Vernam Cipher (One-Time Pad)

แชร์
ฝัง
  • เผยแพร่เมื่อ 29 ธ.ค. 2024

ความคิดเห็น • 34

  • @IamAhmedMohammed
    @IamAhmedMohammed 5 ปีที่แล้ว +16

    This is a heavy British accent but it gets the understanding process in the brain meats done 😂❤
    Thank you mate 🌚❤

  • @cysecgnz
    @cysecgnz 3 ปีที่แล้ว +2

    One of the best explanations of this cipher. Some are too difficult to understand or some are way too simplified. I just started my cryptography math course and it's already killing me, so this helps a lot. Thank you.

    • @iosifpuha6114
      @iosifpuha6114 ปีที่แล้ว

      yeah, it's pretty comprehensible, but it doesn't explain WHY using the key more than once would result in non-security

  • @theberkeleyboss
    @theberkeleyboss 3 ปีที่แล้ว

    This is one of the best videos for people just learning OTP

  • @creonte38
    @creonte38 5 ปีที่แล้ว +2

    Pedagogic and perfect explanation! Continue please to explain like this way, cryptography informations is a great gap here in Brazil. Thank you man! You have my respect!

  • @saulfernandez4878
    @saulfernandez4878 2 ปีที่แล้ว +1

    Awesome video! Clear and concise concepts explained in an understandable way.

  • @maomxesoax2471
    @maomxesoax2471 5 ปีที่แล้ว +6

    I've been working on this and this is what I've come up with so far. I capture mouse movements to create random values. From those values I create a random character set (94 characters) and a OTP. I embed the character set and one time pad (which is also the password to a steg file embedded within the picture). The picture is created from unique graphic fonts that the character set and otp are translated into. The picture has five layers and each glyph in each layer of the picture has an RGBT color value. The RGBT values each separately have their own character set and otp (by using cloak values). Messages can be encrypted and embedded into the picture. The steg file is the data set that creates the picture within the program. Only the top layer, layer one is visible and that is the picture sent. The other layers are within the data set that has been embedded into the picture. The picture is sent to a recipient, who has the special fonts. The recipient decodes the picture (only layer one visible) using the fonts to get the character set, otp and thus the password to retrieve the steg data file that when loaded into the program, will reveal all five layers and RGBT values. The cloak values to be used can be obtained from the glyph values in the top layer, according to a set of rules established beforehand between Bob and Alice. So each layer has a character set and an otp for the glyphs in that layer and also a character set and otp for each of the red, green, blue and transparency values for that layer. As a bonus, the layers can be shuffled (so a shuffle value would also be needed to sort the layers into the correct order) :-)

  • @konstantinoskoutras3342
    @konstantinoskoutras3342 4 ปีที่แล้ว

    You are explaining this better than my own teacher :3 thank you nice vid

  • @giorgiorousso
    @giorgiorousso 5 ปีที่แล้ว +1

    Thank you, best video! Simply language, easy steps

  • @CarbonDew
    @CarbonDew 6 ปีที่แล้ว +2

    epic video man, I totally understand now! Thanks!

  • @MyAndipandi
    @MyAndipandi 6 ปีที่แล้ว +1

    The best video out there about vernam cipher! Very informative and easy to understand. Great job!

  • @maomxesoax2471
    @maomxesoax2471 6 ปีที่แล้ว +2

    To make the Vernam cipher even more difficult to crack, besides the otp the character set that is used is also randomly created. The recipient would need to have this char set as well as the otp. Use mouse movements to capture a string of random numbers. If I can just come up with a way of sending a password without using DHKE or RSA, working on it. Then use steganography to send char sets and one time pads in an image.

    • @Anna-1917
      @Anna-1917 4 ปีที่แล้ว

      If RSA security is an issue, why not just use more bits?

  • @SrRunsis
    @SrRunsis 5 ปีที่แล้ว +1

    Excellent explanation!

  • @sehreshtariq3266
    @sehreshtariq3266 3 ปีที่แล้ว

    Awesome explanation !

  • @ktmusicstudio
    @ktmusicstudio 2 ปีที่แล้ว

    do u guys know any software to do OTP encryption?

  • @dr.anitapradhan5489
    @dr.anitapradhan5489 4 ปีที่แล้ว

    Thanks for the reliable content...

  • @maomxesoax2471
    @maomxesoax2471 4 ปีที่แล้ว

    For each character in message... to encrypt... ((Msg + Otp) - 1)... To decrypt ((Encrypted - Otp) + 1)... if result > than character set length...reverse the op with the 1 instead, then subtract the character set length. If Msg and Otp are the same value then add together and minus 1. Try it using any piece of copied text to use as the one time pad. Eg. A character set A to Z plus 0 to 9 (with A=1 and 9=36) total character set length is 36. With practice you can encrypt and decrypt in your head :-)

  • @siddhu6661
    @siddhu6661 4 ปีที่แล้ว

    Thank you dude you really helped me

  • @bender2752
    @bender2752 5 ปีที่แล้ว +2

    3:53 cup of key

  • @sihanibrahim5029
    @sihanibrahim5029 6 ปีที่แล้ว

    Hey, just wanted to know is the As level playlist complete? If so can you solve some past paper questions please and thank you so much for all the great work🙏🏼

    • @MrBrownCS
      @MrBrownCS  6 ปีที่แล้ว +4

      No problem, thanks! I'm afraid not, I'm working hard to complete it at the moment but there are some gaps remaining. I'll be sure to do more walkthroughs, probably closer to the exams

  • @DarkGT
    @DarkGT 5 ปีที่แล้ว

    Hi there! Could you do me a favor? Your videos are great but is far to find what I was looking for when I used the search box in your channel. If perhabs you create playlist about cryptography or add the proper tags for the videos about Cryptography it could pop up when I search the common work "crypto" for example. Thanks keep the good work.

  • @truonghoanghuu6142
    @truonghoanghuu6142 3 ปีที่แล้ว

    Thank you very much ^^

  • @KaptainLuis
    @KaptainLuis 4 ปีที่แล้ว

    thank you very much!!!!!

  • @shohidurrahman6549
    @shohidurrahman6549 6 ปีที่แล้ว

    Good work

  • @maomxesoax2471
    @maomxesoax2471 4 ปีที่แล้ว

    ENCRYPT: ((messagecharactervalue + otpcharactervalue) - 1 ) mod charactersetlength DECRYPT: ((encryptcharactervalue - onetimepadcharactervalue) -+1 ) mod charactersetlength

  • @ronny4927
    @ronny4927 4 ปีที่แล้ว

    thankyou

  • @nogymnoproblem9888
    @nogymnoproblem9888 4 ปีที่แล้ว +1

    Typically Used by Inspector Gadget (Αστυνόμος Σαΐνης)

  • @HenryCasillas
    @HenryCasillas 2 ปีที่แล้ว

    ☮️