Тёмный

How does a stream cipher work? (AKIO TV) 

AKIO TV
Подписаться 22 тыс.
Просмотров 35 тыс.
50% 1

Опубликовано:

 

14 окт 2024

Поделиться:

Ссылка:

Скачать:

Готовим ссылку...

Добавить в:

Мой плейлист
Посмотреть позже
Комментарии : 68   
@anirvangoswami
@anirvangoswami 2 года назад
Cool old school kind of video. Took me back to the old days of youtube.
@mikailkurt5622
@mikailkurt5622 4 года назад
Great explanation and presentation skills! However, on minute 4.54 you explain why the OTP is unbreakable, but that's actually not the reason that One Time Pads are secure. The reason is that, even if you try ALL the possible keys, you still have no idea which key is actually the right one. So, even if you "found" the corresponding plain text, you won't know which one it is, so a brute force attack is useless.
@paroussis
@paroussis 3 года назад
Great explanation, very clear. a lot of other videos explaining this do not make it so obvious as to what it is and the pro's and cons
@purplethunder778
@purplethunder778 2 года назад
Never thought explaining how stream ciphers work would be so sexy !
@bephrem
@bephrem 3 года назад
The right accent for the right job
@canismajoris1253
@canismajoris1253 4 года назад
Thank you! Currently taking a 400 level crypto class in university and this helped a lot!
@magicstubs777
@magicstubs777 2 года назад
clutching me through my info sec exam
@kadi2318
@kadi2318 2 года назад
this was an amazing explanation on this. i have to learn this for my btec and was so lost. thank you sm
@mohammedzaid6634
@mohammedzaid6634 4 года назад
really really good explanation please if you can talk about major type of encryption algorithm in technical level like this
@Andrei-ds8qv
@Andrei-ds8qv 3 года назад
Very clear and calm explanation. thanks!
Год назад
That was awesome! Makes a cybersecurity student's life much easier :D
@tsunghan_yu
@tsunghan_yu 2 года назад
0:15 encryption in general 1:54 one-time pad 5:05 ★ How does a stream cipher work? 6:48 ★ Pros and cons of stream ciphers
@RM_1964
@RM_1964 5 лет назад
Amazing work bro..you explained it so simply. Keep the good work going
@AKIOTV
@AKIOTV 5 лет назад
Thank you!
@vitali1917
@vitali1917 3 года назад
Really useful and helpful video!!!Massive thank to the author
@mark0504
@mark0504 2 года назад
Very concise presentation. Thank you very much. You helped a ton!
@rissie4u
@rissie4u 4 года назад
This is awesome. Do you have one on block cyphers?
@JulianCesarTheGoat
@JulianCesarTheGoat 4 года назад
Explained it better than my professor, thanks m8
@kso35
@kso35 Год назад
This was incredibly helpful!! Thank you!!
@lootnation6276
@lootnation6276 4 года назад
really good explaination
@shehanreshin
@shehanreshin 2 года назад
Great Explanation. Thank You!!
@sp3ct3r71
@sp3ct3r71 Год назад
wooow crystal clear videos
@stiii6325
@stiii6325 3 года назад
my english is not so good but i understood you very well it was amazing thanks
@weslaycock466
@weslaycock466 3 года назад
Great video
@anansipotpourri
@anansipotpourri 2 года назад
really good explanation , thank you very much
@sarainiaangelsong440
@sarainiaangelsong440 2 года назад
If you wanna be really cheeky, you can make the 1st 2 Bits and the Last 2 Bits of the entire message map to a "Daily" Word! Then One Time Pad all of it in between then chuck either The 1st 2 to the very end or the Last 2 to the beginning, then if it is divisible by example 3 or 4 or 5 then divide the entire encrypted message by that and do a Transposition cipher and join it all back up again xD. Just use a computer program to handle it and it will be fine sure it's an extra step or 2 but it's worth the data to be slightly more secure than what it currently is, if no Transposition then at very minimum Vigenère Cipher it xD. :)
@Alfredfreezy3
@Alfredfreezy3 3 года назад
Awesome explanation
@thugerrish
@thugerrish 2 года назад
You had me at duct tape
@honeydiana9128
@honeydiana9128 2 года назад
Very clearly explained. Thank you
@sergiopereira5627
@sergiopereira5627 3 года назад
awesome, you better than my college teacher
@bently93
@bently93 3 года назад
I did not understand the disadvantages part, specifically that of discovering the key. I imagine the problem is discovering the original message, as we encrypt it to make sure that even if they intercept they cannot read. So why is the problem finding the key, we can already create others, so I see no problem. (sorry if there are errors I used google translator).
@AKIOTV
@AKIOTV 3 года назад
Let's say I intercepted some communications between you and some other party. I then have the ciphertext. If I then somehow get hold of the plain text (perhaps I somehow stole it from the other party) I can easily derive the key. If you don't know that I obtained the key and keep using it, I can now read all the traffic. Or what if I saved up loads of ciphertext for months, and then when I finally get the key decrypt it all in one go?
@bently93
@bently93 3 года назад
@@AKIOTV Now i understand! Thank you very much Akio!
@mattvatterott2765
@mattvatterott2765 2 года назад
Shouldn't this explain something about the key? How does the key get passed?
@rxipland
@rxipland 2 года назад
thx
@dboutdoors3795
@dboutdoors3795 5 лет назад
Well done.....cheers...keep it going...
@dennismak6062
@dennismak6062 3 года назад
Very clear and well explained. Big thanks! Good work!
@usmanabbas7
@usmanabbas7 5 лет назад
Thanks mate (y) you really know your stuff :)
@yuan6780
@yuan6780 4 года назад
Bro, you are amazing. Super clear explanation. I love it, really comfortable to listen.
@haifaqht7152
@haifaqht7152 4 года назад
extremely helpful vid many thnx
@sajay96
@sajay96 4 года назад
excellent pronunciation
@sumaiyahaseeb533
@sumaiyahaseeb533 4 года назад
A good and detailed explanation
@bielaltimiratarter9194
@bielaltimiratarter9194 4 года назад
Amazing video! Concise and very well explained, congratulations :D
@splintcell101
@splintcell101 5 лет назад
Really helpful , thank you
@hamdanali1755
@hamdanali1755 4 года назад
ur great man!
@ne01337
@ne01337 3 года назад
Thanks! helped a lot
@laurentbajrami3688
@laurentbajrami3688 4 года назад
Great video, thanks mate!
@aethrya
@aethrya Год назад
Holy shit your voice dawg
@lachuna
@lachuna 5 лет назад
Very well explained, thank you!
@waqarshaikh5984
@waqarshaikh5984 5 лет назад
Very less view on a really good video
@cgeopapa
@cgeopapa 4 года назад
I only wish I could give this video more than just one like
@ben9262
@ben9262 Год назад
bro I thought your voice was edited over lol
@zoro309
@zoro309 3 года назад
Great video 👍👍 I am also working on Stream ciphers , does anyone have a C program of plantlet stream cipher . It would help me a lot.
@noaverner
@noaverner 3 года назад
אש
@FreakingRockstar101
@FreakingRockstar101 4 года назад
A microphone duct taped to some scrap wood...interesting
@AKIOTV
@AKIOTV 4 года назад
At this point I may as well get a proper mic stand but I got too attached to my scrap wood :)
@FreakingRockstar101
@FreakingRockstar101 4 года назад
@@AKIOTV haha I like it, its very contrasting to the topic of computer security and the high quality mic you have taped to it. lol
@AyushMo
@AyushMo 2 года назад
haha, agree, love it so much!
@maiezbenromdhane8233
@maiezbenromdhane8233 Год назад
great explanation thank you
@JpostBryx
@JpostBryx 5 лет назад
Cheers
@oisinmcmanus5827
@oisinmcmanus5827 5 лет назад
great thanks
@zeusj5985
@zeusj5985 5 лет назад
good video thx!!!
@joshmadakor3012
@joshmadakor3012 2 года назад
Thank you my n
@A1748-n9o
@A1748-n9o 4 года назад
TRY TO SAY ''DAITA,DAYTA AND THEN DATA AND TELL ME WHAT'S THE DIFFERENCE WHEN YOU HEAR IT XD"
@NoName-ui5ou
@NoName-ui5ou 4 года назад
that was awesome!
@frankkevy
@frankkevy 3 года назад
The person who disliked is a villain
@enemyofthethrone
@enemyofthethrone Год назад
Ok but how do we decrypt page 54 and 55, smarty-pants?
Далее
Securing Stream Ciphers (HMAC) - Computerphile
9:24
Просмотров 308 тыс.
AES: How to Design Secure Encryption
15:37
Просмотров 165 тыс.
Outsmarted 😂
00:20
Просмотров 2 млн
КТО БОИТСЯ КЛОУНОВ?? #shorts
00:20
Просмотров 521 тыс.
WHICH SODA CAN FLY THE HIGHEST?
00:48
Просмотров 9 млн
Public Key Cryptography: RSA Encryption Algorithm
16:31
Encrypting with Block Ciphers
21:42
Просмотров 36 тыс.
How does a USB keyboard work?
34:15
Просмотров 3,2 млн
Tech Talk: What is Public Key Infrastructure (PKI)?
9:22
The ULTIMATE One Time Pad Tutorial
14:11
Просмотров 16 тыс.
Modes of Operation - Computerphile
14:16
Просмотров 223 тыс.
Cracking Enigma in 2021 - Computerphile
21:20
Просмотров 2,5 млн
How the Best Hackers Learn Their Craft
42:46
Просмотров 2,6 млн