Hello and welcome to my cryptology channel! I am Nils, a cryptology maniac and specialist.
Currently, I lead the development of the open-source software CrypTool 2. In my professional life, I work as a professor at the Hochschule Niederrhein (University of Applied Sciences) and the Cyber Campus NRW in the realm of IT security. Previously, I worked as a post-doc at the University of Siegen in the DECRYPT project, where we collected, analyzed, and decrypted historical ciphertexts from around the world.
On this RU-vid channel, you learn about cryptology = cryptography (making codes/ciphers) and cryptanalysis (breaking codes/ciphers). From the Zodiac Killer's ciphers to the famous Enigma. From modern AES to RSA. If you are interested in secret codes, subscribe to this channel!
Discord: discord.gg/xGGAehgJ Blog: www.kopaldev.de/ My Ethereum address for tip: 0x0777390782b6421172403a56b7997C1facAfCF42
Hello, You can find the prizes listed on auction house websites. I managed to get my copy at a great price, but I'd prefer to keep the details private :-) Kind regards, Nils
Hi there, I'm sorry, but slides from my videos are not available. Additionally, it's better to create your own slides when presenting a topic. This way, you can ensure that you fully understand and are familiar with the material you are presenting. Greetings, Nils
Thank u a lot , it was very intrestring , i hope u ll make a video about the propieties of the s-box ! I ve written a program in c# implementing aes to encrypt a DB using the microsoft aes library . I wanted to learn deeper how aes works becouse i need to know in deteils how it executes step by step in order to understand how can i split the tasks in order to encrypt faster . Do u think that separate the backup file in more chunks written in temporary files and merge at the end them togheter in the right sequence wouldn t work?
Now we are talking! I've been combining the concepts of cryptography and AI ever since I started the project, 2012 era. It is great to see this finally observed and respected in the field. Great video content as always!
hi i'm a french person preparing an oral about different cipher machines used during wwII so thanks for your very useful video ! i have one thing i don't understand : why are the index rotors for ?
Hi thank you, the index rotors are fed with current by the control rotors and output the current to the stepping control. basically they are just changing the input based on their positions and rotations. They never move but since they can be put in any configuration into the machine they are also part of the key. I hope this answers the question 🙂 Greetings, Nils
@@CryptographyForEverybody thank you I think I understood ! i just have two more questions : for the maths of the key space size, why don't you take into account the 2^35.5 for the positions of the rotors ? also, is there any chance you have worked on the purple cipher machine by the japanese side during WWII ? it's also called the type b cipher machine or the code 97 I think thank you for all your work it's really helping 🙏🫶
I really enjoyed the video, you made really helped break it down to make S-AES simple to understand. I do however feel like it's a bit confusing to find a pre-computed GF(16) table which you mention at 11:22, your blog post links to the Wikipedia article on Finite fields but I got quite a bit lost there.
Hello @clownkid, thank you. I'm glad you like the video. You can find the complete source code (my implementation) of S-AES here: github.com/CrypToolProject/CrypTool-2/blob/main/CrypPlugins/SAES/SAESAlgorithm.cs This source code also contains the pre-generated tables. I hope this helps. Greetings, Nils
Nice. But: The key space size (case 2, reordering) of 100! describes clearly a complete random distriburion of table entries. But then an additional column/line reordering (case 3) adds no new configuration, as this is already included in the 100! configurations, it is just another random config. So the key space size for case 3 is also 100! . Do you agree, or am I missing something?
Yes, you are right. There is a distinction between keyspace size and practical keyspace size. With the syllabary cipher (at least as it is constructed with the table by Friedman), some keys are equivalent, which reduces the practical keyspace size, meaning the practical keyspace size is smaller than the keyspace size. In this case, rearranging the digits only changes the keyspace size but not the practical keyspace size, which remains 100!. Moreover, the term "keyspace size" can be misleading here since an attack using, for example, frequency analysis also significantly reduces the practical keyspace size. Therefore, it is more accurate to refer to attack effort, attack difficulty, or attack complexity.
Can you real quick tell me if this is correct? So first use Visionaire cipher then link every letter to a numbe like a to 0 b to 1 so on then for example Hgajp would be (h - g) (a - j) (p )
Hiho, I don't fully understand the question, but as far as I understand, you want to know how Vigenère works: With the Vigenère cipher, you use a keyword to encrypt your message. The Vigenère cipher is a method of encrypting alphabetic text by using a simple form of polyalphabetic substitution. Here's a brief explanation: Choose a keyword: The keyword is repeated so that it matches the length of the message you want to encrypt. Encrypt the message: Each letter in the plaintext is shifted along some number of places based on the corresponding letter in the keyword. The shift is determined by the letter's position in the alphabet (e.g., A=0, B=1, C=2, etc.). Example: If your plaintext is "HELLO" and your keyword is "KEY", you repeat the keyword to match the length of the plaintext, resulting in "KEYKE". For H (7) and K (10): H shifted by K is R. For E (4) and E (4): E shifted by E is I. For L (11) and Y (24): L shifted by Y is J. For L (11) and K (10): L shifted by K is V. For O (14) and E (4): O shifted by E is S. So, "HELLO" encrypted with the keyword "KEY" becomes "RIJVS". I also made a video about Vigenère: ru-vid.com/video/%D0%B2%D0%B8%D0%B4%D0%B5%D0%BE-95w8UTOB_lc.html Greetings, Nils
@@CryptographyForEverybody yea no worries tho I make mistakes alot lol almost every time I try a cipher then see if I was correct it almost always says a different answer then me, but your vids helped me out thanks so much man!
Hiho, Very difficult, but hard to put into a number. It depends on your method of encryption, how likely it is to find the correct book, etc. But in general it is very hard to solve even "unsolvable" without a copy of the used book. Greetings, Nils
there's a small typo in the keyspace calculation -- in total keyspace size calculation, when writing down the formula, you accidentally repeat the number 2^150 (from the Chi wheels keyspace) also for the Mu wheels keyspace size, instead of using the value of 2^98 as calculated in the previous step. But, doesn't affect anything as despite the written values being off, the total keyspace size has nevertheless apparently been calculated using 2^98 as intended; 2^150 * 2^253 * 2^98 = 2^501 Thx for making these vids, I very much enjoy learning about various historic ciphers from them!
Thank you for this explanation, but I have a question about the indicator group calculation. If I understand you correctly, one is to add the page concatenated with the line number (as a single 5digit number) with the secret key. But, isn't that key supposed to be reusable? And if I were to add the page/line number with the same key again for the next message, isn't this like reusing a one-time pad? I guess we don't have any kind of crib to presume as its just random page and line numbers, so maybe it can't be a problem here -- is that what's going on to make this procedure here nevertheless fine, or something else?
@@CryptographyForEverybody Thank you! I had figured it out earlier but forgot to update, lol. But you're awesome for responding so quickly and I appreciate the info!!
Extracting layrrs of meaning. WW2 has 2 sublayers under a larger umbrella and for allied side ( light ). Metaxis is ( start of WW2 ) meanings. " A state of being into both ficticious and real world at the same time. Also " in the state of in the middle. Betwixed, ( BETWEEN ). Palimpsest K1 check, WW2 layer check. Greek layer elements. Kryptos, LEX, Alexander, Mytaxis ( My tax is play ). Hydra ( goddess of dragons and the mother of Alexander Tiamat. Hydra radio station and camp X ). Alexander plats to Rosa Luxemburg " U Underground " SS layer and V-Day preparation spot for Churchill. Layer 5. Project overlord. Cipher and text codex a book of wisdom/knowledge. Alex Kenneth Alexander ( A LEX Kenneth Alexander checks ) Ghost stations. Y Stations, station X, U Underground stations, spy stations ( project gold and building a cryptographic tunnel ). Treasure, Tate, Tricycle, cross checks in double agents, XX Double cross WW2 layer. Gold beach D-Day layer. Spy and military layers. L class ships Lexington ( lady lex ) a side track artifacting from key ussage I think, but not sure yet ). SOS ( OSS Underground SS ). OSS part. P.O. rank. One huge part that throws everyone off is the lack of math or computers to do this. Morse and binary and knowledge enough to learn. They give directions, rules, laws, steps, keys, checks and cross checks, keywords, keyed words, formatting, ect..
Yes. Because the Enigma machine had that flaw which enabled certain kinds of break, the Typex machine was built so it could encrypt a letter to itself.
It's going to sound crazy. But K0/LEX holds all the keys. All K0 meaning changes and all of K1-K5. Use all instructions on everything. Every letter in K0 gets substitution rule. As you learn the rules the text in K1-K5 have hidden rules to use on the K0 new text. Just warps my mind they could do this. Also to go along with the kryptos lex part. Hidden 5 headed hydra. 5 main layers and 5 sublayers and 5 layers of encryption. Some I'm left with how did they make this so good. T,Y rules, O,A substitution. Which the puzzle is full of. Keyed words and keywords and all the steps and rules within it. It's all about learning rules and steps. It even shows some of what was missed in Medusa Cyrillic projector. Though makes me wonder if he has 3 other titan pieces out there some place. That the key turns into text and the text decrypted some turns into instructions just shorts my mind. So much hidden in plain sight. K0 a nod to station X.
Nice video. Kryptos K0 has all the keys and second layer checks. Replace Q with illusion, O with underground, EX a layer 2 and X to ? Layer 2. The E's and X's get Ted off when solving. The EEE invisable keep the placements when solving for a check. It's wild he could put so much in it with directions. The order of K3 from steps learned in K0. E,X a check. Also links to layer 2 Position E, X abiscissa. For meaning. Multiple checks when done right. Just add the X's they left out. You add a ? To the end of position E when it becomes a question. You will need to X a few spots after T'ing the E,X's. The solo E becomes EX as one of many checks. Just fallow the rules/instructions.
Oh, die alte Wellington-Chiffre. Das wurde wahrscheinlich seit hundert Jahren nicht mehr verwendet. Die Wellington-Chiffre, eine weniger bekannte historische Verschlüsselungsmethode, wurde nach Arthur Wellesley, dem 1. Herzog von Wellington, benannt. Diese Chiffre wurde im frühen 19. Jahrhundert verwendet und während der Napoleonischen Kriege zur sicheren militärischen Kommunikation eingesetzt. Die Chiffre selbst wird seit rund 100 Jahren nicht mehr verwendet, was größtenteils auf Fortschritte bei kryptografischen Techniken und Technologien zurückzuführen ist.
Thank you for another good video. Kryptos K3 keyed word desperately ( E,A ) missing E " rat ". Word before X " mist ". X's to ?'s. " Can you see anything Q? " ( Q, illusion link ). You have some nice videos. Keep up the good work.
Nice video. Thank you for sharing. I wonder if a system could find the last of Kryptos K4 with the plane text givven. The E count shows it's not just a transportation. K to K should show a point to type/types used. With all the other letters given. Even if double or triple encrypted. One might be able to figure out type and break it. Keep the possible steps low. As it was made to be solved. It could even be a combination of two cipher types. Neural nets might be able to pick up on things humans would miss. It gives me something to think on. Keep up the good work.
@@CryptographyForEverybody Thank you for looking. I think people missed a lot. K0 They took out the X's for the spaces and that threw people off. Also they missed the instructions as you peel layers away. Interpret at I,T, and EEE invisable, T is your X position E? ( Underlayer rule X to ? ) Abscissa comes from the mores part. As far as K4 XIF might come after clock from shift patterns. Still thinking on the patterns showing up in shifts and known to cipher while looking at other simple he may have done. K3 pulls out rat E word from key E,A escaping. K2 Out only O,U. K1 Light Lies from key L,Q. Light Lies only out encumbered escaping. Instructions or directions he points to in the cipher. K1 Palimpsest tells what to do with keyed words and layers. Abscissa tells what to do and look for and both sides. Each section has its rules the under layers connecting in ways. K4 X after clock would fit format of underlayer with shift frequency as how I got to it. 1 word in K4 will be keyed if like the rest. I'm going to look back over the steps. He really does seem to be telling us steps and what he did is not to hard. You might want to look at shift counts of known vs cipher on K4. There is a pattern that shows up it seems. Thank you for looking. Keep up the good work. I just found the page recently and going over simple ciphers he might use though modify/change some to throw us off. K0 SOS RQ replace the one Q with illusion. Layer chech. K4 will have a keyed word with 2 underlayer words linking to misspelling. It should have X's and E's. It will have a layer 2 that connects to K0. Likewise K0 should open K4.
Nice video on the cipher and even including the kryptos cipher layer. K1 underlayer. L words. Light Lies. " Between subtle shading and the absence of the nuance of illusion. " ( Q.L ) Keyed word illusion Q. K2 layer 2. X's have multiple checks. Words before X's. " Field location somewhere message west " X's to ?'s. " Does Langley know about this? Who knows the exact location? Words before ?'s. " Possible this location. " Keyed word underground U ( O,U ) " X Layer 2 " instructions. Abscissa a check for X. Thank you for sharing the videos. Keep up the good work.
Nice video. Though reminds me of Kryptos and how they solved it in the wrong way intended. Tabula rasa and palimpsest. Beaufort looked like a variant of Viegere chipher. Nice video. Keep up the good work
I really wish there was a linux native alternative. or at least something that can run in mono. I tried following the instructions, but I've had lots of issues. bottles wouldn't create a new bottle, failing to install microsoft fonts, used bottle-cli to make one. dotnet46 wouldn't install (supposedly already installed), ignored that. After that cryptool installed, but then nothing happened when i tried to launch it. ran dotnet46 installer with /reinstall argument, said it did reinstall. still nothing. Spending 3 hours to install this thing, only for it to not work.
thanks for this video i really wasn't able to find the video for the simplified AES luckily got you video and you explained it really in simplified way only😄 really loved it🥰
The death of Taylor is very very interesting with a variety of suspects. Strangely all the evidence from the case disappeared fairly quickly during the investigation. Furthermore, investigators were told to "back off" by their higher ups. All the classic characteristics of a Hollywood murder including potential cover ups, disguises, and other random mysteries.