the entirety of the message once you're confident you've decrypted part of it.

    • @dannygjk
      @dannygjk Před 8 lety +1

      +Joe Alias Most of the time, however it's possible the apparent solution would be wrong, that the word is just a coincidence. The process is similar to playing Mastermind.

    • @joealias2594
      @joealias2594 Před 8 lety +1

      Dan Kelly I guess my thinking is that it would cost little to try out that key, so he might as well try.

    • @dannygjk
      @dannygjk Před 8 lety

      Joe Alias Yes, but these days decryption is mostly automated. I even wrote a little program myself years ago to help me with the tedious aspects of decryption.

    • @profdaveb6384
      @profdaveb6384 Před 8 lety +5

      +Joe Alias
      Hi,
      As the other replies have pointed out, you have the great advantage nowadays of being able to use personal computers to automate a trial-and-error process. In 1941 every single XOR operation on two 5-bit chars. had to be done "by hand" ! Also in my example I've allowed myself the luxury of always making a correct guess :-) In practice what often happened was that your initial guess of HI DAVE
      might produce total garbage like XYCDGBJ - n the other stream after zig-zag - so you'd have to try something else.
      And don't forget that the two messages I show you (and this happened in actuality in the Tiltman Break of 1941-- see link on Info page) are two versions of the *same* message . This was a real luxury! Far more often, the two messages using the same key would be about two rather different topics e.g. "meeting with the Greek ambassador" and "shortage of ammunition". When the topics are different it makes zig-zag decryption a lot tougher. But weaknesses in the 5-hole teleprinter code structure shifted this balance back quite a bit and made things possible -- as I hope to cover in a later video.

    • @joealias2594
      @joealias2594 Před 8 lety +1

      ProfDaveB Thanks for taking time to reply! :)
      I do understand how getting that original guess is very difficult. My question pertains more to after you've actually guessed correctly than to the process of the zig-zag decryption.
      If you guess HI DAVE and get back XYCDGBJ, then it's obviously back to the drawing board. My question is, if you were to guess, say, MEETING WITH and get back SHORTAGE OF, then isn't the most efficient use of time thereafter to just assume you've guessed right, work out the key itself, and use the key, rather than to continue to zig-zag guess?
      Thanks!

  • @calmarcalmar
    @calmarcalmar Před 8 lety

    Means: when you have just one full encrypted message - yet know what is written there as plaintext, you can encrypt all other encrypted messages - right?

    • @profdaveb6384
      @profdaveb6384 Před 8 lety +3

      +Cacalari Bus
      It's not quite as simple as that, sadly! At the end of what I described in this video I did P + C = K , to get 21 characters of key. In real life (take a look at the link of that name on the Info Page) they got 3800 characters of key. And before you can decrypt any other message, on a different key, you've got to work backwards and figure out the internal structure of the machine that can generate key streams of this sort.

  • @PlexusTen
    @PlexusTen Před 8 lety

    This seems similar to inverse matrices in D1 Maths.

  • @ArnoldsKtm
    @ArnoldsKtm Před 8 lety

    I don't really have any idea what is he talking about because it's irrelevant to me, but I just love listening to him in the background.

  • @HorzaPanda
    @HorzaPanda Před 6 lety

    I guess if the guy sent the same message twice you'd just get a whole string of nul. Not a lot you can learn from that, or at least, that sounds like just as hard as a problem as the one you started with

  • @JCRatfish
    @JCRatfish Před 8 lety

    A question that has been on my mind throughout this series is why did everyone use the same 5 hole teleprinter codes? Why couldn't the enemy have used entirely different 5 bit codes to represent their letters? Wouldn't that have made it impossible since the Allies would have had no idea if 11000 = A?

    • @jirihavel9766
      @jirihavel9766 Před 8 lety +1

      +Jeremy Ratliff The strength of this simple substitution is almost negligible. Experienced cryptologist can break this by frequency analysis in several minutes.

    • @JCRatfish
      @JCRatfish Před 8 lety

      +Jiří Havel Oh! Okay, that makes a lot of sense. Thank you!

  • @iwave000
    @iwave000 Před 8 lety

    I actually kinda got that!

  • @WayneJohnsonZastil
    @WayneJohnsonZastil Před 8 lety

    I use sha1 and salt to encrypt is this secure?

  • @sethapex9670
    @sethapex9670 Před 8 lety +1

    how could you possibly know a some plausible plaintext in a realistic scenario?

    • @profdaveb6384
      @profdaveb6384 Před 8 lety +7

      +Andrew Mann
      Amazingly easily!! In the example of Sean's top-secret email if you can get hold of the email header info, as well as the body text, then you could start by looking for "To:", "From:" , "Subject:" "Bcc:" and so on. In real life,in 1941 (see the Real Life link on the Info page of this video ) John Tiltman knew that military discipline required every message to be numbered and so the first word to try for was "Spruchnummer" - the German for "message number". As I hope to be able to show in a later video, all sorts of other features/restrictions of the 5-hole teleprinter code gave extra avenues for attack. But it was never totally straightforward. He was totaly fluent in German but the initial break took Tiltman 10 days. However, with practice, one got better and better at doing "ZigZag".

    • @SerBallister
      @SerBallister Před 8 lety

      +ProfDaveB What if they didn't use ASCII encoding though, like a compressed bit stream?

    • @BertGrink
      @BertGrink Před 8 lety +1

      +SerBallister In fact, they did NOT use ASCII encoding*, since Professor Brailsford explicitly states that it is a 5-hole teletype code; this points towards either Baudot code, invented in 1870, or more likely the Murray code from 1901, which was an adaptation of the Baudot code. *ASCII code, on the other hand, uses 7 bits to encode the alphabet (upper and lower case), numbers 0-9, and several punctuation characters.

    • @SerBallister
      @SerBallister Před 8 lety

      Gert Brink Nielsen Yes I know, but why use a standard encoding ?

    • @cigmorfil4101
      @cigmorfil4101 Před 5 lety +1

      @@wingracer16
      There was one particular unit BP loved - that unit was in the middle of nowhere and send regular (daily?) reports of "nothing to report". Along with known weather stations where BP also knew the weather.

  • @yoianrhodes
    @yoianrhodes Před 8 lety +6

    I want him to read me a bed time story

  • @datenegassie
    @datenegassie Před 8 lety +1

    11:22 :D

  • @Jirayu.Kaewprateep
    @Jirayu.Kaewprateep Před 11 měsíci

    📺💬 In symmetric encryption, it required a Key to encrypt and decrypt messages and we could find the weeks of this Cypher by using multiple messages and XOR them together we could read messages from them because it is a symmetric Key algorithm. 📺💬 ( additional conversation they added, Yui what am I wrong⁉🥺💬 Nothing if you are leading to the lessons about security and certificates or communication networks )
    📺💬 You must try this with the Psudo random key.
    🥺💬 That is because it can be explaining about the algorithm for encryption and the Cypher process, they use it for estimates of how hard it is to break information from each sub-process is because information does not always from a single department.
    🧸💬 Do you mean reply messages and logarithms ⁉
    🧸💬 The Zig-Zag technique is you read it Zig-Zag but it is not applied to a single symmetric key message.

  • @U014B
    @U014B Před 8 lety

    James C "Sure, why not?"

  • @nirshalmon1646
    @nirshalmon1646 Před 8 lety +1

    Wouldn't it be simpler to just try up to 30 different keys?(it can't be the null, or the massage will be readable, and if you know it's not one of 31, it must be the 32nd)

    • @jirihavel9766
      @jirihavel9766 Před 8 lety +2

      +nir shalmon The number of keys is much higher. It is 32 possible characters times 32 for 2 character key, times 32 for 3 char key etc. It's 32 to the power of key length.
      You can't simply try all possible keys for xor cipher since for every ciphertext you can find a key that decripts it to any text you choose. You need some clever way to rule out almost every possible key so only one sensible plaintext remains.

    • @DFX2KX
      @DFX2KX Před 8 lety +1

      +Jiří Havel yep. That's why you need two messages using the same key, because it lets you narrow the field down.

  • @Sethorion99
    @Sethorion99 Před 8 lety +1

    Complicated. Couldn't follow it first time through.
    It's like humanity has created its own type of mathematics.

  • @Scratchifier
    @Scratchifier Před 8 lety

    Huh, interesting...

  • @raglanheuser1162
    @raglanheuser1162 Před 4 lety

    #ProfessorBrailsfordPhile

  • @NuclearSlayer52
    @NuclearSlayer52 Před 2 lety +1

    12:21 uwu

  • @ruinenlust_
    @ruinenlust_ Před 8 lety

    gwkki slcus

  • @hellterminator
    @hellterminator Před 8 lety

    So basically the Germans invented RC4 (or a block cipher in CFB mode). So basically we're still using technology which was broken 70 years ago.

    • @hans-peterklett8586
      @hans-peterklett8586 Před 7 lety

      RC4 is broken for a different reason than the one stated in the video, since it's a fatally predictable pseudo random number generator. The "two-time pad" described by this video isn't necessarily the problem there.

    • @johnfrancisdoe1563
      @johnfrancisdoe1563 Před 6 lety

      Hans-Peter Klett But early versions of Microsoft's PPTP VPN notoriously did the two-time mistake all the time, making it way too easy to crack without even breaking RC4. The biggest sinner in terms of basic mistakes over and over again however is standard WiFi, which is why they have had to rewrite the security part of the standard multiple times in the past 20 years.

  • @user-gx8pr4rb2m
    @user-gx8pr4rb2m Před 8 lety

    First comment.