Тёмный

Cryptography 101 - - XOR Cipher 

Charles Laing
Подписаться 466
Просмотров 48 тыс.
50% 1

Опубликовано:

 

14 окт 2024

Поделиться:

Ссылка:

Скачать:

Готовим ссылку...

Добавить в:

Мой плейлист
Посмотреть позже
Комментарии : 88   
@AdityaPraveenkumar
@AdityaPraveenkumar 7 лет назад
You're literally the only one on youtube who could clearly teach this to me...Thanks a lot man!!!
@andryush333
@andryush333 4 года назад
100% Agree
@JulianCesarTheGoat
@JulianCesarTheGoat 4 года назад
i'm paying thousands of dollars to go to school only for me to come to RU-vid and get a clear 5 minute explanation on something I've been struggling to understand for days.
@MartianMoon
@MartianMoon 5 лет назад
finally a clear explanation of this thank you so much
@3a1Va1
@3a1Va1 4 года назад
You have done what pages of my "dry outdated yet assigned" cryptography book couldn't. Thank you.
@HardlySpent
@HardlySpent Год назад
Fantastic video. Thank you for explaining this in a way that instantly clicked. Cheers!
@Augestein
@Augestein 4 года назад
Shame that you don't do more videos. I'd have definitely subscribed to you if you had more videos. I feel like this is, without a doubt, one of the best explanations I've seen of an XOR Cipher.
@CharlesLaing
@CharlesLaing 4 года назад
Thanks, life always gets in the way
@Augestein
@Augestein 4 года назад
@@CharlesLaing I can definitely understand that. Take care of yourself.
@endunry2
@endunry2 4 года назад
I stucked at the Overthewire Natas CTF, and i want to know what XOR-Encryption is. You made this so clearly.. Thank you!!
@raise7935
@raise7935 6 лет назад
Nicely Explained
@jmacsss
@jmacsss 5 лет назад
Thank you! Finally a clear, easy to follow explanation of XOR
@mercuryliu5673
@mercuryliu5673 3 года назад
Thank you so much! I was doing a school project on data encryption and this video helps me a lot in explaining things to my professor.
@jherrera9751
@jherrera9751 4 года назад
Nicely done my man, very easy to follow and you didn't go over the top with diagrams. Keep it up!
@Jess-mj2jj
@Jess-mj2jj 3 года назад
This is the best explanation I’ve seen. Thank you 🙏🏾
@calebsykes7889
@calebsykes7889 5 лет назад
you've explained what no one else on the internet could, i would bake you a cake
@CharlesLaing
@CharlesLaing 5 лет назад
What kind of cake?
@calebsykes7889
@calebsykes7889 5 лет назад
@@CharlesLaing red velvets really nice, whatever is easiest i spose
@Rickety3263
@Rickety3263 4 года назад
omg! thank you for actually explaining this. thank youuuu
@weallfallprey
@weallfallprey 4 года назад
Thank you for explaining this!! Other XOR videos just confused me.
@ghazanfarsheikh44
@ghazanfarsheikh44 Год назад
This was actually very helpful video, God bless you
@CharlesLaing
@CharlesLaing Год назад
Glad it was helpful!
@DiegoSilvaD1
@DiegoSilvaD1 5 лет назад
Thank you very much! The best explanation I found! Keep it up!
@fedemolto
@fedemolto 4 года назад
Very lucid explanation, thanks!
@KLEY_
@KLEY_ 19 дней назад
quick and very nice explain thx
@helloworld8583
@helloworld8583 4 года назад
I am struggling a lot with finding explaining of xor-based hash function. But, i really like your video anyway!
@v.s.s.k6667
@v.s.s.k6667 7 лет назад
Lovely much appreciate continue the good work
@vanguardsolution4160
@vanguardsolution4160 4 года назад
Thanks for making this very easy to understand.
@baukeverbeek6306
@baukeverbeek6306 2 года назад
Dude you are my hero 🦸‍♂️ I hope if you read this you are having a great day
@CharlesLaing
@CharlesLaing 2 года назад
Thanks man. I appreciate it.
@sofiarodrigues96
@sofiarodrigues96 4 года назад
Very good at teaching this cipher. Thank you!
@djbroake9810
@djbroake9810 2 года назад
awesome thank you for a perfect example with why/how.
@mceucalyptuzkz
@mceucalyptuzkz Год назад
Good video! Makes a lot more sense now.
@CharlesLaing
@CharlesLaing Год назад
Glad it helped!
@abrahr2420
@abrahr2420 2 года назад
Fantastic explanation! Thanks!
@guyscoped
@guyscoped Год назад
Amazing Video
@wyf251
@wyf251 Месяц назад
Thank you!
@xx_xx_xx_xx3352
@xx_xx_xx_xx3352 5 лет назад
Best explanation. Extremely good video!! nice
@PatrickLyell
@PatrickLyell 4 года назад
This was excellent
@triciaopoku7400
@triciaopoku7400 6 лет назад
How do you recover a message? The Vernam encrypting messages using encryption key MOREM. The ciphertexts are C1=MAOEE and C2=RTITR which are obtained by Vernam encrypting messages M1 and M2. The encryption messages are two names. m1,1= R and m2,4=T. Please assit - I am trying to understanding how to recoverthe messages.
@maverick74240
@maverick74240 2 года назад
good explanation
@paradox1516
@paradox1516 2 года назад
Thank you so so so much!!!
@onsjoost5746
@onsjoost5746 2 года назад
thank you so much
@digbic8375
@digbic8375 Год назад
thanks for cutting the bullshit. Learning about this in my master. Video broke it down so easily
@bigsluggy
@bigsluggy 2 года назад
At 04:40 you begin showing how you can get the key by xor'ing the before and after but I'm confused as to why this matters? To get c from é surely you would need to know the key anyway? Otherwise how would you know c was the correct result?
@bigsluggy
@bigsluggy 2 года назад
Actually now I think about it a bit more, although I don't have any cryptography knowledge so I'm probably wrong... I guess if you were trying to crack an encrypted string and you were able to identify like 2 or 3 digit words like "to" for example you could xor "to" with what you thought might be to and use the result to xor the rest of the string to see if it makes sense?
@BytesAndBros
@BytesAndBros 2 года назад
Thank you
@RohitKumar-xl3hk
@RohitKumar-xl3hk 3 года назад
So XOR gives 0 if both digits are the same?
@triciaopoku7400
@triciaopoku7400 6 лет назад
Question - Not clear on how you find the correesponding encryption key. For example 'Mario' and it is at bit level - M=011, A=000, R=101, I=010 and O=100. The ciphertext is 'AOAMV'. How do you find the key using the XOR function?
@CharlesLaing
@CharlesLaing 6 лет назад
So what you need to do is take that cipher text - "AOAMV" and the word "MARIO", convert them both into their bit sequences, then XOR the two together. The result will give you they key that you originally encyphered MARIO with.
@slazerlombardi
@slazerlombardi 5 лет назад
@@CharlesLaing tutte is that you?
@KodakYarr
@KodakYarr 4 года назад
@@CharlesLaing This assumed you actually know what the message is though. If you don't know either message but know that two messages uses the same key, how would you find the key when a second message reuses the same key?
@CharlesLaing
@CharlesLaing 4 года назад
@@KodakYarr I've got this question a lot. Maybe I'll do a video on it .
@lordoffatcats
@lordoffatcats 2 года назад
Thanks man
@fedoraguy7781
@fedoraguy7781 3 года назад
Thanks!
@Bera_kergitli
@Bera_kergitli 4 месяца назад
RESPECT
@nic0latesla333
@nic0latesla333 6 лет назад
great.. Thanks
@Sammy-uk7pr
@Sammy-uk7pr Год назад
best video
@regnas7868
@regnas7868 5 лет назад
Thanks a million!!
@DarkPsychoNet
@DarkPsychoNet 4 месяца назад
👏
@Anarchia02
@Anarchia02 5 лет назад
How to find out what is the key? That's what's missing. I would want to know ^^
@Augestein
@Augestein 4 года назад
This is a bit late to the party, but just so if anyone else comes here wondering the same thing, I'll answer it. The reason you'd be able to find out the key, is if you knew it was an XOR Cypher. IE, using say, "c" like he had before: 01000011 - c 11101001 - é if you have the original message , and then you see the encrypted message, you can figure it out if it was only an XOR Cipher. Let's say that you were given a message that was properly decrypted with the key because you were allowed. Then all you'd have to do from there, is try to open up the message intentionally WITHOUT the key so you'd receive the encrypted message. From there, you'd be able to figure out the cipher key because of how the algorithm works. IE, there are 4 scenarios that appear with an XOR Cipher 0 ^ 0 = 0 1 ^ 1 = 0 0 ^ 1 = 1 1 & 0 = 1 since we have both letters for the encrypted and the decrypted, it stands to reason that the key is what you find between them for making c decrypted to become é in the first place if every letter converts with the same pattern. That's why XOR Cipher isn't safe to use on its own. Regardless of that, even if you didn't have the decrypted message, you can still guess potential letters / characters based on the above scenarios. Example, if we end with é, we can guess things about the key for every "0" in the encrypted letter, we know that the key and the non-encrypted letter are the same. This allows us to map out potential relationships between the key and the unknown original letter. It's a heck of a lot simpler to translate these scenarios than something like: 2asp,~9034=: for instance.
@ahmidahmid9303
@ahmidahmid9303 6 лет назад
Goog job bro
@evilleons3400
@evilleons3400 4 года назад
DLE GS DC4 DC4 ETB key- Alone I am 24th, with a friend I am 20, another friend and I am unclean. what am I?
@inx1819
@inx1819 4 года назад
I sat down and tried it, my result doesn't make much sense. The result is "(2 W" The space isn't a space it's a character called Start Of Heading which doesn't have a printable form The answer to the riddle is the letter x
@evilleons3400
@evilleons3400 4 года назад
@@inx1819 sorry about this, I'm a noob at this, i probably did something wrong.
@youlov7139
@youlov7139 5 лет назад
Thank you so much but can explain about 3D
@killcap849
@killcap849 6 лет назад
so how do you get the awnser if you don't know the key?
@maximalgamingnl9954
@maximalgamingnl9954 6 лет назад
kill cap well, you might find one file that is encrypted (or a part of it) that you do know while it is not encrypted, with just the length of the key worth of (sequential) encrypted file data, you can recreate the key
@maximalgamingnl9954
@maximalgamingnl9954 6 лет назад
that's why we create a random key, and encrypt that with another key obtained from the password and store the encrypted key in the file somewhere and decrypt it first, and use it to decrypt the actual data with. Sine you only encrypted the key with your actual password, there are much less ways to now get this random key, without the password
@maximalgamingnl9954
@maximalgamingnl9954 6 лет назад
wait that last part is not true, but we can fix this by encrypting the data with the first key, then with the second key.
@maximalgamingnl9954
@maximalgamingnl9954 6 лет назад
the second key being the random one
@maximalgamingnl9954
@maximalgamingnl9954 6 лет назад
i just figured out file encryption
@RonanClancy
@RonanClancy 6 лет назад
Class :)
@esquosi6621
@esquosi6621 3 года назад
fuck yes
@willa3769
@willa3769 6 лет назад
My head has a headache. 0010110**turndownscreenbrightness**010111
@kalkvand
@kalkvand 6 лет назад
I understand this, but how would you decrypt this? imgur.com/a/vUDXN38
@nitusingh3927
@nitusingh3927 2 года назад
Who is learning this for games?
@mar_kha
@mar_kha Год назад
4:00 zero, zero, zero...
@mar_kha
@mar_kha Год назад
Sounds like a blaster 🔫
@sirprancealott2003
@sirprancealott2003 Год назад
Nice one
@ziro7616
@ziro7616 3 года назад
Thank you
Далее
Symmetric Key Cryptography: The XOR Cipher
7:46
Просмотров 36 тыс.
The power of XOR - Gary Explains
5:55
Просмотров 22 тыс.
Cool Parenting Gadget Against Mosquitos! 🦟👶
00:21
Feistel Cipher - Computerphile
7:31
Просмотров 247 тыс.
XOR Cipher in Python - Simple Cryptography
10:09
Просмотров 3,2 тыс.
Secret Sharing Explained Visually
7:57
Просмотров 52 тыс.
7 Cryptography Concepts EVERY Developer Should Know
11:55
The Science of Codes: An Intro to Cryptography
8:21
Просмотров 1,1 млн
Modes of Operation - Computerphile
14:16
Просмотров 223 тыс.
Cryptography 101 - - ADFGVX
5:57
Просмотров 13 тыс.
The Power of XOR in Cryptography
5:24
Просмотров 852
SHA: Secure Hashing Algorithm - Computerphile
10:21
Просмотров 1,2 млн