Тёмный

How Encryption Keeps Your Data Safe 

SciShow
Подписаться 8 млн
Просмотров 107 тыс.
50% 1

Start protecting yourself on the web at NordVPN.com/SCISHOW or use code SCISHOW to save 75% off of a 3-year Virtual Private Network plan, plus 1 month free.
Keeping our data safe and secure is necessary in today's world, but a lot of the encryption we depend on has been in development for thousands of years!
Hosted by: Stefan Chin
Head to scishowfinds.com/ for hand selected artifacts of the universe!
----------
Support SciShow by becoming a patron on Patreon: / scishow
----------
Dooblydoo thanks go to the following Patreon supporters: Lazarus G, Sam Lutfi, D.A. Noe, الخليفي سلطان, Piya Shedden, KatieMarie Magnone, Scott Satovsky Jr, Charles Southerland, Patrick D. Ashmore, charles george, Kevin Bealer, Chris Peters
----------
Looking for SciShow elsewhere on the internet?
Facebook: / scishow
Twitter: / scishow
Tumblr: / scishow
Instagram: / thescishow
----------
Sources:
book.itep.ru/depository/crypto...
www.sans.org/reading-room/whi...
cryptogramma.com/cryptogramma/...
books.google.com/books?id=Zb2...
www.britannica.com/topic/tran...
books.google.com/books?id=o3Y...
penelope.uchicago.edu/Thayer/E...
www.coursera.org/lecture/symm...
www.moserware.com/2009/09/stic...
• DES Confusion And Diff...
dl.acm.org/citation.cfm?id=18...
www.networkdls.com/Articles/tr...
ftp://ftp.rsasecurity.com/pub/pdfs/tr701.pdf
link.springer.com/content/pdf...
cacr.uwaterloo.ca/hac/about/ch...
• Public key cryptograph...
• Public Key Cryptograph...
www.digicert.com/TimeTravel/m...

Опубликовано:

 

31 июл 2024

Поделиться:

Ссылка:

Скачать:

Готовим ссылку...

Добавить в:

Мой плейлист
Посмотреть позже
Комментарии : 223   
@blueblazeing94
@blueblazeing94 5 лет назад
Nice shirt, see someone is a fan of Engineering Explained.
@J4rj4r81nx
@J4rj4r81nx 5 лет назад
I'll have to check those guys out. But Hank was also wearing a Kurzgesagt shirt recently. Maybe they're just doing some subtle shoutouts to related channels?
@baltakatei
@baltakatei 5 лет назад
A minigame I like to play is to guess when the commercial starts. Sometimes they get sneaky and insert it in the middle. Sometimes at the start. Usually at the end.
@just-a-silly-goofy-guy
@just-a-silly-goofy-guy 5 лет назад
Of course it’s sponsored by a security company lol
@PikaQPika
@PikaQPika 5 лет назад
Is a data security video meant to be sponsored by Walmart? Am i missing some sort of logic here? Lol
@BartJBols
@BartJBols 5 лет назад
@@PikaQPika It means the video is biassed.
@blakestone75
@blakestone75 5 лет назад
Lol biased. Hardly. All he did was explain a little bit about the history of cryptography. Nord VPN probably just sees value in educating the masses on this subject. It’s not like video went out of its way to say “and Nord VPN does crypto better than anyone else”... that would be bias.
@Grosvenor77
@Grosvenor77 5 лет назад
@@BartJBols There was no bias at all in this video. how do you figure?
@BartJBols
@BartJBols 5 лет назад
@@Grosvenor77 how could we ever know lol.
@poppasmurf4115
@poppasmurf4115 5 лет назад
i still believe that pig latin is the most secure cipher ever devised.
@jarencascino7604
@jarencascino7604 5 лет назад
Why didn’t u write this in pig latin
@poppasmurf4115
@poppasmurf4115 5 лет назад
@@jarencascino7604 i was afraid that younger viewers might not know what pig latin was (i'm 62). utbay uryay ightray, i ouldshay avehay.
@jarencascino7604
@jarencascino7604 5 лет назад
Makes sense but I’ll tell you this Im 17 and I know what pig Latin is. It is still a language in elementary school! I remember we used to argue whether it’s the first letter or the first sound. Like “the” would be hetay or ethay.
@keriezy
@keriezy 5 лет назад
I created a cypher in high school... I have it somewhere. I have to say it was good. It included many symbols for the same letter, but not the same amount of symbols for each letter. "E" for example had six options and "Z" had two options. Some symbols were letters, others were pictograms, and a few were just basic circles filled in in different ways.
@KwynM
@KwynM 5 лет назад
Can't wait for the public and private key episode!
@undead890
@undead890 5 лет назад
Right?
@jaredpotter1
@jaredpotter1 5 лет назад
This is a great video. I'm looking forward to the next one on secure key distribution!
@Babarudra
@Babarudra 5 лет назад
This was very interesting, but my eyes started to glaze over.
@celtgunn9775
@celtgunn9775 5 лет назад
Me too... just bleh.
@RangerRuby
@RangerRuby 5 лет назад
I love SciShow videos that explain big words I don't know!
@metanumia
@metanumia 5 лет назад
The beauty of learning! And now you know what they mean! Glad you're enthusiastic about acquiring new knowledge! Every human on Earth should be! :)
@Farreach
@Farreach 5 лет назад
i love these computer science related video's ... currently going over hashing in my data structure class
@gregoryfenn1462
@gregoryfenn1462 5 лет назад
hashing in data structures often means something very different to hashing in cryptography, The former is used in Java and other languages to create a quick dictionary-mapping from keys to values, and these hash tables are built to be user-friendly and programmer-friendly. Often a computer could take a pretty good guess as a key associated with some value. Cryptographic hash functions. on the other hand, are designed to be secure: so that the output of the hash (the 'value') is so different from the input ('key') that no known computer (or computer predicted to exist for at least a decade or two) could feasibly make an above 0.01%-likely guess as to the input associated with a given output, even if allowed to keep testing guesses and computing maths behind the scenes for a thousand years.
@jerry3790
@jerry3790 5 лет назад
That new Tux is scary as hell. Would’ve made a good Halloween costume.
@Zeldaschampion
@Zeldaschampion 5 лет назад
0:30 Lol. I actually just finished that quest in AC odyssey a couple of hours ago.
@necrisro
@necrisro 5 лет назад
Same, and wondered what the heck was special about a stick, but didn't google it. Thanks SciShow !
@asphaltpilgrim
@asphaltpilgrim 5 лет назад
You guys are really reaching for a halloeen special this year ;)
@klumaverik
@klumaverik 5 лет назад
Lol stefan eats the edamame. Why did that make me heehee?
@JosephDavies
@JosephDavies 5 лет назад
Great topic. You should try to do one building on this video, explaining why backdoors to encryption are being sought by law enforcement, and how it's not possible to do while still having reliable and secure encryption. People are woefully under-informed on this subject, and it's increasingly becoming a crucial issue (at least here in the USA) that voters need to be aware of.
@monkeyplayer1
@monkeyplayer1 5 лет назад
Engineering Explained!
@FusionDeveloper
@FusionDeveloper 5 лет назад
I absolutely LOVE videos about Encryption. I hope to make my own online chat (some day) that uses a unique form of encryption that I come up with. Alternating Transposition and Substitution sounds just like what I would use. All the bit flipping stuff is out of my league.
@64standardtrickyness
@64standardtrickyness 5 лет назад
Basically the key is it is possible to create easy/ fast encryption methods such that the decryption method is hard/slow to find (see diffie helman Euler totient theorem)
@wikilcontainments
@wikilcontainments 5 лет назад
One time pads were used in WW2. And still are considered one of the best encryption methods. Unbreakable for short messages with no key.
@rogerhinman5427
@rogerhinman5427 5 лет назад
Love the Engineering Explained shirt.
@e4r281
@e4r281 5 лет назад
Wait, where are Alice and Bob ?
@Neumah
@Neumah 5 лет назад
Asking the real questions. Did Mallory get them?
@moosemaimer
@moosemaimer 5 лет назад
@@Neumah Eve did
@ViralonEarth
@ViralonEarth 5 лет назад
Top 10 ringtone of 2018 Link:- ru-vid.com/video/%D0%B2%D0%B8%D0%B4%D0%B5%D0%BE-WJCB84IBuYE.html Watch it & please do Subscribe & share if you like it. Have a Great Day :-)
@alexandren.9346
@alexandren.9346 5 лет назад
You mean Dolfh and Ere, right? ;D
@aidanwansbrough7495
@aidanwansbrough7495 5 лет назад
Really interesting!
@Furiends
@Furiends 5 лет назад
NIST which is pronounced as one word also created Data Encryption Standard as effectively an early open standard where the public gave input on how the system worked. This is significant for two reasons. One is it was the government that was responsible for the modern concept of open standards and also because public research was responsible for the development of data encryption, the Internet and computers.
@ewoodley82
@ewoodley82 5 лет назад
For those who are curious about those key exchanges, look into PKI, or Public Key Infrastructure
@allertonoff4
@allertonoff4 5 лет назад
i might have to Re:listen to this MUSIC a couple of times.
@alexandren.9346
@alexandren.9346 5 лет назад
The best encryption method is still some kind of prime factorisation, since the primes involved are impossible to guess without the key. And: You don't even need to share the key! There are also ways to use a public encryption that is impossible to decrypt unless you have your own public key (prime numbers involved;) So the Cesar Cipher was just the beginning....
@Hawkenshmire
@Hawkenshmire 5 лет назад
That shirt looks cool
@Master_Therion
@Master_Therion 5 лет назад
It's Halloween, so I have the movie Ghostbusters on my mind: "I am the Encryption Key Master." "I am the Security Gate Keeper."
@rake4290
@rake4290 5 лет назад
I see your point, but you should never cross streams. Feel free to retort and take me down a peg. I don't want my ego to stay puffed.
@metanumia
@metanumia 5 лет назад
@Master Therion Happy Halloween! I've missed your witty comments, so have Alice and Bob, but my friends Whitfield and Martin have yet to discover the keys to your humor! I will have to show them, but they only communicate with me after I cook them a nice breakfast of salted hash and coffee. ;)
@yurymol
@yurymol 5 лет назад
It’d be great if you told how does SSL work. It’s really exciting what prime numbers can do.
@jangambler9998
@jangambler9998 5 лет назад
I'm guessing the other stuff is about Quantum Cryptography? I am seriously amazed by how useful inherent randomness is.
@meowzerus
@meowzerus 5 лет назад
Fun facts: Encryption algorithms are treated as munitions, and you can't export software with them outside the US. If you want to exchange keys with someone, you should check out how Diffie-Hellman key exchange happens! There are plenty of explanations that don't involve any math.
@roguedogx
@roguedogx 5 лет назад
Nice shirt.
@vistastructions
@vistastructions 5 лет назад
Engineering Explained shirt!!! Jason you're famous!!!
@JeremyWS
@JeremyWS 5 лет назад
Decode this: [key, sentence is translated to French and then written backwards] laineg ertê'd zeibou'N unetnoc not emai'J. lainég tse lanac eC
@undead890
@undead890 5 лет назад
This is what I got: This channel is great. I love your content Do not be awesome
@JeremyWS
@JeremyWS 5 лет назад
It's suppose to be: This channel is great. I love your content. Don't forget to be awesome.
@undead890
@undead890 5 лет назад
@@JeremyWSThat makes more sense :)
@pikminlord343
@pikminlord343 3 года назад
This was an interesting video
@scheimong
@scheimong 5 лет назад
I'm interested in seeing how SciShow will manage to explain modular arithmetics and finding multiplicative inverses in a 10 minute video...
@esecallum
@esecallum 5 лет назад
frequency analysis is easily defeted by using multiple numbers to substitute for the same letter.
@calamusgladiofortior2814
@calamusgladiofortior2814 5 лет назад
To crack the Spartan's code, just look for the frequently-occuring, 12-letter phrase.... ..."This is SPARTA!"
@arturbaleja3907
@arturbaleja3907 5 лет назад
Alan touring did not crack the enigma. Enigma was in fact decyphered in Poland before the war. They even build a decoding computer based on 3 examples of the civilian version of enigma (there was such thing. Germans just adopted and modified a device designed for bank security). Then after September of 1939, the team that did it, moved with the hardware to France and later England, where English simply decided thet, with the code cracked, they don't need them anymore. What Touring team was doing was mass scale decoding. They run the procedures discovered in Poland on thousends of radio messages every day and transfering the data to the inteligence. This team was cranking numbers, not cracking the code.
@scottc.4234
@scottc.4234 5 лет назад
I like the engineering explained shirt.
@medokn99
@medokn99 5 лет назад
Engineering Explained! (the shirt)
@Vladimir-et2kq
@Vladimir-et2kq 5 лет назад
can you do fresh cut grass smell?? or why when cut the grass and keep it I'm a bag it smells so foul after a day or two
@Vladimir-et2kq
@Vladimir-et2kq 5 лет назад
@cypress cat plants curl up when touched? I honestly didnt know that. amd thanks :)
@mauriciofuentes7638
@mauriciofuentes7638 5 лет назад
Where is Muscle Hank?
@gamereditor59ner22
@gamereditor59ner22 5 лет назад
I may use this method if there's a software to create a encryption code.
@bgroks1
@bgroks1 5 лет назад
information to learn Don’t recommend implementing your own custom code if you’re programming. Look into veracrypt.
@tuseroni6085
@tuseroni6085 5 лет назад
the matter of sharing the key is part of why DRM will never work. the key to decrypt the content is given to the user, it has to be or they can't view the content, the whole thing is based on trying to keep this fact hidden from the user. the key is hidden somewhere so the program running it can use the key but that the user won't be able to just use the key themselves. it never works for very long (many companies feel so long as it can be hidden for a little while it's worth it, but still say they need copyright protection for up to 170 years or what's the point in making anything.)
@inademv
@inademv 5 лет назад
i feel like this whole video was a long commercial for NordVPN...
@someoneelse8494
@someoneelse8494 5 лет назад
Good episode, but I´ve missed the asymmetric encryption based on prime numbers!
@eruyommo
@eruyommo 5 лет назад
9:10 Magical hair cut
@bikespj22
@bikespj22 5 лет назад
What cypher is this?
@grrttr
@grrttr 5 лет назад
why is muscleHank never shown=?
@mikopiko
@mikopiko 5 лет назад
10:03 minutes exactly, keep that in mind folks!
@Merennulli
@Merennulli Год назад
Would be interesting to see how a WWII cryptographer would approach modern encrypted data. We are currently at a point where 20 characters decrypted by brute force with the best supercomputer will take longer than the Earth has left to live so they wouldn't be able to touch it computationally, but they might try some interesting approaches. I still struggle to understand how they prevent public key interception. A security expert tried to explain it to me once but eventually gave up.
@kinomora-gaming
@kinomora-gaming 5 лет назад
I think we can all thank the ancient Greeks for allow us to safely order our favorite snacks online. [cc]
@cryptosporidium1375
@cryptosporidium1375 5 лет назад
Make a crash course IT series please.
@malasoat1
@malasoat1 5 лет назад
Cryptosporidium 137 there's crash course computer science which goes pretty in depth
@Singular121
@Singular121 5 лет назад
I would never be good in coding after watching this.
@k0vert
@k0vert 5 лет назад
Scytale dytale damn good stuff
@Unplanted
@Unplanted 5 лет назад
Hey cool, I already use NordVPN. Makes me feel better about it :)
@SaucerJess
@SaucerJess 5 лет назад
💙
@strangederekredux
@strangederekredux 5 лет назад
Really surprised there was no mention of RSA.
@Markovisch
@Markovisch 5 лет назад
How come? This was all about Symmetric Key Cryptography, while RSA falls under Public Key Cryptography.
@ChenfengBao
@ChenfengBao 5 лет назад
He said they'll make another video on how to securely exchanging secrets, where RSA is primarily used.
@meghanparris8203
@meghanparris8203 5 лет назад
That haircut at the end.... lol
@thesteadfastduelist6258
@thesteadfastduelist6258 5 лет назад
*What about Bill Cipher?*
@metanumia
@metanumia 5 лет назад
LOL at this great reference! I was so impressed by the complexity of that subplot! :)
@hunteur
@hunteur 4 года назад
stefan is adorable!
@LordZozzy
@LordZozzy 5 лет назад
7:38 I'd just like to interject for a moment. What you're referring to as Linux, is in fact, GNU/Linux, or as I've recently taken to calling it, GNU plus Linux. Linux is not an operating system unto itself, but rather another free component of a fully functioning GNU system made useful by the GNU corelibs, shell utilities and vital system components comprising a full OS as defined by POSIX. Many computer users run a modified version of the GNU system every day, without realizing it. Through a peculiar turn of events, the version of GNU which is widely used today is often called “Linux,” and many of its users are not aware that it is basically the GNU system, developed by the GNU Project. There really is a Linux, and these people are using it, but it is just a part of the system they use. Linux is the kernel: the program in the system that allocates the machine's resources to the other programs that you run. The kernel is an essential part of an operating system, but useless by itself; it can only function in the context of a complete operating system. Linux is normally used in combination with the GNU operating system: the whole system is basically GNU with Linux added, or GNU/Linux. All the so-called “Linux” distributions are really distributions of GNU/Linux.
@LordZozzy
@LordZozzy 5 лет назад
That feeling when the sole reaction to a correction under a SCIENTIFIC video is "get a life"... F-ing priceless.
@LordZozzy
@LordZozzy 5 лет назад
Wow, mimicking - what's next, name-calling? >Not important Are you this meticulous in your work, too? Also, correcting something = having no life. What an interesting notion. Tell me more.
@LordZozzy
@LordZozzy 5 лет назад
You might want to learn english before you insult somebody, kid. :)
@THETRIVIALTHINGS
@THETRIVIALTHINGS 5 лет назад
The best kind of secret is the one you don't know.
@pdaphuulz8219
@pdaphuulz8219 5 лет назад
Thanks, Cryptographers.
@telotawa
@telotawa 5 лет назад
1:22 keeps prying eyes out of your whatsapp messages... except from whatsapp itself when they wanna harvest data
@NotAJosh
@NotAJosh 5 лет назад
Hmm the vid is still private
@MikeTrieu
@MikeTrieu 5 лет назад
Scytale: Taste the Rainbow Table
@shis10
@shis10 5 лет назад
AES ?
@FlyLikeADragon
@FlyLikeADragon 5 лет назад
the cipher..... Bill Cipher!
@heliosprime6426
@heliosprime6426 5 лет назад
I can't see how entrustng my data to the Egyptians would keep it safer!!
@moosemaimer
@moosemaimer 5 лет назад
That's easy: 🐍🐢🐈🌿🌘🐞🐂🏺👁⚖️
@chaosopher23
@chaosopher23 5 лет назад
But you didn't mention SHA...
@ruileite4579
@ruileite4579 5 лет назад
With quantum encrypting hackers will cry
@glowingone1774
@glowingone1774 5 лет назад
Not really
@ChenfengBao
@ChenfengBao 5 лет назад
Even today hackers can't do anything against properly encrypted data. Problem is that it's hard to do encryption properly.
@famistu
@famistu 5 лет назад
Not a big misinformation. But Enigma wasn't crack by Gentelman on photo slide... 😂 Thank You for information. That wasn't sarcastic. ☺️
@bgroks1
@bgroks1 5 лет назад
Dawid Kryspin Ehhh. I mean they weren’t the first to crack the device called “Enigma”, but after the Enigma was made more secure by adding wheels or the plug box, they had to crack it on their own.
@windhelmguard5295
@windhelmguard5295 5 лет назад
the enigma was never actually cracked, the allies only managed to decrypt the enigma by geting their hands on a working machine, from that point on they just examined the enigma, learned that a letter would never become itself, they then designed a machine that could, within 20 minutes, brute force all possible plug and rotor settings, this would, given that you managed to guess a certain word or phrase in a massage such as the words "Führer" or "Wetterbericht" give you the correct plug and rotor settings, from which point on all they had to do was to set their enigma to the correct settings and then just decrypt messeges until they where changed at midnight. however the reason why i'm saying that the enigma was never truelly cracked is that they couldn't crack signals sent by the kriegsmarine, because those sent the settings for the plugs and rotors at the start of every messege using a different code and since that code did not contain any repeating patterns such as words that the germans would often use, this method didn't work. either way if you know how the enigma works you know that it can not be "cracked" you always need your own working machine as well as a good hunch on the information your enemy is trying to send, as a matter of fact the british actually improoved on the design to make it impossible to decrypt by allowing for letters to become themselfs.
@SkiddosSiren
@SkiddosSiren 5 лет назад
COMPLEX Indeed
@eChuckNorris
@eChuckNorris 5 лет назад
Explain block-chain and RSA :)
@unleashingpotential-psycho9433
Encryption is what prevents a whole bunch of identity theft from occurring.
@safir2241
@safir2241 5 лет назад
UNLEASHING POTENTIAL - PSYCHOLOGY VIDEOS Like your own comment, I see? Dw I do it too & all my comments get hundreds of likes
@just-a-silly-goofy-guy
@just-a-silly-goofy-guy 5 лет назад
Safir ok
@safir2241
@safir2241 5 лет назад
G G Leave a comment or a reply talking about this. I’m fully interested & prepared for walls of text.
@danukil7703
@danukil7703 5 лет назад
0:21 Heh, what Spartan navy? XD Just a joke
@Tholomaios
@Tholomaios 5 лет назад
*ehem* It was not the English to crack Enigma: 'On 26 and 27 July 1939,[4] in Pyry near Warsaw, the Poles initiated French and British military intelligence representatives into their Enigma-decryption techniques and equipment, including Zygalski sheets and the cryptologic bomb, and promised each delegation a Polish-reconstructed Enigma. The demonstration represented a vital basis for the later British continuation and effort.' Gordon Welchman, The Hut Six Story, 1982, p. 289.
@thstroyur
@thstroyur 5 лет назад
9:10 Isn't it cool just how jumpcuts can now also make haircuts? I mean, why waste your money with barbers when you can use your editing skillz for zildo?
@HappyHusbandnWife
@HappyHusbandnWife 5 лет назад
Thanks to Felix who hacked the youtube code, now the standard length for a vid is 10mins
@saumyashah7978
@saumyashah7978 5 лет назад
Then how does the NSA spy on us? Isn't that a violation of our privacy?
@robramsey5120
@robramsey5120 5 лет назад
9 minute segway for the sponsor, everyone seems to be doing this lately.
@smurfyday
@smurfyday 5 лет назад
Rob Ramsey segue, genius.
@robramsey5120
@robramsey5120 5 лет назад
@@smurfyday Thank you so much for the correction, every little bit of kindness helps, I'm clearly no genius though, I'm often making silly little mistakes these days especially with my mental health getting worse and worse by the day, it really does make clear thought difficult.
@Guru_1092
@Guru_1092 5 лет назад
Quantum Cryptograhy. Have fun.
@MichaelBattaglia
@MichaelBattaglia 5 лет назад
What will happen to modern cryptography once quantum computers become common place?
@jeremiasrobinson
@jeremiasrobinson 5 лет назад
Send me the information!!
@patriciaa4451
@patriciaa4451 5 лет назад
4:53 I got completely lost
@DonaldSleightholme
@DonaldSleightholme 5 лет назад
just send yourself a message that says hello world and read it while it’s encrypted... it still says hello world 😝
@MrWombatty
@MrWombatty 5 лет назад
Congratulations if you deciphered this video to be really just an ad!
@mikeltxo11
@mikeltxo11 5 лет назад
Did you just get a haircut in the middle of the episode? xD Between 9:00 and 9:15
@ElynevanOpzeeland
@ElynevanOpzeeland 5 лет назад
why didn't i hear anything about lava lamps?
@valtur25
@valtur25 5 лет назад
Turing and his collegues didn't crack the Enigma. Check your information before such bold statements! German military texts enciphered on the Enigma machine were first broken by the Polish Cipher Bureau, beginning in December 1932. This success was a result of efforts by three Polish cryptologists, Marian Rejewski, Jerzy Różycki and Henryk Zygalski, working for Polish military intelligence.
@ISTAYUPLATE
@ISTAYUPLATE 5 лет назад
But how do you crack Bill Cipher?
@fevre_dream8542
@fevre_dream8542 5 лет назад
Rib spreader.
@Niinkai
@Niinkai 5 лет назад
WRONG! Media has taught me that anything can easily hacked if you just type real fast! The counter-hackers always lose if you wear a beanie, have at least two keyboards, speak with a Russian accent and have headphones resting on your neck. This Is The Truth!
@bneisasmiler4942
@bneisasmiler4942 5 лет назад
Just Google translate and then do it back a ton of times :P
@ISoloYouRelax
@ISoloYouRelax 5 лет назад
Something that can't be cracked? Doesn't exist.
@miguelpasaye9262
@miguelpasaye9262 5 лет назад
hi
@Co-km6cl
@Co-km6cl 5 лет назад
12th
@ireallyhatemakingupnamesfo1758
This video should be Demonetized for that pun in the thumbnail
@hannasobieska3782
@hannasobieska3782 5 лет назад
The Enigma was actually first hacked by POLISH mathematicians
Далее
How does encryption work? - Gary explains
20:30
Просмотров 109 тыс.
HTTPS, SSL, TLS & Certificate Authority Explained
43:29
Штаны легионера
00:44
Просмотров 324 тыс.
AES: How to Design Secure Encryption
15:37
Просмотров 155 тыс.
7 Cryptography Concepts EVERY Developer Should Know
11:55
Berry's Paradox - An Algorithm For Truth
18:34
Просмотров 435 тыс.
This Problem Could Break Cryptography
8:08
Просмотров 294 тыс.
The Mystery of the Copiale Cipher
10:23
Просмотров 625 тыс.
Tech Talk: What is Public Key Infrastructure (PKI)?
9:22
Штаны легионера
00:44
Просмотров 324 тыс.