Тёмный

Cryptanalysis of Vigenere cipher: not just how, but why it works 

Подписаться
Просмотров 31 тыс.
% 794

The Vigenere cipher, dating from the 1500's, was still used during the US civil war. We introduce the cipher and explain a standard method of cryptanalysis based on frequency analysis and the geometry of vectors. We focus on visual intuition to explain why it works.
The only background needed is some familiarity with vectors and probabilities.
For more on this method:
_Introduction_to_Cryptography_with_Coding_Theory_ by Wade Trappe and Lawrence C. Washington, Second Edition, Section 2.3. Here the method is exactly as in the video, because this is the text I teach my course from.
_Secret_History:_The_Story_of_Cryptology_ by Craig P. Bauer, Section 3.3. Here the method is done with more mathematical sophistication (so it looks slightly different). This is a very valuable and detailed textbook for anyone interested in old ciphers and their cryptanalysis.
I also have some cryptanalysis tools here you can use to implement the method (which I do with my students in the classroom): crypto.katestange.net/cryptanalysis-tools/

Наука

Опубликовано:

 

30 авг 2020

Поделиться:

Ссылка:

Скачать:

Готовим ссылку...

Добавить в:

Мой плейлист
Посмотреть позже
Комментарии : 41   
@rabeebibrat1805
@rabeebibrat1805 2 года назад
Awesome video. Good job! Note: At 9:48, if anyone is wondering if there is a cos θ in higher dimensions, the Cauchy Schwarz inequality handles just that.
@ninmarwarda5154
@ninmarwarda5154 2 года назад
What a brilliant video, you have literally explained it 100 times better than my lecturer! Thanks for the clarification.
@attirahmunir5298
@attirahmunir5298 3 года назад
Awesome video! First time learning about this and it makes so much sense! Thank you!!!!!
@WeAreAllHumanBeings2
@WeAreAllHumanBeings2 3 года назад
Awesome. Been looking for a good vid about this. Glad found this.
@user-jg6kg1hn1k
@user-jg6kg1hn1k 3 года назад
Best Informational Video I ever watched,
@shubhamsharma3559
@shubhamsharma3559 3 года назад
Very well explained. Thanks!
@Khan-vy1sj
@Khan-vy1sj 2 года назад
i don’t know why youtube suggested me this video but this is what i’ve been looking for without knowing that i’ve been looking for it..
@iliasp4275
@iliasp4275 3 года назад
Excelent video! you just saved a students life
@gwynnalagao5066
@gwynnalagao5066 3 года назад
Easiest to understand so far... Thanks
@shihminglin229
@shihminglin229 2 года назад
Amazing video about decrypting vigenere cipher
@lynx5987
@lynx5987 3 года назад
Really fun video, much appreciated
@averageevil801
@averageevil801 2 года назад
Thank you so much, this is so much easier now
@user-qz5is9dc2n
@user-qz5is9dc2n 2 года назад
Awesome video.
@electra_
@electra_ Год назад
the matching up of various shifts reminds me of the Fourier transform
@zucc4764
@zucc4764 Год назад
that's a good intuition!
@gokulsreekumar4371
@gokulsreekumar4371 3 года назад
Super Helpful
@marcgutgesell794
@marcgutgesell794 Год назад
Great video. I'm currently working on a solver for the Keyed Vigenere Cipher (Quagmire III), which is a bit more challenging. Do you have any recommendations for that?
@luciddoggo5094
@luciddoggo5094 Год назад
Very helpful video
@creeperthecat9120
@creeperthecat9120 2 года назад
Really useful tutorial. Is the probability that two squares are the same; the same as the Index Of Coincidence? What would you do if there was no clear peak between the number of coincidences, or if a low shift such as 3 peaks, shift 6 doesn't peak and 9 peaks again? If you couldn't tell, this is what I seem to be facing at the moment.
@wlocas
@wlocas 2 года назад
This is epic by the way. Will this work if the cipher alphabet is in ASCII? We've been trying to identify the cipher type of a ciphertext written in ASCII and index of coincidence/other tests fail because of the ciphertext containing letters, numbers, and symbols. We're not sure how to approach identification of cipher species due to this
@gusrallim
@gusrallim 2 года назад
great vid
@amjadtrablsi4051
@amjadtrablsi4051 3 года назад
Amazing
@MrAzira
@MrAzira 3 года назад
Great!
@vinaykumardaivajna5260
@vinaykumardaivajna5260 3 года назад
That is a great explanation i could have saved 4-5 hours .
@harshjoshi6257
@harshjoshi6257 3 года назад
eargasm
@Varaldar
@Varaldar Год назад
My text is ciphered from the entire text of the lord of the rings which is ciphered from the text of "a pickle for the knowing ones" which is ciphered from the wheel of time series, which is ciphred from the eye of argon. (It's a grocery list)
@averageevil801
@averageevil801 2 года назад
So does anybody know what it means if there are 2 big numbers in a row? I’m doing a kinda small ciphertext but last time it happened with a much larger one. Is it just a …coincidence?
@kayleighlehrman9566
@kayleighlehrman9566 2 года назад
Could you hypothetically use the plaintext to be encoded as the key to encode itself?
@ProofofConceptMath
@ProofofConceptMath 2 года назад
Interesting. If I understand you correctly, I think you'd end up essentially doubling every letter, so A=0 goes to A=0, B=1 goes to C=2, C=2 goes to E=4 etc. This would be an example of what's called an affine cipher (in this case, multiplication by 2). One problem is that the alphabet has an even number of letters, so you'd have no way to get odd numbers out. You'd have repeats like A=0 and N=13 both going to A=0. This would make decoding a little bit of a guessing game.
@marcgutgesell794
@marcgutgesell794 Год назад
This is basically a polyphonic substitution cipher.
@fjonisch
@fjonisch 2 года назад
It sounds easy when the key is shorter than the plain text and repeats. What if when the key has the same length as the plain text. I generate the key with a pseudo random generator where the seed is the master key. And then the usual mod26 for coding and decoding. I tested it with free42, a HP42 reimplementation available for all platforms.
@electra_
@electra_ Год назад
When the key has the same length as the plain text this is called a "one time pad" and is unbreakable. this is because for every message, there is a key that could take it to any other message. So without knowledge of the key, any ciphertext could have feasibly come from any message you could think of. The trick is making sure your random number generator is secure. Since it is not "true" randomness, you could theoretically find patterns in the randomness and exploit them. Also, keeping track of the current state of the random number generator between different messages is fairly impractical, so often instead you'll use a pseudo random function where both the key and some other seed value such as the current time or a previous message is used.
@tamekkaknuth9612
@tamekkaknuth9612 Год назад
Total is 7
@jorginho7595
@jorginho7595 3 года назад
I rather look at small repeated words, THE, AND...
@yoker8289
@yoker8289 2 года назад
Sorry, but with the steps given in the video I was not able to reproduce this approach and therefore I also didn't get valid results. Please provide a more detailed explanation or a real world example to proof that it works.
@ProofofConceptMath
@ProofofConceptMath 2 года назад
I'm sorry you weren't able to get it to work. But I appreciate the request for more resources, and I've added some textbooks and tools to the description of the video.
@yoker8289
@yoker8289 2 года назад
@@ProofofConceptMath Thank you for your reply and for providing further information on the technique. I will definetly check those out. Btw: I've edited my initial comment. Maybe it was a bit harsh. Sorry about that.
@I3uzzzzzz
@I3uzzzzzz 3 года назад
omg ur voice i blundered kreygasm
@charlier.2752
@charlier.2752 3 года назад
nope
@prurpru7821
@prurpru7821 3 года назад
i lost
@tamekkaknuth9612
@tamekkaknuth9612 Год назад
I'm divorced and single