Enigma is a truly brilliant approach to cryptography. The weakness is the common wording of course. So we can take common words out of the cipher altogether. When using enigma one must not use common words at all. so we can make different substitutes for common words like "the"
Or »das«, »der«, »die« and »Fuehrer« back when they operated them. In fact, Enigma messages began with a three-letter operator code (at first repeated once to make a six-letter operator code).
The answer is too simple. Simply group all the words into 5 letter groups and there are no common words to find. It comes out like this "thisi sames saget hatus esfiv elett ergro upsin itfin" It's just not translated for clarity. If you can't read it, it says "this is a message that uses five letter groups in it fin."
@@himesilva It actually is used by military. When a message is encoded it must be grouped into 5 letter groupings so that the common word sequences are not obtainable. Otherwise it would be easily decoded. Could you even recognize the message example even though it wasn't encoded? The next problem is letter frequencies. Like "E" is the most commonly used letter in the alphabet for English words. Words like it, we, us, be, etc, are limited in number. Single letter words a very easy as well, as they are VERY limited in number (I, & A)
MicManGuy Wtf SciShow i rewatched numberphiles videos about the enigma machine and then 3 hours later u post this video about Cryptography.. Are u spying on me? Spooky
I work with cryptography and I have to say: this video is amazing. Great way to teach the history of cryptography in a way easy to understand. Also very accurate and covered the most important topics of the history of cryptography
No mention of public/private key encryption (RSA/ECC) or the current symmetric key encryption (AES)? The schemes you provided are technically symmetric key encryption, and it's such an important word/concept that I'm surprised it wasn't specifically pointed out. RSA, ECC, and AES are the most important and relevant encryption schemes. A topic about cryptography is rather silly without them, even if it's only rudimentary stuff. You don't need to describe the math behind it, but mention the concepts at the very least.
Jeremy Joachim It's better to present properly just a few topics then to simply scratch the surface of several ones. I would be pissed if they attempt to explain RSA is 30 seconds.
Jeremy Joachim While I understand the reasoning behind what you said I have to say I partially disagree. While it is true they could of gone into more advanced/modern encryption methods. This show is primarily intended to provide and introduction to topics. This allows those who are interested to explore additional information and those who are not interested to learn some and then move on.
Jeremy Joachim This video was clearly only about the history of cryptography. It's very complicated to explain all that for everyone and expect it from an 8 minute video is unreasonable. But the concepts introduced in the video were great and all the information absolutely correct. The only thing that the video could have mentioned is the illogical use of the one time pad: "if you have a secure way to send the secret key, why not send the message itself through this comunication, since it has the same size?" But the video was amazing.
+Filipe Ponte Lima "This video was clearly only about the history of cryptography." But it says "The _Science_ of Making and Breaking Codes". This is like titling a video "The Science of Light" and then talking about aether the entire time. "if you have a secure way to send the secret key, why not send the message itself through this comunication, since it has the same size?" You can hand them an enormous one-time pad in person once, and then have secure communications thereafter. It's much more preferable than handing them messages in person every time.
This was an incredibly interesting episode, I ended up spending at least an hour reading about encryption and hashing after watching it. Very, very interesting indeed.
@@RevolutionibusOrbiumCoelestium Only as much as current encryption on normal computers is to break on normal computers, but quantum cryptography is un breakable to regular computers which I think they are talking about
It may be worth mentioning that the 'Bombe' made by Allen Turing and Tommy Flowers, was in many ways the world's first real electronic computer. It predated the American Colossus computer by about 4 years, and inspired it. Subsequently, Von Neuman (who had worked on Colossus) made a set of recommendations, should anyone attempt to build another one of these things. His recommendations led to the building of the first Von Neuman machines. All modern computers could reasonably be described as Von Neuman machines, because 75 years later they still comply almost exactly with Von Neuman's recommendations. Codes, specifically the Enigma, gave birth to modern computers. And, much as the NSA may annoy us, without espionage, there would be no computers.
"When websites announce that hackers know everything about you, that's because their encryption methods were breakable" That's not true. Most of the time the website are broken into because of unpatched or misconfigures software. It's extremely rare to be hacked because of a flaw in in the encryption methods.
Toni Lähdekorpi Well, you are partially right. You see when you hack a website you usually retrive a database filled with information. The information in this database can often be encrypted, so if you want to be able to login to lets say one of the admin accounts, you'll have to decrypt the usernames and passwords first. The method of encryption varies greatly from AES to no encryption(plain text).
PirateTHESteam1 in the case where an encrypted database containing passwords or credit cards is stolen, they advise changing your password and credit card out of an abundance of caution not because they believe that there is a credible risk of cryptanalysis cracking the crypto.
9 ปีที่แล้ว +3
PirateTHESteam1 If they access your servers and database, they will most likely also gain access to the code itself and the keys required for decrypting anything decryptable. Passwords aren't (or shouldn't ever be) ecrypted with anything other than a one way hash that by design can not be decrypted, but rather the password is always rehashed and compared to the stored one on login. But even with the decryptable data, the problem isn't a flaw in the encryption itself.
PirateTHESteam1 So if I encrypt all the passwords with MD5 I'm safe rite? I'm kidding. Though I have to ask, if say for instance you DO have a database where the passwords are encrypted using MD5 for whatever reason, would it be possible to switch to another algorithm and update the password rows accordingly?
9 ปีที่แล้ว
***** Yo dawg, you could always hash the easily brute-forceable MD5 hash and then remove the MD5 part on login.
Tips for simple but effective encryption (can be programmed in python) : 1) Include spaces, commas and dots in your alphabet list as 27, 28 and 29 respectively. 2) Carry out alphabet substitution. Example : a - t, b-k, c-s ...... 3) Then, apply vigenere cipher with long key. Example : "thispasswordissohardnobodywilleverguessit" 4) Don't use capitals. It makes it MUCH easier to crack. Your end text will be completely gibberish with random dots, comma and spaces. There will be no common word lengths such as 3 for "the", 1 for "I" and others.
the problem is that you can only encrypt text, and with a long enough message, even frequency analysis can still be done. there is no diffusion, the mapping is still 1->1
another giveaway worth mentioning is that in your message "scishow is the greatest" you use a common two letter word, and there's only a handful of two letter words those letters could be which makes it easier to guess the proper match. Also if you had used a single letter word, there's only two possible choices because the only single letter words are "I" and "A" (assuming you're not using txt lingo)
Seems to me you can get the same effect as an undecipherable code without it actually being unbreakable. Letter shift the message with the Caesar cipher, code the end result with the polyalphabetic cipher, and then use whatever other ciphers you so choose on top of all that. It should be such a momentous hassle full of trial and error while trying to figure out what ciphers were used that by the time it's decoded, the message is already unimportant with you being long gone and the scheme already accomplished. You bury them under so much busy work that you can do whatever you want in the meantime completely unhindered. Unless I'm misunderstanding how ciphers work?
You're right in separating "undecipherable" and "unbreakable". Most modern cryptography schemes are sets of rules that are fairly simple for computers to implement. As of yet, most of them are not proven "unbreakable", just "we think that these aren't decipherable in a reasonable amount of time". Which can be "good enough".
I've made several cyphers most of which were variations of the basic ones such as Caesar's. Two of which I'm somewhat proud of. The second one is newer and not yet refined but the first one operates as such: You pick a two digit number. In this case we will use 27. Now we write out the alphabet in order in a line. Using the number of letters in the first word of our message as a key we write the 10's digit out as many times as there are letters in the word above the alphabet. Continue in this pattern going up in numbers. So 3, 4, 5... Once you have finished on top we take the one's digit and work are way down. In this case 7, 6, 5, 4... The difference here though is that we are skipping letters equivalent to half of the key rounded up. You still use the number the same amount of times. Using the top number you will create groups of the same number which would give you different numbers on the bottom. If we were to encode "This is easier than expected." then you should have something that looks like this: 2222 3333 4444 5555 6666 7777 88 abcd efgh ijkl mnop qrst uvwx yz 5375 3753 7527 4264 2642 6416 31 We now put the groups in order listing the lower numbered groups from lowest to highest. in this case we get yz qrst efgh mnop abcd uvwx ijkl. Now we take our original number which will become our second key (and a guide for the receiver) and count through all of the letters that number of times.what we land on we then take out and use for our letters in order. I.e: ABCD EFGH IJKL MNOP QRST UVWX YZ ZREM BXSA LCFK IJTP GQOH UWDN VY But there's more! Capitol letters get shifted to the left by a factor of the first key (the letters in the first word). This means that instead of the 'T' in 'This' becoming a 'H' it becomes a 'P.' Fully translated it goes as follows: "This is easier than expected." "Palo lo bzolbq hazj bnpbehbm."
This video is great! My girls who code class is doing our Cyber Security/ Cryptography unit this week and this is such a perfect video to show them! Thanks SciShow!!!!
When hackers get data it's usually because either they got access to the decrypted data or the company didn't bother encrypting it at all. They don't usually break the encryption themselves.
I made an encryption process is even more powerful in that it iterated through a polyalphabetic cypher for every character just to regenerate a unique key for the subsequent character. This key regeneration was done for every ASCII character, 1 through 255. Pretty proud of it.
If every cipher can be cracked with enough time and determination, then how come no one has yet to crach the voynich manuscript? that book has been around for over 600 years and countless people have tried and failed to crack it.
Kroen Redstone the only logical answer is.. it's plain gibberish. I can tell cuz there was illustrations of people having sex. In a herbal journal of some sort. Lmao.
Kroen Redstone people at harvard uni studies the book and noticed that most of the words inside the book are too long to form a coherent and useful language, therefore they concluded that the book is gibberish and have created a way of mimicking the gibberish via a set of rules.
Not every cipher can be broken, one-time-pads are mathematically impossible to crack if implemented correctly, several other algorithms might also be impossible to crack when implemented correctly, but that hasn't been proven mathematically. Also, you can't translate a language using only the written language.
As someone who has a degree in Cyber Security I can say that encryption really is a double edged sword. From one site it's a great way to protect data. On the other it prevents through investigation after a breach due to the attackers using their own encryption. Sadly is its one of those situations where many develop a love/hate relationship with it.
***** Ok, I don't know if this will work, but it's the only thing I could find: First, hover your mouse over the user's profile pic. That should bring up the google plus hover-over menu. Click on the little 'g+' logo to go to their google plus profile. Once there, look for the little down arrow below their profile pic/circles info on the left side of the page. Click the little down arrow, and you'll see "Mute (user)" and "Report / block (User)" options. I don't know exactly what muting a user does, but it might be worth a try.
The enigma machine was the first thing that came to mind when I saw the title of this episode. Fun fact: There's one sitting in the Canadian War Museum for people to play with and it's mind-blowing how the letters changes every time. But now that I know certain letters can't be used for the same word, I just may spend more time there....until little Susie kicks my ass out of it. On a related note, the Navajo language was never broken by the Japanese in WWII either, but if the atomic bombs were never dropped and the Pacific war stretched on, I think it would've been with time.
I had trouble understanding the vigenere cipher before watching this it's really helped me to make sense of it thanks. Edit: Just used a vigenere cipher to test my friends hopefully I did it right
This was a very nice overview for those hearing about this for the first time - but also a nice summary for those of us who have heard more about some of these methods (especially Enigma), but really don't mind being reminded of the *big picture* every now and again. So all in all: great job! :)
I legitimately just guessed the cryptogram from the start of the episode as "scishow is the best" within a second or two of seeing it with no conscious input on my end. Admittedly this ended up being obviously wrong after a second or two of consideration, but it was so in the ballpark that it might as well be on first base. I'm really proud of my brain right now.
Fantastic video! In my third year of university we had to encrypt a message using any combination of substitution ciphers, Caeser shifts, Vigenere, and affine ciphers before then decrypting each others ciphertext. If our message got decrypted we lost marks and we gained marks by decrypting other peoples messages, it was a fun piece of coursework, especially after making a document in Excel to do all of the manual work for me :D
The polish cracked enigma (easy) Alan Turing (British) and his machine decrypt ed the code out of 159,000,000,000,000,000,000 possible combinations that kept changing every day
***** The original Enigma machine landed in a Polish customs office courtesy of Berlin. It was promptly followed by a German official claiming the crate had been sent by mistake, and to return it immediately before passing through customs. This aroused suspicion, so the customs officials took the crate apart and photographed everything they could so that a working model could be reproduced. This was in 1929, by 1932 the Poles had developed a working model and were able to decode messages, but in 1938 Germany made a new and improved model that was no longer breakable in the same way. Poland was able to smuggle all their work to the British just before they were invaded. Without that lucky circumstance, and Poland's hard work, Enigma may have never been broken during the war.
This was great I wish you had talked some about Steganography though, which amusingly enough google chrome's spell check doesn't recognise as a word XD
***** Uncommon word perhaps? Usually peri/apo are in reference to peri/aphelion which isn't common to begin with. Also I learned peri/apoapsis from the same place most people did.
I'm not really concerned with North Korea reading my email - and unless you're doing sensitive government work and and have documents related to that in your email, you probably shouldn't be either. A whole different concern is my own government or other organizations working within my country.
Um no.... I'd think not at least. I mean we have most of the languages on it learned and we did that by analyzing surrounding languages.... With some time given it'll be broken
Primid King He wasn't talking about the language learning program, he was talking about the actual Rosetta Stone, which helped us understand the hieroglyphic writing system of the Egyptians.
Aw, I was actually hoping for some of the newer, digital encryption information! Fun stuff regardless, though. Frequency analysis would've been my go-to for the standard Caesar cipher, but being able to apply it against a varying rule is fascinating. Human ingenuity is astounding.
Im partial to numeric book cyphers. All of my passwords are kept in a phisical blackbook with a home brew book cypher using a hyper specific practice text book that barely saw print. You don't need to worry about frequency analysis all that much if you open to random pages for each new word, take letters from both the middle and end of words and if you need to use spaces just mark them using pages not in the book which both nakes the code harder to crack and the book harder to isolate.
Me and a friend had a secret code in primary school. We would write backwards so anybody reading it wouldn't know what it meant. Worked well when other kids tried to read it.
While the Enigma was cracked, the Germans never managed to crack messages from the New Zealand WWII troops who spoke plain unencrypted Te Reo Māori into the Radio
+Tom Kelly lmao the axis couldnt really crack any first nation languages. So when they intercepted messages usually coming from the commonwealth they didnt know what they said
+Tom Kelly lmao the axis couldnt really crack any first nation languages. So when they intercepted messages usually coming from the commonwealth they didnt know what they said
+Tom Kelly lmao the axis couldnt really crack any first nation languages. So when they intercepted messages usually coming from the commonwealth they didnt know what they said
I don't understand why it is so common in English programs/films not to mention about three polish cryptographers who decoded Enigma before Turing. You should have done your research more reliable.
Because the UK want to glorify their 'Great' country, which is falling apart, and good that was made by other countries, they will take it, whatever they did bad, they give it to other countries. Pozdrawiam
7:35 When websites announce that hackers know everything about you this isn't necessarily due to encryption. It could mean an insider leaked information, leak by SQL injection, another leak which people used the same passwords for, etc. Hackers finding you password and through that knowing everything about you is generally not a problem of encryption, since encrypting passwords is futile. The problem is generally users choosing bad passwords or an outdated hashing algorithm or both.
Hey SciShow, Alan Turing isn't just recognized as a mathematician, but also one of the founding geniuses of the field of computer science. If we want knowledge and interest in computer science to spread, we shouldn't hide the history of the field or its greatest contributors, especially when the topic of the video is an essential problem space in computer science.
I learned to use the Playfair cipher a couple of years ago. Very simple to use, and very hard to crack. It's still possible to do letter pair frequency analysis, but you need a really large ciphertext to even get started
The Galaxy Cipher Machine: Unbreakable encryption. Then using the Kaliko encryption method. Set up: A disc cipher machine on a spindle, the discs are like checkers in that they have notches to fit into each other. 1st wheel is the set disc with the numbers 1-80 scrambled, etched around the side, and on the top edge are three alphabets, scrambled the same, with two empty spaces to make 80 digits around the top. Each letter on the top is over a number on the side. There are 26 body discs, each having two rows (top and bottom) of 1-80 on their sides. The first message is a four number code: 1234. This is first a security check. The number 23 on the disc, 4 to the right, plus 1, gives you the security response. For the set up: The number one represents which set disc is to be used. The 23 is the number on the set disc that is under the letter on the top "E". This letter is the first body disc to be put on the spindle under the set disc. Depending on what the users invented for themselves, an even number goes left, odd/right. So the order of the body discs is the E first, then of right for the rest of the letter order for the discs. The body discs are like checkers in that they have notches for them to fit into each other. There is a dot on the bottom of the set disc somewhere between two numbers, and a dot on each side of each body disc as well. The last number of the 1234, the 4, is how many (left or right) notches to shift the discs as they are being put on using the dots as beginning points. 4 was invented to mean right for the dots so each disc has their dots spaced 4 notches to the right of the one above it. It is also decided/invented which discs go on up-side down. Once all discs are in place a tightening bolt is screwed on the spindle to secure the discs. Operation: In the coded message sent, the first 30 numbers are still part of the set up. The message follows after them. In these 30 numbers you have invented the pattern that if there are two number 6s in the 5th, 13th, 18th, and 29th numbers, the message is authentic. If there are more or less than two number 6s the message is bogus and is disregarded. In the first 30 numbers, you take the 4th and 9th numbers to know which algorithms to use, in this case both numbers are 12,34. You have invented at least 10 algorithms. The first message letter is O. Find an O on the top of the set disc in one of the alphabets (using another alphabet for the next O), and go down to the number below it on the edge, say 57. Now the first four algorithms are made up by the two users of the machines so they can be anything their imaginations can come up with. Like, from 57, down five discs to the top row of 1-80 where the number is 32, find 32 on the bottom row and go down 7 more discs and do the same, then go straight up to the set disc. 2nd algorithm is a diagonal angling down to the right 8 discs to the lower number on that disc-46, then finding the 46 on the top row, and straight up the to the top set disc. 3rd algorithm is another imaginative pattern ending at the top number 78 on the set disc. 4th algorithm now has a sleeve that fits over the machine with holes randomly drilled into its side lining up with each disc's number lines, 15 holes per line. Now look again to the first 30 numbers and see the 18th and the 62nd numbers are 36, and 84. So now the 78 is lined up with the 3rd disc's top number 6 hole, this shows the number 69 in the bottom number row hole 8. This continues for 4 discs to the last number 51 that is sent in to the other communicating person. (36, 84 is third disc, holes 6 and 8, for 4 discs)They run it all backwards to find the letter O. Throughout the sent message there are many OOs. The pattern invented is that you go six numbers beyond the OO to see if there is a number 5 in that number (75). If there is, you know it is a body disc shift. The other number is how many notches to shift each dot.(Odd numbers one way, even the other). Do this at least once every message. If there is a 2 in that number (27) it means to replace the set disc with another one, in this case the number 7 set disc. You replace the old one and just line up the dots of the new set disc directly over the dot beneath it on the first body disc. Do this at least once every message for both set and body discs. Another code invented tells you to change the entire order of the set up with a 4 digit set up number following it. Another code tells you to change the number of algorithms to use. Golden rules: 1) Never use the same set up code more than once. 2) Always send at least 15 phony messages for every one authentic message. 3) Always shift both the set disc and body discs at least once every message. This cipher machine has ever changing/shifting number patterns, an infinite number of invented algorithms that are used in different orders, a large number of algorithms to constantly change, and every set of machines has a different operation. Each operating set of machines have virgin discs no other machines have. This cipher machine cannot be broken, not even by the largest computers in the world if used correctly. The confirmation that a code has been broken is that the message appears. With a 500 letter message, if 500 GCMs are used where each machine only encrypts one letter, there is no confirmation the letter that comes up when trying to break it is the actual letter that is in the message. Every letter has a machine with different discs, different algorithms, and different operators encrypting it. So the most any attempt to break the code can do is acknowledge that each letter position could be any of the letters in the entire alphabet (A-Z). To write out the possibilities on paper would be to have an entire alphabet under letter position #1, then another one under #2, an so on. In the end there would be 500 alphabets in a row as the only clue to what the message says. A wall of alphabets. Its like telling the hackers there are 500 letters in the message and the words are in the dictionary. With this small bit of information it is IMPOSSIBLE to even begin to try to find the message. Not even the biggest computer in the world, working on it for 10,000 years could find the message. This encryption form is called KALIkO ENCRYPTION, it is unbreakable, and is perfectly suited for the Galaxy Cipher Machine.
Would've been a perfect episode to give a nod towards Numberphile, and the fairly detailed, yet comprehensible bits they did about the Enigma, how it works and how the Poles cracked it, and why the Brits had to crack it again.
The information around 7:35 is wrong. When hackers compromise a site or database, they typically exploit a bug/flaw in the software that runs on the company's servers. Cryptographic attacks are very, very rare and very difficult to detect since they're typically operating on data that you willingly publish (thinking it's safely encrypted).
I don't think I'd understand the technicalities of modern digital encryption but I heard an analogy that made sense to me. If you're entering some private information on TH-cam, you put it in a briefcase and close it with a lock to which only you have the key, then you send TH-cam the locked briefcase containing the sensitive information. TH-cam can't open the briefcase, but they add a second lock which only they have the key to, and send you back the now double-locked briefcase. When it gets to your computer, you can verify that TH-cam's lock is authentic, so you open your own lock and send the briefcase back to TH-cam. Then they see that you've opened your lock, and they can open their own. This way, there is no exchange of codes or locks between the two parties, each side only manipulates their own lock.
i dont even do anything remotely connected to this video, i dont do coding, i never learn computer science, i Dont know a single thing about cryptography, yet, i still understand your video even though its a fast pace video, thanks, now im gonna go to sleep because its 4 a.m and somehow i manage to stumble upon this video
I read a book once in which they used two Identical prints of a book and a three number code. 12-18-4 referred to pg 12, line 18, word 4. easy to send msgs with common words and nearly unbreakable without the key, especially because you could use different combinations for the same word. obviously wouldn't work for data transfer, but cool for word based msgs.
what if you translate words through multiple languages? spaces could have different characters in different types of alphabets, including accents and perhaps words that could have multiple meanings such as tones (like in Chinese) . you could use the standard roman alphabet, romanize letters from languages that have character systems, and different meanings according to the different language and connotative meanings determined by translating other parts of the passage. would that be hard to decode??
At first, yes, but then you realize that for the message to be intelligible to whoever you want to actually read it they would have to know which languages were used, so you can't pick them at random, and if you do, there must be some way for the person receiving the message to know which one is which. Then it becomes a simple matter of finding the patterns and figuring out which language used is which and then translating it all to a single language and reading it. The amount of work would be similar not only for anyone trying to crack the code, but also to the people receiving the message, which would make such an overly ellaborate encryption system really difficult to use effectively.
It needs to be taken into consideration that a cypher, by definition, is meant to be read by someone. The trick is making sure only the people that you want to read it to read it. If you just come up with cyphers impossible to decode they'd just be useless. It's like making shelter impossible to get in during a zombie apocalypse, for a ham-fisted comparison. The harder it is for zombies to get in, the harder it is for you to get out, making your shelter more of a death trap than anything else. The best way to go about encryption is to make the cypher itself very simple but knowing its key impossible unless you just have it.
Been working on developing a cipher for about 5 years now. I'm almost ready to really try it out. I should send you guys some coded messages to see if you can crack them.
When a website was hacked, its often not because someone broke the encryption, but hackers who exploited bugs or gained access through social engineering etc. Thats much easier than brute forcing a key.
If you wonder the modern cryptograthy method is called aes (advanced encryption standard) and it works well, I believe that unbreakable without bruteforce, but you have to send them the key somehow, that is donne using rsa, which is less secure, and technically any rsa encrypted message can be exactly decrypted with no doubt of it beeing the correct if given enougth time to factor a half prime with hundreds of digits.
Two cryptographers walk into a bar.
Nobody else has a clue what they're talking about.
***** Who'd have known a cryptographer would be scuppered by predictive text.
@Ka P that took me a sec.
+Stu VS I'm not gonna lie. I don't get it
+TheYafaShow lol i got it in less than a minza
I get Ka P's joke now. I thought you'd all like to know that. It only took 3 months
passing notes in class just got a lot more interesting
hahah😂😂😂😂 true
@@xingyuliu1890 i bet they won't when they don't get caught passing test anwsers because they used the cipher
I gave this to a crush I had
hah, ik this is from 8 years ago, but imagine a teacher so confident aboutta bust a student, but then seeing "faojnfb hbba klpp hanv kkso"
THAT'S WHY I SEARCHED THIS UP
When you crack Caesar ciphers, do they ask "Et tu, Brute force?"
Hides from impending mob.
Kevin Xue Oh man exactly my kind of humour...well played :D
Huh?
i dont get this.
You don't get his story!
Haha man....!
he's telling me this so enthusiastically like if he's helping me get away with a top secret. I almost feel bad for having nothing to hide
LOL~!
Interesting. Hmmmmm
Enigma is a truly brilliant approach to cryptography. The weakness is the common wording of course. So we can take common words out of the cipher altogether. When using enigma one must not use common words at all. so we can make different substitutes for common words like "the"
Or »das«, »der«, »die« and »Fuehrer« back when they operated them. In fact, Enigma messages began with a three-letter operator code (at first repeated once to make a six-letter operator code).
The answer is too simple. Simply group all the words into 5 letter groups and there are no common words to find. It comes out like this "thisi sames saget hatus esfiv elett ergro upsin itfin" It's just not translated for clarity. If you can't read it, it says "this is a message that uses five letter groups in it fin."
@@gecsus That somehow seems too obvious. Would it really work?
@@himesilva It actually is used by military. When a message is encoded it must be grouped into 5 letter groupings so that the common word sequences are not obtainable. Otherwise it would be easily decoded. Could you even recognize the message example even though it wasn't encoded? The next problem is letter frequencies. Like "E" is the most commonly used letter in the alphabet for English words. Words like it, we, us, be, etc, are limited in number. Single letter words a very easy as well, as they are VERY limited in number (I, & A)
"This should look like gibberish to you"
*Gestures towards ad*
MetaBloxer nope
lol
Brute force is pretty effective on Caesar
even a brain could be decrypt caesar xd
agree :D
I understood that
I just screamed this is too funny i hate it
Too soon
How about a crash course series on this? Like if you agree.
I learned the Caesar Cipher in 4th grade. My teacher was awesome.
_edit: 5th grade._
***** For 8 year-olds. That's kinda... I dunno, the point?
Matthew DeLeon Most fourth graders would be 9, wouldn't they?
batman88891 nope
batman88891 Depends on where you started.
MicManGuy Wtf SciShow i rewatched numberphiles videos about the enigma machine and then 3 hours later u post this video about Cryptography.. Are u spying on me? Spooky
I work with cryptography and I have to say: this video is amazing.
Great way to teach the history of cryptography in a way easy to understand.
Also very accurate and covered the most important topics of the history of cryptography
your comment was very clear,...i doubt your a codewriter....hahaha
No mention of public/private key encryption (RSA/ECC) or the current symmetric key encryption (AES)? The schemes you provided are technically symmetric key encryption, and it's such an important word/concept that I'm surprised it wasn't specifically pointed out.
RSA, ECC, and AES are the most important and relevant encryption schemes. A topic about cryptography is rather silly without them, even if it's only rudimentary stuff. You don't need to describe the math behind it, but mention the concepts at the very least.
Jeremy Joachim I think they will do it in future videos, this was just the first part!
Jeremy Joachim It's better to present properly just a few topics then to simply scratch the surface of several ones. I would be pissed if they attempt to explain RSA is 30 seconds.
Jeremy Joachim While I understand the reasoning behind what you said I have to say I partially disagree. While it is true they could of gone into more advanced/modern encryption methods. This show is primarily intended to provide and introduction to topics. This allows those who are interested to explore additional information and those who are not interested to learn some and then move on.
Jeremy Joachim This video was clearly only about the history of cryptography. It's very complicated to explain all that for everyone and expect it from an 8 minute video is unreasonable. But the concepts introduced in the video were great and all the information absolutely correct.
The only thing that the video could have mentioned is the illogical use of the one time pad: "if you have a secure way to send the secret key, why not send the message itself through this comunication, since it has the same size?"
But the video was amazing.
+Filipe Ponte Lima
"This video was clearly only about the history of cryptography."
But it says "The _Science_ of Making and Breaking Codes". This is like titling a video "The Science of Light" and then talking about aether the entire time.
"if you have a secure way to send the secret key, why not send the message itself through this comunication, since it has the same size?"
You can hand them an enormous one-time pad in person once, and then have secure communications thereafter. It's much more preferable than handing them messages in person every time.
Very nice primer on encryption with examples. Great job! I hope you do a part 2.
This was an incredibly interesting episode, I ended up spending at least an hour reading about encryption and hashing after watching it.
Very, very interesting indeed.
6:16 There is a movie about that called ''The imitation game''
That's my favorite movie!
Love that film. Made me really sad how they treated Turing after the war. :(
yeah, watch 2 times and still love it though
Fantastic film
Yes! One of my favorite movies ever!
You should cover quantum cryptography - it's actually unbreakable
It is to current regular computers but not so much to other quantum computers
Laura Fleming - Actually that’s incorrect. Quantum cryptography is easily breakable with other quantum computers.
@@RevolutionibusOrbiumCoelestium Only as much as current encryption on normal computers is to break on normal computers, but quantum cryptography is un breakable to regular computers which I think they are talking about
The dai I saw a chain break through a tarmac road I knew everything is breakable
It may be worth mentioning that the 'Bombe' made by Allen Turing and Tommy Flowers, was in many ways the world's first real electronic computer. It predated the American Colossus computer by about 4 years, and inspired it. Subsequently, Von Neuman (who had worked on Colossus) made a set of recommendations, should anyone attempt to build another one of these things. His recommendations led to the building of the first Von Neuman machines. All modern computers could reasonably be described as Von Neuman machines, because 75 years later they still comply almost exactly with Von Neuman's recommendations. Codes, specifically the Enigma, gave birth to modern computers. And, much as the NSA may annoy us, without espionage, there would be no computers.
One of the best interesting episode ever !
Mat G For sure !
Despite the fact that hours could be spent explaining the cracking of codes, this is an excellent and concise explanation of ciphers and deciphering!
Mat G " "Cribs". HA !
Mat G yes, I agree
Mat G One of the best interesting grammar ever !
"When websites announce that hackers know everything about you, that's because their encryption methods were breakable"
That's not true. Most of the time the website are broken into because of unpatched or misconfigures software. It's extremely rare to be hacked because of a flaw in in the encryption methods.
Toni Lähdekorpi Well, you are partially right. You see when you hack a website you usually retrive a database filled with information. The information in this database can often be encrypted, so if you want to be able to login to lets say one of the admin accounts, you'll have to decrypt the usernames and passwords first.
The method of encryption varies greatly from AES to no encryption(plain text).
PirateTHESteam1 in the case where an encrypted database containing passwords or credit cards is stolen, they advise changing your password and credit card out of an abundance of caution not because they believe that there is a credible risk of cryptanalysis cracking the crypto.
PirateTHESteam1 If they access your servers and database, they will most likely also gain access to the code itself and the keys required for decrypting anything decryptable.
Passwords aren't (or shouldn't ever be) ecrypted with anything other than a one way hash that by design can not be decrypted, but rather the password is always rehashed and compared to the stored one on login.
But even with the decryptable data, the problem isn't a flaw in the encryption itself.
PirateTHESteam1 So if I encrypt all the passwords with MD5 I'm safe rite? I'm kidding.
Though I have to ask, if say for instance you DO have a database where the passwords are encrypted using MD5 for whatever reason, would it be possible to switch to another algorithm and update the password rows accordingly?
***** Yo dawg, you could always hash the easily brute-forceable MD5 hash and then remove the MD5 part on login.
Tips for simple but effective encryption (can be programmed in python) :
1) Include spaces, commas and dots in your alphabet list as 27, 28 and 29 respectively.
2) Carry out alphabet substitution. Example : a - t, b-k, c-s ......
3) Then, apply vigenere cipher with long key. Example : "thispasswordissohardnobodywilleverguessit"
4) Don't use capitals. It makes it MUCH easier to crack.
Your end text will be completely gibberish with random dots, comma and spaces. There will be no common word lengths such as 3 for "the", 1 for "I" and others.
the problem is that you can only encrypt text, and with a long enough message, even frequency analysis can still be done. there is no diffusion, the mapping is still 1->1
another giveaway worth mentioning is that in your message "scishow is the greatest" you use a common two letter word, and there's only a handful of two letter words those letters could be which makes it easier to guess the proper match. Also if you had used a single letter word, there's only two possible choices because the only single letter words are "I" and "A" (assuming you're not using txt lingo)
Seems to me you can get the same effect as an undecipherable code without it actually being unbreakable. Letter shift the message with the Caesar cipher, code the end result with the polyalphabetic cipher, and then use whatever other ciphers you so choose on top of all that. It should be such a momentous hassle full of trial and error while trying to figure out what ciphers were used that by the time it's decoded, the message is already unimportant with you being long gone and the scheme already accomplished. You bury them under so much busy work that you can do whatever you want in the meantime completely unhindered. Unless I'm misunderstanding how ciphers work?
You're right in separating "undecipherable" and "unbreakable". Most modern cryptography schemes are sets of rules that are fairly simple for computers to implement. As of yet, most of them are not proven "unbreakable", just "we think that these aren't decipherable in a reasonable amount of time". Which can be "good enough".
I've made several cyphers most of which were variations of the basic ones such as Caesar's. Two of which I'm somewhat proud of. The second one is newer and not yet refined but the first one operates as such: You pick a two digit number. In this case we will use 27. Now we write out the alphabet in order in a line. Using the number of letters in the first word of our message as a key we write the 10's digit out as many times as there are letters in the word above the alphabet. Continue in this pattern going up in numbers. So 3, 4, 5... Once you have finished on top we take the one's digit and work are way down. In this case 7, 6, 5, 4... The difference here though is that we are skipping letters equivalent to half of the key rounded up. You still use the number the same amount of times. Using the top number you will create groups of the same number which would give you different numbers on the bottom. If we were to encode "This is easier than expected." then you should have something that looks like this:
2222 3333 4444 5555 6666 7777 88
abcd efgh ijkl mnop qrst uvwx yz
5375 3753 7527 4264 2642 6416 31
We now put the groups in order listing the lower numbered groups from lowest to highest. in this case we get yz qrst efgh mnop abcd uvwx ijkl. Now we take our original number which will become our second key (and a guide for the receiver) and count through all of the letters that number of times.what we land on we then take out and use for our letters in order. I.e:
ABCD EFGH IJKL MNOP QRST UVWX YZ
ZREM BXSA LCFK IJTP GQOH UWDN VY
But there's more! Capitol letters get shifted to the left by a factor of the first key (the letters in the first word). This means that instead of the 'T' in 'This' becoming a 'H' it becomes a 'P.'
Fully translated it goes as follows:
"This is easier than expected."
"Palo lo bzolbq hazj bnpbehbm."
Never really gave this subject any thought before. Man, I love this channel
This video is great! My girls who code class is doing our Cyber Security/ Cryptography unit this week and this is such a perfect video to show them! Thanks SciShow!!!!
Crash Course: Cryptography & Cybersecurity?
PLLLZZZZZ!!!
I'm a little bummed you didn't finish with a bit about the Navajo Codetalkers. I know it's not exactly "encryption", but it seems relevant.
When hackers get data it's usually because either they got access to the decrypted data or the company didn't bother encrypting it at all. They don't usually break the encryption themselves.
I made an encryption process is even more powerful in that it iterated through a polyalphabetic cypher for every character just to regenerate a unique key for the subsequent character. This key regeneration was done for every ASCII character, 1 through 255. Pretty proud of it.
If every cipher can be cracked with enough time and determination, then how come no one has yet to crach the voynich manuscript? that book has been around for over 600 years and countless people have tried and failed to crack it.
Kroen Redstone the only logical answer is.. it's plain gibberish. I can tell cuz there was illustrations of people having sex. In a herbal journal of some sort. Lmao.
Kroen Redstone people at harvard uni studies the book and noticed that most of the words inside the book are too long to form a coherent and useful language, therefore they concluded that the book is gibberish and have created a way of mimicking the gibberish via a set of rules.
Not every cipher can be broken, one-time-pads are mathematically impossible to crack if implemented correctly, several other algorithms might also be impossible to crack when implemented correctly, but that hasn't been proven mathematically.
Also, you can't translate a language using only the written language.
tulp35000 Maybe there's some secrets the author really didn't want people to know about ;)
Kroen Redstone jibberish
As someone who has a degree in Cyber Security I can say that encryption really is a double edged sword. From one site it's a great way to protect data. On the other it prevents through investigation after a breach due to the attackers using their own encryption. Sadly is its one of those situations where many develop a love/hate relationship with it.
It's funny cause I just watched top 10 memes top 10 facts gravity falls and at the start he talked about codes
Omg, me too i was about to comment that lol
Oh gosh same here...
Same
Holy shet a combo breaker oppurtunity! Jk same here so we are all part of this internet genius club that subbed to Lemino and scishow
INDEED, ONE OF THE BEST EPISODES OF SCISHOW YET! Way to go, team! And way to host, Michael!
This stuff is way too advanced for me. So I'll just keep sitting on things :D
Sitting Guy do you babysit?
This is extremely simple.
What...?
***** Ok, I don't know if this will work, but it's the only thing I could find:
First, hover your mouse over the user's profile pic. That should bring up the google plus hover-over menu. Click on the little 'g+' logo to go to their google plus profile. Once there, look for the little down arrow below their profile pic/circles info on the left side of the page. Click the little down arrow, and you'll see "Mute (user)" and "Report / block (User)" options.
I don't know exactly what muting a user does, but it might be worth a try.
I admire your honesty. Everyone, listen, Sitting Guy for President
The enigma machine was the first thing that came to mind when I saw the title of this episode. Fun fact: There's one sitting in the Canadian War Museum for people to play with and it's mind-blowing how the letters changes every time. But now that I know certain letters can't be used for the same word, I just may spend more time there....until little Susie kicks my ass out of it.
On a related note, the Navajo language was never broken by the Japanese in WWII either, but if the atomic bombs were never dropped and the Pacific war stretched on, I think it would've been with time.
It's so weird not seeing youtube views freeze at 301 anymore O_o
Has it really been 4 years since that was a thing?
@@manurmad1539 longer actually
those were the days
I had trouble understanding the vigenere cipher before watching this it's really helped me to make sense of it thanks.
Edit: Just used a vigenere cipher to test my friends hopefully I did it right
Why do things get brittle when they dry out?
Because moisture offer more flexible movements and typically when that happens that means it was already pretty brittle
Possibly the best SciShow episode ever... brought me back to reading Cryptonomicon. Good job!
New and better cyphers, drop some hot bars, bruv
This was a very nice overview for those hearing about this for the first time - but also a nice summary for those of us who have heard more about some of these methods (especially Enigma), but really don't mind being reminded of the *big picture* every now and again.
So all in all: great job! :)
Gotta love Alan Turing!
I work in healthcare programming. Cryptography up a lot, it's nice to see a SciShow video on it!
my brain hurts
I legitimately just guessed the cryptogram from the start of the episode as "scishow is the best" within a second or two of seeing it with no conscious input on my end. Admittedly this ended up being obviously wrong after a second or two of consideration, but it was so in the ballpark that it might as well be on first base. I'm really proud of my brain right now.
The guy from Vsause is named michael. Coincidence?
This was one of the most interesting episodes so far. Great job.
Thanks Gravity Falls for teaching me this.
lol for me it was the overwatch arg with all that encryption and salted shit
Same dude!!
Fantastic video! In my third year of university we had to encrypt a message using any combination of substitution ciphers, Caeser shifts, Vigenere, and affine ciphers before then decrypting each others ciphertext. If our message got decrypted we lost marks and we gained marks by decrypting other peoples messages, it was a fun piece of coursework, especially after making a document in Excel to do all of the manual work for me :D
Actually the Polish cracked the enigma code first.
jk844100 Yes, it was mentioned in the video at 6:53 under the picture.
***** The british havent decoded it fully either. In the movie The imitation game its highly overrated.
The polish cracked enigma (easy) Alan Turing (British) and his machine decrypt ed the code out of 159,000,000,000,000,000,000 possible combinations that kept changing every day
***** The original Enigma machine landed in a Polish customs office courtesy of Berlin. It was promptly followed by a German official claiming the crate had been sent by mistake, and to return it immediately before passing through customs. This aroused suspicion, so the customs officials took the crate apart and photographed everything they could so that a working model could be reproduced. This was in 1929, by 1932 the Poles had developed a working model and were able to decode messages, but in 1938 Germany made a new and improved model that was no longer breakable in the same way. Poland was able to smuggle all their work to the British just before they were invaded. Without that lucky circumstance, and Poland's hard work, Enigma may have never been broken during the war.
But Britain can into space
Nice episode. I didn't learn anything but cryptography is always an interesting subject. Can't wait for the promised follow up.
Here is how to make an unbreakable code: Write down random letters and just remember what you meant. :D
The logic is so simple and yet the execution is so complicated
This was great I wish you had talked some about Steganography though, which amusingly enough google chrome's spell check doesn't recognise as a word XD
Jeff Cyr Hmm, it does for me.
Munashiimaru Really? I guess it's cause I have it set to UK english then
Jeff Cyr Chrome spell check doesn't recognize a lot of the technical words I use, like "apoapsis". I'm not sure why its dictionary is so limited.
***** I only know that word thanks to Artifexian. The math may not make sense but it works.
***** Uncommon word perhaps? Usually peri/apo are in reference to peri/aphelion which isn't common to begin with. Also I learned peri/apoapsis from the same place most people did.
The animation team has done a great job on this one!
I'm not really concerned with North Korea reading my email - and unless you're doing sensitive government work and and have documents related to that in your email, you probably shouldn't be either.
A whole different concern is my own government or other organizations working within my country.
Exactly, true
Wow Michael! I really love how into detail this episode is.
Would the Rosetta Stone be considered as an unbreakable message?
Um no.... I'd think not at least. I mean we have most of the languages on it learned and we did that by analyzing surrounding languages.... With some time given it'll be broken
Primid King He wasn't talking about the language learning program, he was talking about the actual Rosetta Stone, which helped us understand the hieroglyphic writing system of the Egyptians.
+Malboro Overking so was I 😂😂
+Malboro Overking so was I 😂😂
+Malboro Overking so was I 😂😂
Aw, I was actually hoping for some of the newer, digital encryption information! Fun stuff regardless, though. Frequency analysis would've been my go-to for the standard Caesar cipher, but being able to apply it against a varying rule is fascinating. Human ingenuity is astounding.
Wow, great episode. I was rapt the whole time.
Im partial to numeric book cyphers. All of my passwords are kept in a phisical blackbook with a home brew book cypher using a hyper specific practice text book that barely saw print. You don't need to worry about frequency analysis all that much if you open to random pages for each new word, take letters from both the middle and end of words and if you need to use spaces just mark them using pages not in the book which both nakes the code harder to crack and the book harder to isolate.
More interested in keeping the USA out of my e-mails to be honest.
Me and a friend had a secret code in primary school. We would write backwards so anybody reading it wouldn't know what it meant. Worked well when other kids tried to read it.
use encrypted klingon
While the Enigma was cracked, the Germans never managed to crack messages from the New Zealand WWII troops who spoke plain unencrypted Te Reo Māori into the Radio
+Tom Kelly lmao the axis couldnt really crack any first nation languages. So when they intercepted messages usually coming from the commonwealth they didnt know what they said
+Tom Kelly lmao the axis couldnt really crack any first nation languages. So when they intercepted messages usually coming from the commonwealth they didnt know what they said
+Tom Kelly lmao the axis couldnt really crack any first nation languages. So when they intercepted messages usually coming from the commonwealth they didnt know what they said
you are looking
Really well done
Thanks~~~~~
I don't understand why it is so common in English programs/films not to mention about three polish cryptographers who decoded Enigma before Turing.
You should have done your research more reliable.
source?
+luckynater
BBC for example. you can dig deeper but this source seems easiest and still reliable.
www.bbc.com/news/magazine-28167071
Didn't know that. Thank you :)
Because the UK want to glorify their 'Great' country, which is falling apart, and good that was made by other countries, they will take it, whatever they did bad, they give it to other countries.
Pozdrawiam
7:35 When websites announce that hackers know everything about you this isn't necessarily due to encryption. It could mean an insider leaked information, leak by SQL injection, another leak which people used the same passwords for, etc. Hackers finding you password and through that knowing everything about you is generally not a problem of encryption, since encrypting passwords is futile. The problem is generally users choosing bad passwords or an outdated hashing algorithm or both.
My brain just got brain fucked.
same here
Oddly enough, there's a language called Brainfuck. ;P
Hey SciShow, Alan Turing isn't just recognized as a mathematician, but also one of the founding geniuses of the field of computer science. If we want knowledge and interest in computer science to spread, we shouldn't hide the history of the field or its greatest contributors, especially when the topic of the video is an essential problem space in computer science.
"Nice Things About Hitler" that's a pretty edgy post-punk cold-wave band name.
Fascinating. Thank you for the video!
whos here for school?
I~n~v~e~s~t~i~n~B~T~C~~{}~{}~E~T~H{}{}{}
W~H~A~T~S~A~P~P
+~ 1 ~3 ~1 ~2 ~2 ~1 ~9 ~5 ~0 ~ 0 ~4 ~~~~~........
me
I learned to use the Playfair cipher a couple of years ago. Very simple to use, and very hard to crack. It's still possible to do letter pair frequency analysis, but you need a really large ciphertext to even get started
3:23 Vigenere has always been my favorite cipher.
What are encryption methods used for languages which don't have alphabets, for example Chinese.
That was one of the best ones yet. Keep going
The Galaxy Cipher Machine: Unbreakable encryption. Then using the Kaliko encryption method.
Set up:
A disc cipher machine on a spindle, the discs are like checkers in that they have notches to fit into each other. 1st wheel is the set disc with the numbers 1-80 scrambled, etched around the side, and on the top edge are three alphabets, scrambled the same, with two empty spaces to make 80 digits around the top. Each letter on the top is over a number on the side. There are 26 body discs, each having two rows (top and bottom) of 1-80 on their sides.
The first message is a four number code: 1234. This is first a security check. The number 23 on the disc, 4 to the right, plus 1, gives you the security response.
For the set up: The number one represents which set disc is to be used. The 23 is the number on the set disc that is under the letter on the top "E". This letter is the first body disc to be put on the spindle under the set disc. Depending on what the users invented for themselves, an even number goes left, odd/right. So the order of the body discs is the E first, then of right for the rest of the letter order for the discs. The body discs are like checkers in that they have notches for them to fit into each other. There is a dot on the bottom of the set disc somewhere between two numbers, and a dot on each side of each body disc as well. The last number of the 1234, the 4, is how many (left or right) notches to shift the discs as they are being put on using the dots as beginning points. 4 was invented to mean right for the dots so each disc has their dots spaced 4 notches to the right of the one above it. It is also decided/invented which discs go on up-side down. Once all discs are in place a tightening bolt is screwed on the spindle to secure the discs.
Operation:
In the coded message sent, the first 30 numbers are still part of the set up. The message follows after them. In these 30 numbers you have invented the pattern that if there are two number 6s in the 5th, 13th, 18th, and 29th numbers, the message is authentic. If there are more or less than two number 6s the message is bogus and is disregarded. In the first 30 numbers, you take the 4th and 9th numbers to know which algorithms to use, in this case both numbers are 12,34. You have invented at least 10 algorithms. The first message letter is O. Find an O on the top of the set disc in one of the alphabets (using another alphabet for the next O), and go down to the number below it on the edge, say 57. Now the first four algorithms are made up by the two users of the machines so they can be anything their imaginations can come up with. Like, from 57, down five discs to the top row of 1-80 where the number is 32, find 32 on the bottom row and go down 7 more discs and do the same, then go straight up to the set disc. 2nd algorithm is a diagonal angling down to the right 8 discs to the lower number on that disc-46, then finding the 46 on the top row, and straight up the to the top set disc. 3rd algorithm is another imaginative pattern ending at the top number 78 on the set disc. 4th algorithm now has a sleeve that fits over the machine with holes randomly drilled into its side lining up with each disc's number lines, 15 holes per line. Now look again to the first 30 numbers and see the 18th and the 62nd numbers are 36, and 84. So now the 78 is lined up with the 3rd disc's top number 6 hole, this shows the number 69 in the bottom number row hole 8. This continues for 4 discs to the last number 51 that is sent in to the other communicating person. (36, 84 is third disc, holes 6 and 8, for 4 discs)They run it all backwards to find the letter O.
Throughout the sent message there are many OOs. The pattern invented is that you go six numbers beyond the OO to see if there is a number 5 in that number (75). If there is, you know it is a body disc shift. The other number is how many notches to shift each dot.(Odd numbers one way, even the other). Do this at least once every message. If there is a 2 in that number (27) it means to replace the set disc with another one, in this case the number 7 set disc. You replace the old one and just line up the dots of the new set disc directly over the dot beneath it on the first body disc. Do this at least once every message for both set and body discs.
Another code invented tells you to change the entire order of the set up with a 4 digit set up number following it. Another code tells you to change the number of algorithms to use.
Golden rules: 1) Never use the same set up code more than once. 2) Always send at least 15 phony messages for every one authentic message. 3) Always shift both the set disc and body discs at least once every message. This cipher machine has ever changing/shifting number patterns, an infinite number of invented algorithms that are used in different orders, a large number of algorithms to constantly change, and every set of machines has a different operation. Each operating set of machines have virgin discs no other machines have.
This cipher machine cannot be broken, not even by the largest computers in the world if used correctly.
The confirmation that a code has been broken is that the message appears. With a 500 letter message, if 500 GCMs are used where each machine only encrypts one letter, there is no confirmation the letter that comes up when trying to break it is the actual letter that is in the message. Every letter has a machine with different discs, different algorithms, and different operators encrypting it. So the most any attempt to break the code can do is acknowledge that each letter position could be any of the letters in the entire alphabet (A-Z). To write out the possibilities on paper would be to have an entire alphabet under letter position #1, then another one under #2, an so on. In the end there would be 500 alphabets in a row as the only clue to what the message says. A wall of alphabets. Its like telling the hackers there are 500 letters in the message and the words are in the dictionary. With this small bit of information it is IMPOSSIBLE to even begin to try to find the message. Not even the biggest computer in the world, working on it for 10,000 years could find the message.
This encryption form is called KALIkO ENCRYPTION, it is unbreakable, and is perfectly suited for the Galaxy Cipher Machine.
I just watched the imitation game yesterday, and this question was in my head the entire day, thanks guys!
Agreed! One of the most interesting episodes yet!
Would've been a perfect episode to give a nod towards Numberphile, and the fairly detailed, yet comprehensible bits they did about the Enigma, how it works and how the Poles cracked it, and why the Brits had to crack it again.
The information around 7:35 is wrong. When hackers compromise a site or database, they typically exploit a bug/flaw in the software that runs on the company's servers. Cryptographic attacks are very, very rare and very difficult to detect since they're typically operating on data that you willingly publish (thinking it's safely encrypted).
This was a great episode, please make a follow up
This is a superbly explanatory and interesting video about cryptography. Good job!
I don't think I'd understand the technicalities of modern digital encryption but I heard an analogy that made sense to me.
If you're entering some private information on TH-cam, you put it in a briefcase and close it with a lock to which only you have the key, then you send TH-cam the locked briefcase containing the sensitive information. TH-cam can't open the briefcase, but they add a second lock which only they have the key to, and send you back the now double-locked briefcase. When it gets to your computer, you can verify that TH-cam's lock is authentic, so you open your own lock and send the briefcase back to TH-cam. Then they see that you've opened your lock, and they can open their own. This way, there is no exchange of codes or locks between the two parties, each side only manipulates their own lock.
i dont even do anything remotely connected to this video, i dont do coding, i never learn computer science, i Dont know a single thing about cryptography, yet, i still understand your video even though its a fast pace video, thanks, now im gonna go to sleep because its 4 a.m and somehow i manage to stumble upon this video
Absolutely and utterly fascinating. But, I think my mind blew a fuse!
This was the coolest video! Thanks SciShow
Remembering the rules of this video helped me figure out a code during a mystery game with friends today. Thanks!
Best video in quite while! :)
Great episode! This was my favourite so far!
yessss love this episode !! now all the gravity falls fans who wanted to try cracking the code by yourselves can do it :D
omg Michael Aranda!! It's been ages since I've seen him !
One of the best episodes ever !
I read a book once in which they used two Identical prints of a book and a three number code. 12-18-4 referred to pg 12, line 18, word 4. easy to send msgs with common words and nearly unbreakable without the key, especially because you could use different combinations for the same word. obviously wouldn't work for data transfer, but cool for word based msgs.
what if you translate words through multiple languages? spaces could have different characters in different types of alphabets, including accents and perhaps words that could have multiple meanings such as tones (like in Chinese) . you could use the standard roman alphabet, romanize letters from languages that have character systems, and different meanings according to the different language and connotative meanings determined by translating other parts of the passage. would that be hard to decode??
At first, yes, but then you realize that for the message to be intelligible to whoever you want to actually read it they would have to know which languages were used, so you can't pick them at random, and if you do, there must be some way for the person receiving the message to know which one is which. Then it becomes a simple matter of finding the patterns and figuring out which language used is which and then translating it all to a single language and reading it. The amount of work would be similar not only for anyone trying to crack the code, but also to the people receiving the message, which would make such an overly ellaborate encryption system really difficult to use effectively.
It needs to be taken into consideration that a cypher, by definition, is meant to be read by someone. The trick is making sure only the people that you want to read it to read it. If you just come up with cyphers impossible to decode they'd just be useless. It's like making shelter impossible to get in during a zombie apocalypse, for a ham-fisted comparison. The harder it is for zombies to get in, the harder it is for you to get out, making your shelter more of a death trap than anything else. The best way to go about encryption is to make the cypher itself very simple but knowing its key impossible unless you just have it.
Been working on developing a cipher for about 5 years now. I'm almost ready to really try it out. I should send you guys some coded messages to see if you can crack them.
Fantastic video, really enjoyed it, learned a lot in a short time. Thanks Sci Show.
When a website was hacked, its often not because someone broke the encryption, but hackers who exploited bugs or gained access through social engineering etc. Thats much easier than brute forcing a key.
Learned so much about Alan Turing watching The Imitation Game. Didn't realize how forward thinking he was when it came to modern computers.
This was really interesting! :D One of my favorite SciShow videos yet! :D
If you wonder the modern cryptograthy method is called aes (advanced encryption standard) and it works well, I believe that unbreakable without bruteforce, but you have to send them the key somehow, that is donne using rsa, which is less secure, and technically any rsa encrypted message can be exactly decrypted with no doubt of it beeing the correct if given enougth time to factor a half prime with hundreds of digits.