9:00 I really struggled to get my head around this part, so I started playing with it and figured it out. What's happening here is if you use the same key on 2 different plaintext streams to produce cyphertext and then XOR those 2 cyphertext streams together, they will produce the exact same result as if you had XORed the original plaintext streams. So if you can guess the plain text in one stream and then XOR with the common stream it will yield intelligible plaintext in the other. You can use both encrypted streams to decode each other. Once you have a full plain text, you can XOR it with its cyphertext and it yields the key. HTHs, I melted my brain on it.
nice to see another vid about the lorenz machine, fascinating stuff. They worked out how the the machine worked even without seeing one. It's insane, how clever these guys were
Hooray! Professor Brailsford continues on from Enigma & Colossus. Personally, as a computer scientist, I am scarfing up everything he puts on TH-cam. Thank you!
Radio teletype AKA RTTY has been a popular mode for radio amateurs since the 1950's. A few experienced RTTY operators can actually convert the warbling tone to words by ear. It's similar to decoding fast Morse code where entire words are recognised by their unique sound.
They were called Y stations because Y is the quick way of saying WI stations - Wireless Intercept stations. Also a lot of traffic was broadcast by radio because the French Resistance were busy blowing up telegraph poles and cutting telephone lines. They did this specifically to force communications to be sent by radio, which can easily be intercepted.
The Japanese codes were book based rather than machine based, and had code books (changed every so often) and a big book of 'random' numbers (also changed every so often) which were used as an additive cypher on top of the codes. The issue of depth with additive cyphers was much more prominent in the Pacific cryptanalysis. The additive cypher book was short enough compared to total traffic to build up considerable depth, but whereas for Tunny the layer under the cypher was plaintext, in the Pacific it was code words, so depth alone did not solve the problem.
I'm super late to the party on this one (re-watching this video for the zillionth time), but apparently the "Y-Service" (from which the stations got their name) were monitoring wireless traffic, so "y" was short for "wireless." (Much as we shorten it to "wi-fi" today.)
According to Jack Copeland's book "Colossus" Bletchley was known as "Station X" because it was the 10th of several stations set up by MI6, all of which were assigned Roman numbers.
Prof Brailsford's excellent explanations of codes and ciphers continue. Now we start to delve into how the Lorentz system worked, and how codebreakers in Bletchley Park broke it.
Once when I was playing Minecraft and creating redstone creations I was getting bored with the normal stuff and I got the idea of using logic gates to encrypt characters. After theorizing, creating and testing the redstone machine I used it for quite a while and then I watched this video and found out that I, without realizing ended up creating a Vernam cipher
Tommy Flowers, the creator of Colossus first electronic computers died in 1998. Yes in 1998 long after the end of the Soviet era and during the expansion of internet in every home. It was a serious mistake that he wasn't Knighted. W. T. Tutte (Bill Tutte) died, another important person of the Colossus mentioned at 6:55 died even later in 2002 and wasn't knighted either.
Y Stations = two electrical inputs that create a single electrical current that is then divided again at the end source to create the desired letter or number based on what else? Wheels with two sets of dials for each set similar to the Enigma machine had. Y + X = YX or WhyEx or Wix. Two Y's pushed together create an X with the tail forming in the middle to create a W path accept the tail of the Y creates two Right Triangles. So Y and X have the same meaning mirrored 90 degrees to the other.
So Y stations were British signals intelligence names for Radio sites. X for Bletchley was according to google sources for it being the tenth Y site built.
With modern technology, you could make a Vernon cipher (actually a code) which doesn't repeat for billions of bytes. Of course, you would have to find a secure way to transmit the code disk to the recipient. The thing is about codes, is that they are unbreakable if you don't use the same code string. (I'm sure that this technique is standard today. I do know that very little encrypted traffic is broken nowadays.)
Why were the radio signal collection stations called the Y service? Here is the answer. It is the British sense of humor. They were collecting "WIreless". The "Wi" became "Y".
I love learning about the history and stuff but I'd prefer to hear a bit more about how this stuff worked and what those vulnerabilities were and how they were cracked.
BP was called station X as it was the tenth such place, the others were Station I, Station II, ..., Station IX (the station number being in Roman numerals).
Funny thing-I just finished a can of tuna. Coincidence? I think not. I imagine Professor Brailsford spent years or decades teaching so it does not surprise me that he is so good at this. Presumably he is retired, so you can continue to mine that massive brain for years to come.
Y Stations... (listening stations), sure this is a long shot but it is rather nice that the electrical symbol for an antenna is very similar to a Y. Just a coincidence I guess.
:^) Snowman Face With A Caret For A Nose :^) Turns out the word professor isn't used much in technical writing. Though my lecturer in my tech writing is incredibly picky on word choice.
@@ohgosh5892 As he says, they found decrypting the pair they got really easy, and they were particularly looking for the Germans to make that mistake because they knew it would be easy to decrypt.
spiroslouis1 I think I heard somewhere that the 'Y' in Y stations was a corruption of 'W'ireless stations. Bletchley Park was called Station 'X' as it was the 10th station so named.
Please can somebody clarify for me. My understanding is 1)you add the chi (constantly changing) to the plain test, but the Germans were concerned that this result could give to many consecutive dots and plus's so- 2) they added a second stage set of wheels (psi) that only change depending on the result of exclusive or(ing) PT to chi.
+Bograff That would have needed a supply of the double-width tape, and the hardware to handle it. It probably wouldn't have been very economic to create that infrastructure just for encryption, though I suppose cash-register tapes might have been used. (The 5-track stuff would have been produced in enormous quantities for routine applications.) Technical developments are often shaped by what's cheaply or conveniently available. E.g. early punched cards were the same size and shape as $ bills, because there were already dollar-bill handling machines.
The Lorentz definurely, but Enigma was usually cracked due to Enigma's design and use of cribs, usually derived from military protocol. The problem with Enigma was that no letter could encrypt to itself (caused by the physical mechanism itself). The wheels and their wiring was well known. To crack Enigma the boffins took then encrypted stream and tried a crib; from this a "menu" was generated which was fed into a "bombe" which was loaded with all permutations of the known wheels and then run to find what setting would create the crypt from the plaintext - effectively running 30 enigma machines (each one set up in every possible permutation) in parallel. With Enigma the laziness dramatically reduced the time to decrypt as the key was effectively given. The navy enigma used 4 wheels instead of 3 from a larger pool of wheels. Also grabbed was the setting sheets so it reduced the amount required to find the key.
Do we really need all this war junk? I feel like I get enough of that everywhere else... Surely there are some computer related subjects that dont have to involve millions and millions of deaths and global domination and all that boring crap... -I mean, we've already had plenty of enigma stuff... Cant we leave those things to the war-guys? There are already thousands of channels for that....
Frabbledabble Computerphile has dozens of videos that have nothing to do with war. Not to mention, death camps? There's not one mention of death camps...
+Frabbledabble No. And the war-stuff will get even better because humans do not change, so there will be another war where after it technology will change.
Frabbledabble You're free to not care. But wars *do* happen, and ignoring them does not change that fact. Learning from them helps to prevent them however.
I could listen to Brailsford talk about computers for hours.
Agreed. He's great!
I would have given my left nut to take a course by professor B.
i have listened to him talk for hours over the last few evenings. he is a fantastic story teller and really draws you in to the topic
Ditto, much to the annoyance of the missus!
The David Attenborough of computer documentaries...
What a great story teller! Thank you. When I watch his videos, I feel as though he knows my level of understanding and he's only talking to me.
Professor Brailsford deserve his own channel.
false.
9:00 I really struggled to get my head around this part, so I started playing with it and figured it out. What's happening here is if you use the same key on 2 different plaintext streams to produce cyphertext and then XOR those 2 cyphertext streams together, they will produce the exact same result as if you had XORed the original plaintext streams. So if you can guess the plain text in one stream and then XOR with the common stream it will yield intelligible plaintext in the other. You can use both encrypted streams to decode each other. Once you have a full plain text, you can XOR it with its cyphertext and it yields the key. HTHs, I melted my brain on it.
Professor Brailsford´s body language is so amazing. He comunicates not only with words but also with his mannerism.
and in encrypted morse code from his eye blinks
nice to see another vid about the lorenz machine, fascinating stuff. They worked out how the the machine worked even without seeing one. It's insane, how clever these guys were
false.
Hooray! Professor Brailsford continues on from Enigma & Colossus. Personally, as a computer scientist, I am scarfing up everything he puts on TH-cam. Thank you!
May you add the videos you find for him on a playlist and share it with all of us.
Radio teletype AKA RTTY has been a popular mode for radio amateurs since the 1950's. A few experienced RTTY operators can actually convert the warbling tone to words by ear. It's similar to decoding fast Morse code where entire words are recognised by their unique sound.
They were called Y stations because Y is the quick way of saying WI stations - Wireless Intercept stations. Also a lot of traffic was broadcast by radio because the French Resistance were busy blowing up telegraph poles and cutting telephone lines. They did this specifically to force communications to be sent by radio, which can easily be intercepted.
The Japanese codes were book based rather than machine based, and had code books (changed every so often) and a big book of 'random' numbers (also changed every so often) which were used as an additive cypher on top of the codes. The issue of depth with additive cyphers was much more prominent in the Pacific cryptanalysis. The additive cypher book was short enough compared to total traffic to build up considerable depth, but whereas for Tunny the layer under the cypher was plaintext, in the Pacific it was code words, so depth alone did not solve the problem.
I'm super late to the party on this one (re-watching this video for the zillionth time), but apparently the "Y-Service" (from which the stations got their name) were monitoring wireless traffic, so "y" was short for "wireless." (Much as we shorten it to "wi-fi" today.)
According to Jack Copeland's book "Colossus" Bletchley was known as "Station X" because it was the 10th of several stations set up by MI6, all of which were assigned Roman numbers.
Prof Brailsford's excellent explanations of codes and ciphers continue. Now we start to delve into how the Lorentz system worked, and how codebreakers in Bletchley Park broke it.
decrypt your enemies data with this one weird trick cryptologist hate this guy
ashley beaumont your text felt good when I read it. thank you for that.
Nowadays, unbreakable encryption is common knowledge
Watching this in rapt attention - his storytelling is amazing, and the history of the incredible minds behind these codes is fascinating!
Once when I was playing Minecraft and creating redstone creations I was getting bored with the normal stuff and I got the idea of using logic gates to encrypt characters. After theorizing, creating and testing the redstone machine I used it for quite a while and then I watched this video and found out that I, without realizing ended up creating a Vernam cipher
Fantastic stuff, I am loving your coverage of WW2 cryptography.
The Colossus team surely did miss out on the admiration they deserve.
We need this brilliant Professor here in Kenya at the university of Nairobi school of computer science
I thought it was going to go more like
Dr. Brailsford: "They were called Y-stations."
Sean: "Why?"
Dr. B: "Yes, that's right."
;-)
+Noel Goetowski LOL, shades of "Who's on First".
Wi?
Tommy Flowers, the creator of Colossus first electronic computers died in 1998. Yes in 1998 long after the end of the Soviet era and during the expansion of internet in every home. It was a serious mistake that he wasn't Knighted. W. T. Tutte (Bill Tutte) died, another important person of the Colossus mentioned at 6:55 died even later in 2002 and wasn't knighted either.
Love it, slippage like you have never dreamed of in your worst nightmares
Just found this channel, and boy am I happy I did. :)
Up there with James Grime and Ed Copeland in my opinion. Great guy.
Ace storytelling. Can't wait for the next tale.
Y Stations = two electrical inputs that create a single electrical current that is then divided again at the end source to create the desired letter or number based on what else? Wheels with two sets of dials for each set similar to the Enigma machine had.
Y + X = YX or WhyEx or Wix. Two Y's pushed together create an X with the tail forming in the middle to create a W path accept the tail of the Y creates two Right Triangles. So Y and X have the same meaning mirrored 90 degrees to the other.
I think its just short for WIreless
This series is so cool! Thanks for keeping these coming!
They were called Y-Stations because it was a sort of pun on the initials of Wireless Interceptors (WI with the I pronounced as eye).
So Y stations were British signals intelligence names for Radio sites. X for Bletchley was according to google sources for it being the tenth Y site built.
I fell down a Computerphile hole two weeks ago and I'm still not out of it
I think it's been a month for me.
With modern technology, you could make a Vernon cipher (actually a code) which doesn't repeat for billions of bytes. Of course, you would have to find a secure way to transmit the code disk to the recipient.
The thing is about codes, is that they are unbreakable if you don't use the same code string. (I'm sure that this technique is standard today. I do know that very little encrypted traffic is broken nowadays.)
Why were the radio signal collection stations called the Y service? Here is the answer. It is the British sense of humor. They were collecting "WIreless". The "Wi" became "Y".
Actually, it was Wireless Interception (WI) towers. But overall yeah true. Funny innit?
I love learning about the history and stuff but I'd prefer to hear a bit more about how this stuff worked and what those vulnerabilities were and how they were cracked.
That's all coming!
+Sean Riley Was the follow up to this posted?
+compu85 It's the Zig Zag Decryption video.
BP was called station X as it was the tenth such place, the others were Station I, Station II, ..., Station IX (the station number being in Roman numerals).
I wonder if people used multiple factor cryptography, like for example, scrambling a message with enigma and then sending that via tunny code
the david attenborough of code
false.
Wish I had a grandpa like this. Pretty much the big picture to what I am aspiring to be for the last 12 years. :D
This reminds me of Number Stations. These Tunny Transmissions were the first number stations!
The enigma stations were the first number stations, lorenz was second.
Funny thing-I just finished a can of tuna. Coincidence? I think not.
I imagine Professor Brailsford spent years or decades teaching so it does not surprise me that he is so good at this. Presumably he is retired, so you can continue to mine that massive brain for years to come.
Just a little trivia: If you look at the filename of the APK for Android's Dolphin Browser, it looks like at one time it was called "Tunny."
Y Stations... (listening stations), sure this is a long shot but it is rather nice that the electrical symbol for an antenna is very similar to a Y. Just a coincidence I guess.
My proffesors are fine but I much rather listen to Brailsford
linkviii I bet they'd be impressed that you can't even spell "Professors".
Tactical Hotdog
Who in cs cares about spelling?
+linkviii Everyone. English is the most commonly known high-level programming language.
:^) Snowman Face With A Caret For A Nose :^)
Turns out the word professor isn't used much in technical writing. Though my lecturer in my tech writing is incredibly picky on word choice.
Its in fact so high level - that youre acctualy not reqwired to wright it cerroctly
iN odrer for u 2 understen
Love these videos, very fascinating :)
I seem to remember that the sorts of antennas that the "Y Stations" used looked like a letter Y.
so wait, wheres the second video?????? where?
BP had a Y station. Station number 10. X in roman numerals. Hence station X.
I need more tunny. I don't eat enough of it.
One of my problem sets in school had us decrypt a pair of documents XORed with the same random sequence. It was rather disturbingly easy.
Maybe you should tell the Bletchley crowd how easy it is.
@@ohgosh5892 As he says, they found decrypting the pair they got really easy, and they were particularly looking for the Germans to make that mistake because they knew it would be easy to decrypt.
The professor has affected and influenced I guess by the current situation in Greece and uses it for example :-D
Maybe they called them "Y" stations because of the antenna symbol which is like a "Y".
spiroslouis1 or y = x + suff
spiroslouis1 Would be too easy to guess. I'm presuming it's named from the reverse alphabet (first would be Z, second Y, third X and so on)
spiroslouis1 I think I heard somewhere that the 'Y' in Y stations was a corruption of 'W'ireless stations. Bletchley Park was called Station 'X' as it was the 10th station so named.
Please can somebody clarify for me. My understanding is
1)you add the chi (constantly changing) to the plain test, but the Germans were concerned that this result could give to many consecutive dots and plus's so-
2) they added a second stage set of wheels (psi) that only change depending on the result of exclusive or(ing) PT to chi.
The Americans actually had a one time tape machine. SIGTOT. So the tape problem was not insurmountable.
Great stuff, just as good or better than the bbc radio 4 sitcom. :)
Station Y = WI = wireless interception.
Is there a reason they couldn't reprint the 2 tapes at 5:20 onto a single 10 hole tape so they don't lose synchronization?
+Bograff That would have needed a supply of the double-width tape, and the hardware to handle it. It probably wouldn't have been very economic to create that infrastructure just for encryption, though I suppose cash-register tapes might have been used. (The 5-track stuff would have been produced in enormous quantities for routine applications.) Technical developments are often shaped by what's cheaply or conveniently available. E.g. early punched cards were the same size and shape as $ bills, because there were already dollar-bill handling machines.
Brilliant again, I love these histories. More please. :D
Terrific
fantastic!
At 9:07 you said the additives have a weakness. If your key is several thousand bytes, that should eliminate that.
jack002tuber Have fun doing that in 1940's tech
Its easy in 2016 tech, I live in 2016
Google ONE TIME PAD, they did it in 1940
And people thinks the Eletronic Warfare,is something new.
This guy is so sweet. I love him!
Very impressive. It's James bond thing
why not multiple shorter encryption keys that are all coprime length
+ProfDaveB Wait, are you the man who narrated for "Look Around You" (first season/"series")?
This guy rocks
First lesson that you learn as a naval "sparker" NEVER SHRED THAT PLASTIC TAPE!! LOL...
Lorenz cipher attachment for a teleprinter...
Nice.
Two words:
Linear Feedback Shift Register
but that's four
@@demonetizeddemonetisedinmy1890 Two words: 'Feedback'
People that don't know how important Cryptocurrencies are should watch this.
Y stations got their name derived from Wireless Interception (WI)
why?
That's quite funny then, that both Enigma and Lorenz were ultimately broken because of lazy Nazi operators...
+Robert Faber Always remember to explain to your staff why rules exist, otherwise they won't know why they should follow them.
The Lorentz definurely, but Enigma was usually cracked due to Enigma's design and use of cribs, usually derived from military protocol. The problem with Enigma was that no letter could encrypt to itself (caused by the physical mechanism itself).
The wheels and their wiring was well known. To crack Enigma the boffins took then encrypted stream and tried a crib; from this a "menu" was generated which was fed into a "bombe" which was loaded with all permutations of the known wheels and then run to find what setting would create the crypt from the plaintext - effectively running 30 enigma machines (each one set up in every possible permutation) in parallel.
With Enigma the laziness dramatically reduced the time to decrypt as the key was effectively given.
The navy enigma used 4 wheels instead of 3 from a larger pool of wheels. Also grabbed was the setting sheets so it reduced the amount required to find the key.
At 0:09 literally, the enigma lol! not figuratively like a puzzle.
At 1:40 lol I can't do that noise
lol , sound like : x is receiving and sending and y is only sending station ,
You don't know Y?
Next part is Zig Zag Decryption
Damn it
Oh yes they are. Circa ww2
I bet almost zero people these days know anything about codes and ciphers.
cool story bro...bs
First
First reply to first comment!
V.v.V
Do we really need all this war junk? I feel like I get enough of that everywhere else...
Surely there are some computer related subjects that dont have to involve millions and millions of deaths and global domination and all that boring crap...
-I mean, we've already had plenty of enigma stuff... Cant we leave those things to the war-guys? There are already thousands of channels for that....
+Frabbledabble "war junk"? This is computer science through and through, put in historical context...
Frabbledabble
Computerphile has dozens of videos that have nothing to do with war. Not to mention, death camps? There's not one mention of death camps...
+Frabbledabble No. And the war-stuff will get even better because humans do not change, so there will be another war where after it technology will change.
Ok. Fair enough. So why did you watch a video about "hitlers enigma" ?
Frabbledabble
You're free to not care. But wars *do* happen, and ignoring them does not change that fact. Learning from them helps to prevent them however.
Compute .., 😂
F b shy ha ha