Тёмный

ADFGVX Cipher: Encryption and Decryption (Updated) 

Proof of Concept
Подписаться 9 тыс.
Просмотров 16 тыс.
50% 1

Опубликовано:

 

6 сен 2024

Поделиться:

Ссылка:

Скачать:

Готовим ссылку...

Добавить в:

Мой плейлист
Посмотреть позже
Комментарии : 16   
@NestPavel
@NestPavel 4 месяца назад
Came here after Leminno video about Kryptos. Nice video! And the puzzle was fun, althought at first I didn't know what to do with the fact that last row is incomplete. But when you think about it, it becomes more or less obvious.
@deandrereichelle831
@deandrereichelle831 3 года назад
I see lots of explanations on the famous WWII enigma cipher, but less so the older ciphers that very complex idea was built on the shoulders of, leaving a lot unsaid
@zhetianzhu2150
@zhetianzhu2150 2 года назад
I am currently learning cryptography, and I found all your videos very useful. Thank you for these amazing works!
@MathVisualProofs
@MathVisualProofs 3 года назад
Excellent! I teach a course out of The Code Book in Jterm pretty regularly and we do this cipher. I’ll have them watch this next time I teach it.
@johnjamesbaldridge867
@johnjamesbaldridge867 2 года назад
First, I've watched a countless (but countable) number of math(s) videos on RU-vid over the years and I'm thrilled the algorithm finally landed me here. I've also done the deep dive into Enigma and, even more interesting, Colossus, the Tiltman break, Tommy Flowers, and all that. I've also seen how the Playfair cipher was used by the Brits in WWII, whose cracking by the Germans was ultimately discovered by Enigma after much damage to northern shipping (they has lost access to Naval Enigma, and regaining that is a story in and of itself), and how the cracking of Italian merchant shipping and low-level Luftwaffe messages using those (Playfair?) and similar ciphers was even more responsible for disrupting Rommel's supply chain in North Africa than Bletchley Park. With that overly long preface, my question has to do with the American Civil War. Grant's, Sherman's, and Horace Porter's memoirs often point out that they had cracked Lee's communications, particularly around Petersburg and Richmond later in the war, hinting at the idea that there were several individual telegraph operators who got really good at it. I've not been able to find any direct information about the ciphers used and whether the CSA had cracked any Union communications, so I'm wondering about that. Love this channel!!!
@MrKaje72
@MrKaje72 Год назад
Wait, i don’t understand how you knew the column 2,6 would be the ones to have 3 letters. 3 remainder 4 i understood, but why columns 2 and 6?
@3omarhd878
@3omarhd878 4 месяца назад
in my opinion , its because when we write the arranged cipher text it dont have gaps in between , i mean i dont have a proof or evidence "why" since she didnt have the time to explain , but you can observe it logically .
@veehope2702
@veehope2702 2 года назад
I would be fascinated in seeing a cryptanalysis of this cipher.
@iirmii5166
@iirmii5166 Год назад
How do you do it if you only know that the cey is 4 letters long without knowing the exact cey?
@Halfcast365
@Halfcast365 8 месяцев назад
when you divide by 6 you get 3 remainder 4? what are you dividing? assuming you are dividing 22 by 6, this is giving us 3.6. could you clarify this part as as you stated it gets tricky but you dont explain the workings of this very clearly
@electra_
@electra_ 2 года назад
Idea on how to crack: Separate the outputs into columns. You won't know which column goes where, but you can do frequency analysis on them. You should see a different frequency pattern for the rows and the columns, since they're generated from a fundamentally different mapping of the inputs. Now, pair different row and column groups up, and consider their frequency when put into letters. Comparing the different frequencies of these, you should find a set of frequencies that all match with each other, these are the frequencies of the actual letters. You can now do a simple frequency analysis on this frequency to reverse the polybius square.
@deandrereichelle831
@deandrereichelle831 3 года назад
Great explanation! -doggo
@ruralcoder
@ruralcoder 2 года назад
Microsoft Access 97 used ADFGVX Cipher! 14x14 polibius square!
@123bubbleup
@123bubbleup 2 года назад
Awesome!!
@user-ll7mp7qx8d
@user-ll7mp7qx8d 7 месяцев назад
Nn
Далее
Lattice-based cryptography: The tricky math of dots
8:39
Нарвался на сотрудника ФСБ⚡️
01:00
Inq's Cipher Wheel
13:06
Просмотров 1,3 млн
Lesson 28: The ADFGVX cipher
12:39
Просмотров 4 тыс.
The Bifid Cipher Explained
13:34
Просмотров 3,6 тыс.
Paper Enigma Machine
17:09
Просмотров 53 тыс.
Vigenere Cipher - Decryption (Unknown Key)
17:45
Просмотров 303 тыс.
The Mystery of the Copiale Cipher
10:23
Просмотров 628 тыс.
SHA: Secure Hashing Algorithm - Computerphile
10:21
Просмотров 1,2 млн
Playfair Cipher
19:18
Просмотров 185 тыс.
The Euclidean Algorithm:  How and Why, Visually
13:29
Просмотров 31 тыс.
Rethinking the real line #SoME3
14:54
Просмотров 96 тыс.
Нарвался на сотрудника ФСБ⚡️
01:00