Cryptography, Perfect Secrecy and One Time Pads | Two Minute Papers #25

แชร์
ฝัง
  • เผยแพร่เมื่อ 26 ม.ค. 2025

ความคิดเห็น • 15

  • @maomxesoax2471
    @maomxesoax2471 4 ปีที่แล้ว

    One Time Pad made easy...
    ENCRYPT: (messagecharactervalue + onetimepadcaharactervalue) - 1
    DECRYPT: (encryptedcharactervalue - onetimepadcharactervalue) + 1
    If result of a calculation is more than the character set length or less than zero then mod the result by the character set length.
    Extra:
    You could also use a scrambled character set and use text from a book as the one time pad, also double the encryption, ie. encrypt with chapter three and then encrypt again with chapter five. Of course both parties would need the same character set and book to use.

  • @davidsosna3370
    @davidsosna3370 8 ปีที่แล้ว +4

    Respectfully, I don't believe OTP is impractical today. I believe that key exchange can be achieved with a combination of steganography and key reordering. For example, if our perfectly random number set is 3, 11, -17, I reorder it to -17, 3, 11, and hide those numbers in a large spreadsheet, audio file, or jpeg, I can send it to Bob and Eve, even if she intercepts, will have no understanding of what 'it' is, if she could find which part of the hidden key exchange was actually a message. Imagine many files per day many days only one file is the key. Computers make this eminently feasible. Thus, so is stream ciphers or otp

    • @maomxesoax2471
      @maomxesoax2471 5 ปีที่แล้ว

      I agree.
      I've created a program to create otp's using random mouse moves. I've also created sets of graphical abstract fonts. The program creates a random character set and an otp from the rnd mouse moves. The font sets are used to encrypt the character set, otp and password into layer one of a picture. The picture has 5 layers. Only layer one is visible and is sent to the recipient. The data set that makes up the five layers of the picture is embedded into the picture using steganography. Each layer has glyph, transparency, Red, Green and Blue values each of them having their own unique character set and otp by using a cloak value that creates them from the original character set, that is in layer one. Layer one otp is the password for the steg picture. To decrypt the layer one picture the recipient has to recreate the picture (if they have the special fonts) within the program to get the random character set, otp and the password that will retrieve the five layer data set. The data set once recovered will reveal all five layers of the picture. The recipient will then need to know, how to create or obtain the cloak values for each of the glyph, trans, red, green and blue for each layer. It works. I've nobody to work with so I'll keep it on backburner for now....

  • @Gunth0r
    @Gunth0r 7 ปีที่แล้ว

    Very informative and entertaining

  • @andreasreich8962
    @andreasreich8962 9 ปีที่แล้ว +1

    Great video!
    You should consider a follow-up on asymmetric encryption :-)

    • @TwoMinutePapers
      @TwoMinutePapers  9 ปีที่แล้ว +1

      +Andreas Reich Hey there Andreas. I was thinking about a followup too. Let's see! :)

  • @romankuskowski722
    @romankuskowski722 9 ปีที่แล้ว +3

    I rly dont get it why you dont have more clicks. I realy enjoy the 2mps. If i only could help somehow....

    • @TwoMinutePapers
      @TwoMinutePapers  9 ปีที่แล้ว +2

      +Roman Kuskowski Hey there Roman. Happy to hear that you liked the series! :) Nothin happens overnight, but we're growing pretty fast for a channel of this size. Of course, sharing always helps! :)

  • @TheMasterThingMaker
    @TheMasterThingMaker 9 ปีที่แล้ว +1

    Awesome :)

    • @TwoMinutePapers
      @TwoMinutePapers  9 ปีที่แล้ว +1

      +TheMasterThingMaker Happy to hear that you liked it! :)

  • @sol3cito33
    @sol3cito33 6 ปีที่แล้ว

    Bácsi lenni magyar? Én szeretni ezt a tartalom! Köszönni szépen! :-)

  • @CsikiAttila
    @CsikiAttila 7 ปีที่แล้ว

    The most secure is ROT13
    i.imgur.com/qv02dUe.gif