Introduction to Basic Cryptography: Simple Cryptography

แชร์
ฝัง
  • เผยแพร่เมื่อ 1 มิ.ย. 2024

ความคิดเห็น • 27

  • @doc.steveo4552
    @doc.steveo4552 5 ปีที่แล้ว +3

    Man made it - man can break it... eventually everything gets broken 👹👹👹
    Very good explanation, good work doc.

  • @diniibrahim4004
    @diniibrahim4004 5 ปีที่แล้ว +2

    very informative, well presented thank you so much

  • @leahdereka
    @leahdereka 4 ปีที่แล้ว

    Teaching is definitely your gift. Thank you!!

  • @Romanx24
    @Romanx24 5 ปีที่แล้ว

    Thank you for your explanation it is brief and understand

  • @zhiwarsami5737
    @zhiwarsami5737 5 ปีที่แล้ว

    Thanks so much so useful explanation

  • @nithingundeti
    @nithingundeti 6 ปีที่แล้ว

    Nice content with neat xplanation

  • @sophiainjoy8942
    @sophiainjoy8942 5 ปีที่แล้ว

    thank u for this education in cryptography, Mr Riley.

  • @BambiOnIce19
    @BambiOnIce19 ปีที่แล้ว

    By that logic, you would want to create a cipher where the pattern is not detectable?

  • @bittu8840
    @bittu8840 4 ปีที่แล้ว

    Thanks a lot. :-) Its help me a lot

  • @BambiOnIce19
    @BambiOnIce19 ปีที่แล้ว

    so you are looking for patterns to break the cipher?

  • @BambiOnIce19
    @BambiOnIce19 ปีที่แล้ว

    So is the entropy source then the source that produces like a random sequence of something?

  • @BambiOnIce19
    @BambiOnIce19 ปีที่แล้ว

    so the key to figure out the secret is to obtain the actual key/s, right? So at which point do you exchange your keys? Before, or during, communication with other parties?

  • @nyunno
    @nyunno 6 ปีที่แล้ว +1

    Great explanation
    Could it be possible and effective to use the CT from a vigenere cipher and ruin it through another cipher ? And is there a cipher with a reusable decrypting method that is very strong and almost unbreakable ? like for example the one time pad but you can use the key multiple times

  • @niteshmalani3742
    @niteshmalani3742 5 ปีที่แล้ว

    I have Ex4 file encrypted so how can editing on it ? How can compile ? I use mt4 platform

  • @BambiOnIce19
    @BambiOnIce19 ปีที่แล้ว

    So the keys need to be random, as in, there is absolutely no pattern (no repetition), and therefore it is unbreakable? :)

  • @BambiOnIce19
    @BambiOnIce19 ปีที่แล้ว

    It seems to me it is all about the patterns...:)

  • @saranshsaxena207
    @saranshsaxena207 6 ปีที่แล้ว

    Thankx man, helped me with my exam.

    • @ryanriley5591
      @ryanriley5591  6 ปีที่แล้ว

      Good to hear it was helpful. I hope the exam went well.

  • @ferdinandgilbert5692
    @ferdinandgilbert5692 6 ปีที่แล้ว

    gg

  • @MrRajeshkpy
    @MrRajeshkpy 4 ปีที่แล้ว

    Hi Ryan, I am planning to cryptoanalyse substitution cipher using computer, but how do the computer know that it has decrypted the plaintext? as its manually not possible to check 26! factorial decryptions of the plain text. Any idea?

    • @ryanriley5591
      @ryanriley5591  4 ปีที่แล้ว +2

      Hi Rajesh,
      Assuming you are decrypting actual written words, you'll probably want to check your "potential" decryption against some sort of dictionary or spell checker and use that to decide when you think you are done.

    • @MrRajeshkpy
      @MrRajeshkpy 4 ปีที่แล้ว

      @@ryanriley5591 Just discovered an interest in cryptography, really liked your videos! keep it up.

  • @samueloyinlola8914
    @samueloyinlola8914 ปีที่แล้ว

    can anyone help with computer security assignment

  • @ferdinandgilbert5692
    @ferdinandgilbert5692 6 ปีที่แล้ว

    thhis guy is a g

  • @kenichimori8533
    @kenichimori8533 4 ปีที่แล้ว

    Open simplical crypto cipher.0

  • @BambiOnIce19
    @BambiOnIce19 ปีที่แล้ว

    These brute force attacks... they don't sound very elegant, really. Surely there can be other ways to attempt to break the patterns...