Тёмный
Cryptography for Everybody
Cryptography for Everybody
Cryptography for Everybody
Подписаться
Hello and welcome to my cryptology channel!
I am Nils, a cryptology maniac and specialist.

Currently, I lead the development of the open-source software CrypTool 2. In my professional life, I work as a professor at the Hochschule Niederrhein (University of Applied Sciences) and the Cyber Campus NRW in the realm of IT security. Previously, I worked as a post-doc at the University of Siegen in the DECRYPT project, where we collected, analyzed, and decrypted historical ciphertexts from around the world.

On this RU-vid channel, you learn about cryptology = cryptography (making codes/ciphers) and cryptanalysis (breaking codes/ciphers). From the Zodiac Killer's ciphers to the famous Enigma. From modern AES to RSA. If you are interested in secret codes, subscribe to this channel!

Discord: discord.gg/xGGAehgJ
Blog: www.kopaldev.de/
My Ethereum address for tip: 0x0777390782b6421172403a56b7997C1facAfCF42

Imprint: www.kopaldev.de/imprint

How a 1674 Encrypted Letter Traveled 10,000 km
18:48
7 месяцев назад
The German SZ42 Cipher Machine Explained
32:13
10 месяцев назад
The Grandpré Cipher Explained
14:35
11 месяцев назад
The Four-Square Cipher Explained
15:03
Год назад
The Trifid Cipher Explained
14:26
Год назад
The Bifid Cipher Explained
13:34
Год назад
The Syllabary Cipher Explained
21:41
Год назад
Комментарии
@Hihoweryew
@Hihoweryew 17 часов назад
Ms. Palmer confessed on her deathbed that she killed him. Maybe she was jilted lover.
@CryptographyForEverybody
@CryptographyForEverybody 6 минут назад
Do you have a source / reference to prove that claim?
@AlanCanon2222
@AlanCanon2222 2 дня назад
Does anyone know the line discipline used by Lorenz? Particularly baud rate, and start and stop bits?
@erik_carter_art
@erik_carter_art 7 дней назад
I would love to own a copy of Polygraphiae someday! May I ask, how expensive was your copy? I imagine it was quite a lot.
@CryptographyForEverybody
@CryptographyForEverybody 7 дней назад
Hello, You can find the prizes listed on auction house websites. I managed to get my copy at a great price, but I'd prefer to keep the details private :-) Kind regards, Nils
@erik_carter_art
@erik_carter_art 7 дней назад
@@CryptographyForEverybody Thank you for your very quick response! I'll check out some auction houses. :)
@user-qm6ss2jd1j
@user-qm6ss2jd1j 13 дней назад
Sir can I get these slides in form of sheets ..!?
@CryptographyForEverybody
@CryptographyForEverybody 13 дней назад
Hiho, what do you mean? The strips? 🙂
@user-qm6ss2jd1j
@user-qm6ss2jd1j 13 дней назад
@@CryptographyForEverybody no sir ..I need slides(PPT) that you are presenting
@user-qm6ss2jd1j
@user-qm6ss2jd1j 13 дней назад
I need PPT slides .. because I have to present this in my project ​@@CryptographyForEverybody
@CryptographyForEverybody
@CryptographyForEverybody 13 дней назад
Hi there, I'm sorry, but slides from my videos are not available. Additionally, it's better to create your own slides when presenting a topic. This way, you can ensure that you fully understand and are familiar with the material you are presenting. Greetings, Nils
@raygao2000
@raygao2000 15 дней назад
Very nice. Thank you very much!!! 😊
@giuseppecristiano9006
@giuseppecristiano9006 15 дней назад
Thank u a lot , it was very intrestring , i hope u ll make a video about the propieties of the s-box ! I ve written a program in c# implementing aes to encrypt a DB using the microsoft aes library . I wanted to learn deeper how aes works becouse i need to know in deteils how it executes step by step in order to understand how can i split the tasks in order to encrypt faster . Do u think that separate the backup file in more chunks written in temporary files and merge at the end them togheter in the right sequence wouldn t work?
@primedivine
@primedivine 16 дней назад
Now we are talking! I've been combining the concepts of cryptography and AI ever since I started the project, 2012 era. It is great to see this finally observed and respected in the field. Great video content as always!
@timofeysobolev7498
@timofeysobolev7498 16 дней назад
Nice!) I wrote you and your team. please check email!)
@WilliamHarbert69
@WilliamHarbert69 16 дней назад
Fascinating. A favorite device of mine too. Thank you for this presentation and associated resources.
@genezisdj
@genezisdj 16 дней назад
i need help withe a crypto puzle maybe somone can help me aut
@Aldo_Regozzani
@Aldo_Regozzani 16 дней назад
Well done! :)
@crimony3054
@crimony3054 21 день назад
It says, "If you want to decipher messages, go work at the NSA, asshole."
@WaterFist1
@WaterFist1 24 дня назад
I'm studying with this. Thank you!
@CryptographyForEverybody
@CryptographyForEverybody 24 дня назад
You are welcome 🙂
@elisouille
@elisouille 27 дней назад
hi i'm a french person preparing an oral about different cipher machines used during wwII so thanks for your very useful video ! i have one thing i don't understand : why are the index rotors for ?
@CryptographyForEverybody
@CryptographyForEverybody 27 дней назад
Hi thank you, the index rotors are fed with current by the control rotors and output the current to the stepping control. basically they are just changing the input based on their positions and rotations. They never move but since they can be put in any configuration into the machine they are also part of the key. I hope this answers the question 🙂 Greetings, Nils
@elisouille
@elisouille 27 дней назад
@@CryptographyForEverybody thank you I think I understood ! i just have two more questions : for the maths of the key space size, why don't you take into account the 2^35.5 for the positions of the rotors ? also, is there any chance you have worked on the purple cipher machine by the japanese side during WWII ? it's also called the type b cipher machine or the code 97 I think thank you for all your work it's really helping 🙏🫶
@clownkid
@clownkid Месяц назад
I really enjoyed the video, you made really helped break it down to make S-AES simple to understand. I do however feel like it's a bit confusing to find a pre-computed GF(16) table which you mention at 11:22, your blog post links to the Wikipedia article on Finite fields but I got quite a bit lost there.
@CryptographyForEverybody
@CryptographyForEverybody 29 дней назад
Hello @clownkid, thank you. I'm glad you like the video. You can find the complete source code (my implementation) of S-AES here: github.com/CrypToolProject/CrypTool-2/blob/main/CrypPlugins/SAES/SAESAlgorithm.cs This source code also contains the pre-generated tables. I hope this helps. Greetings, Nils
@user-tv6zh7sf5r
@user-tv6zh7sf5r Месяц назад
Nice. But: The key space size (case 2, reordering) of 100! describes clearly a complete random distriburion of table entries. But then an additional column/line reordering (case 3) adds no new configuration, as this is already included in the 100! configurations, it is just another random config. So the key space size for case 3 is also 100! . Do you agree, or am I missing something?
@CryptographyForEverybody
@CryptographyForEverybody Месяц назад
Yes, you are right. There is a distinction between keyspace size and practical keyspace size. With the syllabary cipher (at least as it is constructed with the table by Friedman), some keys are equivalent, which reduces the practical keyspace size, meaning the practical keyspace size is smaller than the keyspace size. In this case, rearranging the digits only changes the keyspace size but not the practical keyspace size, which remains 100!. Moreover, the term "keyspace size" can be misleading here since an attack using, for example, frequency analysis also significantly reduces the practical keyspace size. Therefore, it is more accurate to refer to attack effort, attack difficulty, or attack complexity.
@funwithtommyandmore
@funwithtommyandmore Месяц назад
Can you real quick tell me if this is correct? So first use Visionaire cipher then link every letter to a numbe like a to 0 b to 1 so on then for example Hgajp would be (h - g) (a - j) (p )
@CryptographyForEverybody
@CryptographyForEverybody Месяц назад
Hiho, I don't fully understand the question, but as far as I understand, you want to know how Vigenère works: With the Vigenère cipher, you use a keyword to encrypt your message. The Vigenère cipher is a method of encrypting alphabetic text by using a simple form of polyalphabetic substitution. Here's a brief explanation: Choose a keyword: The keyword is repeated so that it matches the length of the message you want to encrypt. Encrypt the message: Each letter in the plaintext is shifted along some number of places based on the corresponding letter in the keyword. The shift is determined by the letter's position in the alphabet (e.g., A=0, B=1, C=2, etc.). Example: If your plaintext is "HELLO" and your keyword is "KEY", you repeat the keyword to match the length of the plaintext, resulting in "KEYKE". For H (7) and K (10): H shifted by K is R. For E (4) and E (4): E shifted by E is I. For L (11) and Y (24): L shifted by Y is J. For L (11) and K (10): L shifted by K is V. For O (14) and E (4): O shifted by E is S. So, "HELLO" encrypted with the keyword "KEY" becomes "RIJVS". I also made a video about Vigenère: ru-vid.com/video/%D0%B2%D0%B8%D0%B4%D0%B5%D0%BE-95w8UTOB_lc.html Greetings, Nils
@funwithtommyandmore
@funwithtommyandmore Месяц назад
There is a error with the encryption you did. The o in world should've been u and not t
@CryptographyForEverybody
@CryptographyForEverybody Месяц назад
Thank you for the hint. Creating the tables and doing everything by hand is indeed error-prone. :-)
@funwithtommyandmore
@funwithtommyandmore Месяц назад
@@CryptographyForEverybody yea no worries tho I make mistakes alot lol almost every time I try a cipher then see if I was correct it almost always says a different answer then me, but your vids helped me out thanks so much man!
@thalesnemo2841
@thalesnemo2841 Месяц назад
What is the strength of a book cipher ?
@CryptographyForEverybody
@CryptographyForEverybody Месяц назад
Hiho, Very difficult, but hard to put into a number. It depends on your method of encryption, how likely it is to find the correct book, etc. But in general it is very hard to solve even "unsolvable" without a copy of the used book. Greetings, Nils
@AarreLisakki
@AarreLisakki Месяц назад
there's a small typo in the keyspace calculation -- in total keyspace size calculation, when writing down the formula, you accidentally repeat the number 2^150 (from the Chi wheels keyspace) also for the Mu wheels keyspace size, instead of using the value of 2^98 as calculated in the previous step. But, doesn't affect anything as despite the written values being off, the total keyspace size has nevertheless apparently been calculated using 2^98 as intended; 2^150 * 2^253 * 2^98 = 2^501 Thx for making these vids, I very much enjoy learning about various historic ciphers from them!
@AarreLisakki
@AarreLisakki Месяц назад
Thank you for this explanation, but I have a question about the indicator group calculation. If I understand you correctly, one is to add the page concatenated with the line number (as a single 5digit number) with the secret key. But, isn't that key supposed to be reusable? And if I were to add the page/line number with the same key again for the next message, isn't this like reusing a one-time pad? I guess we don't have any kind of crib to presume as its just random page and line numbers, so maybe it can't be a problem here -- is that what's going on to make this procedure here nevertheless fine, or something else?
@CyberSecured-os4bw
@CyberSecured-os4bw Месяц назад
bro it says 'Invalid Invite' on your Discord Server Link
@saipulmalikikhwan4335
@saipulmalikikhwan4335 Месяц назад
hi, can the rsa algorithm use the avalanche effect in cryptool?
@galloe
@galloe Месяц назад
Is there a way to do a frequency test to show the number of times each character appears as opposed to the percentage?
@CryptographyForEverybody
@CryptographyForEverybody Месяц назад
Yes, set the frequency test component to „absolute values“ in its settings 🙂
@galloe
@galloe Месяц назад
@@CryptographyForEverybody Thank you! I had figured it out earlier but forgot to update, lol. But you're awesome for responding so quickly and I appreciate the info!!
@LaboriousCretin
@LaboriousCretin Месяц назад
Extracting layrrs of meaning. WW2 has 2 sublayers under a larger umbrella and for allied side ( light ). Metaxis is ( start of WW2 ) meanings. " A state of being into both ficticious and real world at the same time. Also " in the state of in the middle. Betwixed, ( BETWEEN ). Palimpsest K1 check, WW2 layer check. Greek layer elements. Kryptos, LEX, Alexander, Mytaxis ( My tax is play ). Hydra ( goddess of dragons and the mother of Alexander Tiamat. Hydra radio station and camp X ). Alexander plats to Rosa Luxemburg " U Underground " SS layer and V-Day preparation spot for Churchill. Layer 5. Project overlord. Cipher and text codex a book of wisdom/knowledge. Alex Kenneth Alexander ( A LEX Kenneth Alexander checks ) Ghost stations. Y Stations, station X, U Underground stations, spy stations ( project gold and building a cryptographic tunnel ). Treasure, Tate, Tricycle, cross checks in double agents, XX Double cross WW2 layer. Gold beach D-Day layer. Spy and military layers. L class ships Lexington ( lady lex ) a side track artifacting from key ussage I think, but not sure yet ). SOS ( OSS Underground SS ). OSS part. P.O. rank. One huge part that throws everyone off is the lack of math or computers to do this. Morse and binary and knowledge enough to learn. They give directions, rules, laws, steps, keys, checks and cross checks, keywords, keyed words, formatting, ect..
@Lol-dt1mw
@Lol-dt1mw Месяц назад
Best explanation man! Love from India💌
@bobjones-ey5gl
@bobjones-ey5gl Месяц назад
Karl Dönitz had M4 Triton (four-rotor) implemented
@bobjones-ey5gl
@bobjones-ey5gl Месяц назад
Could Typex encrypt the same letter as itself ? like sometimes D will be D ?
@JohnSmall314
@JohnSmall314 Месяц назад
Yes. Because the Enigma machine had that flaw which enabled certain kinds of break, the Typex machine was built so it could encrypt a letter to itself.
@bobjones-ey5gl
@bobjones-ey5gl Месяц назад
Great video on RAF Enigma with Type X attachments
@natalianelke1750
@natalianelke1750 Месяц назад
Plugin template link broken
@LaboriousCretin
@LaboriousCretin 2 месяца назад
It's going to sound crazy. But K0/LEX holds all the keys. All K0 meaning changes and all of K1-K5. Use all instructions on everything. Every letter in K0 gets substitution rule. As you learn the rules the text in K1-K5 have hidden rules to use on the K0 new text. Just warps my mind they could do this. Also to go along with the kryptos lex part. Hidden 5 headed hydra. 5 main layers and 5 sublayers and 5 layers of encryption. Some I'm left with how did they make this so good. T,Y rules, O,A substitution. Which the puzzle is full of. Keyed words and keywords and all the steps and rules within it. It's all about learning rules and steps. It even shows some of what was missed in Medusa Cyrillic projector. Though makes me wonder if he has 3 other titan pieces out there some place. That the key turns into text and the text decrypted some turns into instructions just shorts my mind. So much hidden in plain sight. K0 a nod to station X.
@LaboriousCretin
@LaboriousCretin 2 месяца назад
Nice video. Kryptos K0 has all the keys and second layer checks. Replace Q with illusion, O with underground, EX a layer 2 and X to ? Layer 2. The E's and X's get Ted off when solving. The EEE invisable keep the placements when solving for a check. It's wild he could put so much in it with directions. The order of K3 from steps learned in K0. E,X a check. Also links to layer 2 Position E, X abiscissa. For meaning. Multiple checks when done right. Just add the X's they left out. You add a ? To the end of position E when it becomes a question. You will need to X a few spots after T'ing the E,X's. The solo E becomes EX as one of many checks. Just fallow the rules/instructions.
@mistervacation23
@mistervacation23 2 месяца назад
Oh, die alte Wellington-Chiffre. Das wurde wahrscheinlich seit hundert Jahren nicht mehr verwendet. Die Wellington-Chiffre, eine weniger bekannte historische Verschlüsselungsmethode, wurde nach Arthur Wellesley, dem 1. Herzog von Wellington, benannt. Diese Chiffre wurde im frühen 19. Jahrhundert verwendet und während der Napoleonischen Kriege zur sicheren militärischen Kommunikation eingesetzt. Die Chiffre selbst wird seit rund 100 Jahren nicht mehr verwendet, was größtenteils auf Fortschritte bei kryptografischen Techniken und Technologien zurückzuführen ist.
@chrisst8922
@chrisst8922 2 месяца назад
I believe that this particular machine was the one used by Kesselrings army.
@LaboriousCretin
@LaboriousCretin 2 месяца назад
Thank you for another good video. Kryptos K3 keyed word desperately ( E,A ) missing E " rat ". Word before X " mist ". X's to ?'s. " Can you see anything Q? " ( Q, illusion link ). You have some nice videos. Keep up the good work.
@LaboriousCretin
@LaboriousCretin 2 месяца назад
Nice video. Thank you for sharing. I wonder if a system could find the last of Kryptos K4 with the plane text givven. The E count shows it's not just a transportation. K to K should show a point to type/types used. With all the other letters given. Even if double or triple encrypted. One might be able to figure out type and break it. Keep the possible steps low. As it was made to be solved. It could even be a combination of two cipher types. Neural nets might be able to pick up on things humans would miss. It gives me something to think on. Keep up the good work.
@CryptographyForEverybody
@CryptographyForEverybody 2 месяца назад
Heyho, we tested it with K4, but it did not delivery any good results :-)
@LaboriousCretin
@LaboriousCretin 2 месяца назад
@@CryptographyForEverybody Thank you for looking. I think people missed a lot. K0 They took out the X's for the spaces and that threw people off. Also they missed the instructions as you peel layers away. Interpret at I,T, and EEE invisable, T is your X position E? ( Underlayer rule X to ? ) Abscissa comes from the mores part. As far as K4 XIF might come after clock from shift patterns. Still thinking on the patterns showing up in shifts and known to cipher while looking at other simple he may have done. K3 pulls out rat E word from key E,A escaping. K2 Out only O,U. K1 Light Lies from key L,Q. Light Lies only out encumbered escaping. Instructions or directions he points to in the cipher. K1 Palimpsest tells what to do with keyed words and layers. Abscissa tells what to do and look for and both sides. Each section has its rules the under layers connecting in ways. K4 X after clock would fit format of underlayer with shift frequency as how I got to it. 1 word in K4 will be keyed if like the rest. I'm going to look back over the steps. He really does seem to be telling us steps and what he did is not to hard. You might want to look at shift counts of known vs cipher on K4. There is a pattern that shows up it seems. Thank you for looking. Keep up the good work. I just found the page recently and going over simple ciphers he might use though modify/change some to throw us off. K0 SOS RQ replace the one Q with illusion. Layer chech. K4 will have a keyed word with 2 underlayer words linking to misspelling. It should have X's and E's. It will have a layer 2 that connects to K0. Likewise K0 should open K4.
@LaboriousCretin
@LaboriousCretin 2 месяца назад
Nice video on the cipher and even including the kryptos cipher layer. K1 underlayer. L words. Light Lies. " Between subtle shading and the absence of the nuance of illusion. " ( Q.L ) Keyed word illusion Q. K2 layer 2. X's have multiple checks. Words before X's. " Field location somewhere message west " X's to ?'s. " Does Langley know about this? Who knows the exact location? Words before ?'s. " Possible this location. " Keyed word underground U ( O,U ) " X Layer 2 " instructions. Abscissa a check for X. Thank you for sharing the videos. Keep up the good work.
@LaboriousCretin
@LaboriousCretin 2 месяца назад
Nice video. Though reminds me of Kryptos and how they solved it in the wrong way intended. Tabula rasa and palimpsest. Beaufort looked like a variant of Viegere chipher. Nice video. Keep up the good work
@bobSeigar
@bobSeigar 2 месяца назад
Criminally underrated channel. Thank you for posting this.
@rubikashree3519
@rubikashree3519 2 месяца назад
youre such a good human ;-;
@CryptographyForEverybody
@CryptographyForEverybody 2 месяца назад
thank you :-)
@FalcoGer
@FalcoGer 2 месяца назад
I really wish there was a linux native alternative. or at least something that can run in mono. I tried following the instructions, but I've had lots of issues. bottles wouldn't create a new bottle, failing to install microsoft fonts, used bottle-cli to make one. dotnet46 wouldn't install (supposedly already installed), ignored that. After that cryptool installed, but then nothing happened when i tried to launch it. ran dotnet46 installer with /reinstall argument, said it did reinstall. still nothing. Spending 3 hours to install this thing, only for it to not work.
@FalcoGer
@FalcoGer 2 месяца назад
What worked for me: sudo apt install wine winetricks mono-runtime winetricks -q dotnet48 winetricks -q dxvk winetricks -q d3dcompiler_47 wine reg add "HKCU\\SOFTWARE\\Microsoft\\Avalon.Graphics" /v DisableHWAcceleration /t REG_DWORD /d 1 /f wine /path/to/installer.exe
@volkermarks9303
@volkermarks9303 3 месяца назад
Hinweis: in der aktuellen Version muss man beim SymbolCipher den SymbolCipherTypeCaption auf : Musical stellen
@volkermarks9303
@volkermarks9303 3 месяца назад
Sehr coole Idee gut umgesetzt !
@priyanshigusain6722
@priyanshigusain6722 3 месяца назад
thanks for this video i really wasn't able to find the video for the simplified AES luckily got you video and you explained it really in simplified way only😄 really loved it🥰
@CryptographyForEverybody
@CryptographyForEverybody 3 месяца назад
Thx, happy you like it 🙂
@zacks-oy4qn
@zacks-oy4qn 3 месяца назад
The death of Taylor is very very interesting with a variety of suspects. Strangely all the evidence from the case disappeared fairly quickly during the investigation. Furthermore, investigators were told to "back off" by their higher ups. All the classic characteristics of a Hollywood murder including potential cover ups, disguises, and other random mysteries.