Тёмный
No video :(

Cryptography 101 - The Basics 

Pico Cetef
Подписаться 3,1 тыс.
Просмотров 334 тыс.
50% 1

In this video we cover basic terminology in cryptography, including what is a ciphertext, plaintext, keys, public key crypto, and private key crypto.

Опубликовано:

 

5 сен 2024

Поделиться:

Ссылка:

Скачать:

Готовим ссылку...

Добавить в:

Мой плейлист
Посмотреть позже
Комментарии : 100   
@Fre3r
@Fre3r Год назад
got really interested in encryption recently. thanks for making this!
@barrykavanagh5045
@barrykavanagh5045 5 лет назад
Using HTTPS to securely thank you for this video! :)
@gsharpshooter80
@gsharpshooter80 9 лет назад
Did anybody else think this demonstration should have been used with Spongebob, Patrick, and squidward when they were sending voice messages through bubbles and squidward would hijack the moment with hate bubbles XD
@Divya-tl6gr
@Divya-tl6gr 8 лет назад
+gsharpshooter80 very creative thought dude.
@calebaughtry8687
@calebaughtry8687 7 лет назад
You are now my God
@julianocamargo6674
@julianocamargo6674 7 лет назад
It would be great for kids but you would need to talk to Viacom
@bestbotreview
@bestbotreview 6 лет назад
im here for the party like its opposite day
@anonymoustester9472
@anonymoustester9472 6 лет назад
Simple Encryption Technique in just 30 sec ru-vid.com/video/%D0%B2%D0%B8%D0%B4%D0%B5%D0%BE-QVTqx1aI8SU.html
@DX413RB8
@DX413RB8 3 года назад
this is why i learned english; international knowledge
@sujanbaruah3305
@sujanbaruah3305 7 лет назад
THANK YOU soooo much..... Very intuitive and easy explanation
@anoncker
@anoncker 10 лет назад
Thank you so much man,you made things MUUUUUUUUCH clear for me. I LOVE YOU :D
@punditgi
@punditgi 3 года назад
A freebie lecture from CMU? Nice! 👍
@uwumukizasolange8889
@uwumukizasolange8889 5 лет назад
thank you for providing this understandable video for us
@TheMojoPhoto
@TheMojoPhoto 4 года назад
Well done, I ended up here by mishap. You have a new Sub. I was look up classical pigpen. FYI.
@osmanmusse9432
@osmanmusse9432 2 года назад
Thanks for explaining this topic
@SantoshBalakrishnanVSL
@SantoshBalakrishnanVSL 6 лет назад
Hi David, this is an excellent start. Can you share more or related videos?
@malluk4127
@malluk4127 6 лет назад
Sorry if this is a bit late... But he has more on his channel...
@Divya-tl6gr
@Divya-tl6gr 8 лет назад
i really liked the way you explained it.
@tarannumkhatri5636
@tarannumkhatri5636 8 лет назад
very helpful..easy to understand thanks..
@DannyD1Chung
@DannyD1Chung 6 лет назад
Thank you. Well explained.
@supremeleadersnoke792
@supremeleadersnoke792 8 лет назад
how do i decode your video on Cryptography 101 - The Basics ...the video was obviously made by cicada 3301
@anonymoustester9472
@anonymoustester9472 6 лет назад
Simple Encryption Technique in just 30 sec ru-vid.com/video/%D0%B2%D0%B8%D0%B4%D0%B5%D0%BE-QVTqx1aI8SU.html
@bkzegyptshin1
@bkzegyptshin1 2 года назад
Do you have a full course of this , I never had someone explain Somthing do understandable ..
@Jamie-iv8dp
@Jamie-iv8dp 7 лет назад
How do Alice and bob know the same key without sending a decrypted version first?
@raregear
@raregear 4 года назад
very well explained!
@BambiOnIce19
@BambiOnIce19 2 года назад
So the exchange of keys is the really important part, right? You can steal the information, but you cannot do nothing with that information unless you have the 'key'. So how do you get your hands on this 'key', that is what i want to know
@wildcountryman13
@wildcountryman13 9 лет назад
Hi I enjoyed your video. I was trying to find someone that could possibly make an encryption and decryption program using an old method that ive used on paper.
@yvfg326
@yvfg326 6 лет назад
thank u so much u want video plz about reed solomn
@greenspringvalley
@greenspringvalley 10 лет назад
outstanding
@binnypatel7061
@binnypatel7061 8 лет назад
great job.... thanks!!
@creamy6680
@creamy6680 7 лет назад
Interesting ! I have a question... is online banking considered as asymetric encryption?
@ocgmail42
@ocgmail42 6 лет назад
WOW bitcoin was only worth $134 when he made this video.... it was $19,000 just this month!!!! CRAZY
@MoeMoeAnimeLover
@MoeMoeAnimeLover 6 лет назад
Conservative 101 right? bitcoin‘s going up like crazy someday it won‘t have any value i guess🙄
@anonymoustester9472
@anonymoustester9472 6 лет назад
Simple Encryption Technique in just 30 sec ru-vid.com/video/%D0%B2%D0%B8%D0%B4%D0%B5%D0%BE-QVTqx1aI8SU.html
@adithyavikramm3837
@adithyavikramm3837 6 лет назад
how could eve has access to the cipher text.. Pls explain
@ParadoxUmbra
@ParadoxUmbra 8 лет назад
Prakash Rajendran is a legend. Thumbs up this comment if you came here from the private group on FB known as "IT UTS".
@aksahani26
@aksahani26 9 лет назад
:( very difficult 'Alice' and bob but very well explained thanks
@Multigameguy35
@Multigameguy35 9 лет назад
anand sahani I think this may help.www.khanacademy.org/computing/computer-science/cryptography/crypt/v/intro-to-cryptography
@the17kyd
@the17kyd 6 лет назад
Is this helping me crack the Z340 cipher?
@friscianviales7519
@friscianviales7519 6 лет назад
Hope you bought some bitcoin for yourself, it is really expensive in 2018. Thanks for the info btw
@skitflow5.046
@skitflow5.046 8 лет назад
does Alice use Bobs public key to encrypt the message? then wen she sends the message only bob that can decrypt it with his Private key?
@julianocamargo6674
@julianocamargo6674 7 лет назад
Alice creates a session key to encrypt the message, and she uses Bob's public key to encrypt this session key. Bob uses his private key to retrieve the session key. He now has the same session key that Alice used, as in symmetric cryptography. He uses this key to finally decrypt the message.
@cryptojeetu7599
@cryptojeetu7599 Год назад
Bitcoin was $154.20 when this video was published.
@Spudst3r
@Spudst3r 10 лет назад
If I use Bob's public key to encrypt a message to him, couldn't an adversary just apply Bob's public key to unlock it? How does Alice effectively obscure the message encrypted to bob with his public key, so that an adversary can't open it while Bob can?
@khan0000007
@khan0000007 10 лет назад
Ok I will try to explain. Bob has 2 keys, public and private. Public key can do encryption and is given to everyone. Private key can do decryption and is kept with bob only. So when alice wants to encrypt the message she uses bob's public. Even though eve can eavesdrop the message, she cannot decrypt it because she does not have the private key needed to decrypt it, only bob has that key. So only bob can decrypt alice's message because he has private key with him. Hope this makes you clear. Also remember when you go deeper into subject, you will come to know that these keys can be used alternatively, that is data encrypted with public key is decrypted using private key and that is data encrypted with private key is decrypted using public key.
@Spudst3r
@Spudst3r 10 лет назад
Yeah I understand it now. What I didn't understand, and I think is conceptually hard to figure out until you delve into the actual math of public key/private key encryption, is *how* the public key can have properties that make it only possible to be decoded by the private key. Namely, that a *public key* is a number that is a factor of two prime numbers, and that knowing *which two prime numbers* were used to generate this number is critical to figuring out the actual private key. Since it is very mathematically difficult to figure out which prime numbers were used if you only know the public key, encryption works.
@mboerrigter1
@mboerrigter1 10 лет назад
Spuds7er Bob will generate two keys based on some mathematical operation which is easy to apply in one direction but next to impossible in the other direction. For example, Bob can generate two very large prime numbers and compute the product of those two numbers (easy) but if Bob asks Alice to factor the two prime numbers giving Alice only the product she will need a very, very long time to figure it out. It's not quite impossible but the time involved would be prohibitive. Now, Bob could use this very large number to generate two keys, one public and one private. The public key will be sent to Alice and she can encrypt her message with it. Bob's private key is never disclosed to Alice and it is the only key that is able to decrypt the message. The relationship between the public key and the private key (only known to Bob) allows Bob, and only Bob, to decrypt the message. Of course, anybody can get Bob's public key so this particular scenario only ensures confidentiality and not non-repudiation since Alice can never prove that the message came from her (or not).
@jorgejr5876
@jorgejr5876 10 лет назад
***** How does one get the Private key? Is it sent through the first public message. Or is it given to the other party even before communication begins?
@OmriSama
@OmriSama 9 лет назад
Jorge jr I thought the idea was that no one gets the private key?
@gaabinubatrafinulifilit122
@gaabinubatrafinulifilit122 8 лет назад
Alice ? Who the fuck is Alice ?
@skateboards3571
@skateboards3571 8 лет назад
your wife, and she's cheating on you...
@coldfrostbyte5344
@coldfrostbyte5344 8 лет назад
Decode this if you can- PGZ1Y2s=
@chrisredmon5494
@chrisredmon5494 8 лет назад
Dark Moon I can see the house of black.
@almicc
@almicc 7 лет назад
Dark Moon it's a bad word :(
@antochess9749
@antochess9749 6 лет назад
prof can plz explain stegnogrphy
@kennethserrano2661
@kennethserrano2661 3 года назад
BSIT 3B HERE sana atin kung antndiyan
@karlreimers
@karlreimers 10 лет назад
Nice video- easy to follow and understand -devoid of some irritating foreign accent.
@williamm.9429
@williamm.9429 9 лет назад
RACIST
@karlreimers
@karlreimers 9 лет назад
Morg'n Freem'n Tea Party Man- get educated!
@carte0000blanche
@carte0000blanche 9 лет назад
Karl Reimers Super racist
@markmillenium438
@markmillenium438 2 года назад
GHCQ?
@dissaid
@dissaid 7 месяцев назад
😎😎😎
@atulshriwastva3595
@atulshriwastva3595 6 лет назад
where is the other video after this first ?
@malluk4127
@malluk4127 6 лет назад
Atul, check his channel... He has more videos listed...
@Sam_Hopkins
@Sam_Hopkins 8 лет назад
The drawings kinda look like the drawings from the book what if
@andyduly98
@andyduly98 9 лет назад
Hmm very helpful, but i still got a long way to go ;)
@13antawa85
@13antawa85 4 года назад
andyduly98 did you get anywhere?
@pinruihuang8463
@pinruihuang8463 2 года назад
Alice and Bob look like xkcd characters.
@robotslayer9690
@robotslayer9690 6 лет назад
Cool c o d e
@vaibhavahuja5849
@vaibhavahuja5849 7 лет назад
good
@poisonpotato1
@poisonpotato1 7 лет назад
I just want to solve the cryptoquotes in the paper
@adamwebster1652
@adamwebster1652 9 лет назад
If you give a man with an understanding of calculus/algebra 3 months to create his own cipher for mobile phone numbers what would be the best way to do it? Ciphering text is one thing but to be able to look down at your own mobile phone and in 10 seconds to be able to change a phone book full of 'jibberish' into something that will take a computer a few months to crack... What's the best method? As reward I will link you all to the best XKCD cartoon ever made(most of you will have read it already).
@schuegrafma
@schuegrafma 9 лет назад
The most secure way is the so called one-time pad. But its also the least practical.
@adamwebster1652
@adamwebster1652 9 лет назад
Adam Webster I came up with a vignere cipher. The 'one-time' pad is not something that given a short amount of time a (smart) person would be able to do fairly quickly in their head I think. I'm quick at this Vignere cipher now and it has only been two weeks and about four hours of practice. A mobile phone number is eleven numbers so by coming up with a 11 letter phrase I have been able to commit quickly to doing it but only on paper and I think in a year I will be able to do it without any real cognitive thinking. I think a Vignere is pretty badass and would delay a computer quite a long time. I don't mind even mentioning it here on youtube because without the key nobody can really have a crack at it. A dictionary attack proof type of vignere is nigh invincible I think? My pre-frontal cortex will always outperform a computers GPU huh!
@adamwebster1652
@adamwebster1652 9 лет назад
Adam Webster My favourite thing to do it use mnemonics to memorise number plates. I'm interested in joining the police force you see and anything like this I can do in my spare time not only proves useful but absolutely fascinating. What is it about the spy stuff that makes it so much fun? I always wanted to be James Bond as a kid but until now the only thing I've had in common with him is his ability with women... I have to work at the math! :)
@adamwebster1652
@adamwebster1652 9 лет назад
MdK xkcd.com/936/ YOUR REWARD! That was a fascinating read. Thank you!
@adamwebster1652
@adamwebster1652 9 лет назад
Adam Webster Click the link for your XKCD cartoon reward, here it is again: xkcd.com/936/
@tomfearnley2354
@tomfearnley2354 7 лет назад
"Hate" Wouldn't be bad in that context because he would assume she was joking....
@BrianFaure1
@BrianFaure1 7 лет назад
What if Bob doesn't have a sense of humor
@TooManyBrackets
@TooManyBrackets 6 лет назад
6:58 Oh no! He said GHCQ.....Goodness! Kinda grates the ear like if a security expert called the CIA the IAC :-O (The rest seems okay though)
@huntertony56
@huntertony56 10 лет назад
i dont understand can someone please make it simpler....
@XUndeadChampionX
@XUndeadChampionX 6 лет назад
surely you investd in bitcoin
@leonardadams2341
@leonardadams2341 5 лет назад
Okay so are these messages sent by email ?!?!?!
@GamingRading
@GamingRading 5 лет назад
this fuckin guy knew about bitcoin in 2013
@zoeazsss5035
@zoeazsss5035 6 лет назад
hey, boss, can u pay me in cryptocurrency so the govt wont know how much money I make
@HalfTelevision
@HalfTelevision 6 лет назад
i use a secret language, It Would Work Easier
@CrazyK64
@CrazyK64 2 года назад
But Bob is cheating on Eve and she's 2yrs behind the technology in passing love notes..now what
@dwrldgster3151
@dwrldgster3151 9 лет назад
siht devol I
@ShopperPlug
@ShopperPlug 3 года назад
I didn't learn anything...
Далее
1 - Cryptography Basics
15:23
Просмотров 14 тыс.
Secret Key Exchange (Diffie-Hellman) - Computerphile
8:40
Crypto 101
45:39
Просмотров 80 тыс.
Cryptography 101 for Java developers by Michel Schudel
42:59
Hashing Algorithms and Security - Computerphile
8:12
Cryptography 101 - Substitution Ciphers
11:12
Просмотров 129 тыс.
7 Cryptography Concepts EVERY Developer Should Know
11:55
Your Encryption Isn't Quantum Safe
9:22
Просмотров 23 тыс.
SHA: Secure Hashing Algorithm - Computerphile
10:21
Просмотров 1,2 млн
The Mathematics of Cryptography
13:03
Просмотров 396 тыс.