Тёмный

The German SZ42 Cipher Machine Explained 

Cryptography for Everybody
Подписаться 14 тыс.
Просмотров 1,9 тыс.
50% 1

#cryptology, #cryptography, #cryptanalysis
In this video, I explain the Lorenz SZ42, a ciphermachine used by the Germans during WWII. It was used for encryption of high-level communications beginning in mid 1942. The machine encrypts Baudot code using a pseudo-random generated keystream.
In the video, I explain how the cipher machine works and we analyze its keyspace size and unicity distance. We also create a workspace in CrypTool 2 to encrypt and decrypt text using the new SZ42 component.
If you are interested in learning the fundaments of cryptology, let me invite you to have a look at our video series about the basics of cryptology, also for beginners: • Basics of Cryptology -...
You can download the latest version of CrypTool 2 from here: www.cryptool.org/en/ct2/downl...
Visit my blog: www.kopaldev.de
Join Discord server: / discord

Опубликовано:

 

5 сен 2023

Поделиться:

Ссылка:

Скачать:

Готовим ссылку...

Добавить в:

Мой плейлист
Посмотреть позже
Комментарии : 9   
@AarreLisakki
@AarreLisakki Месяц назад
there's a small typo in the keyspace calculation -- in total keyspace size calculation, when writing down the formula, you accidentally repeat the number 2^150 (from the Chi wheels keyspace) also for the Mu wheels keyspace size, instead of using the value of 2^98 as calculated in the previous step. But, doesn't affect anything as despite the written values being off, the total keyspace size has nevertheless apparently been calculated using 2^98 as intended; 2^150 * 2^253 * 2^98 = 2^501 Thx for making these vids, I very much enjoy learning about various historic ciphers from them!
@raygao2000
@raygao2000 15 дней назад
Very nice. Thank you very much!!! 😊
@scamalach
@scamalach 8 месяцев назад
What a great explanation of the most infamous machine in WW2. Thanks for doing this!
@CryptographyForEverybody
@CryptographyForEverybody 8 месяцев назад
Thank you 😊. Happy you liked the video 🙂. Greetings Nils
@chrisst8922
@chrisst8922 2 месяца назад
I believe that this particular machine was the one used by Kesselrings army.
@AlanCanon2222
@AlanCanon2222 2 дня назад
Does anyone know the line discipline used by Lorenz? Particularly baud rate, and start and stop bits?
@timetraveller6643
@timetraveller6643 10 месяцев назад
Another fascinating description. Thank you Nils. The mechanical encryption machines all try to do the same thing; Generate a near random long period pseudo-random number. Have modern math theories suggested any new approaches to designing a practical mechanical pseudo-random number generator with more perfect distribution and super long periods? Are gears and wheels the only components considered? Are there no rod, lever, or chain based machines? (paper tape seems much too fragile to me) I like the sliding tiles in John Byrnes Chaocipher. Perhaps there's a way to automate Bruce Schneier's Pontifex (Solitaire) using tiles. --Molly J.
@CryptographyForEverybody
@CryptographyForEverybody 10 месяцев назад
Hiho, I think after the invention of electronic-based and computer-based ciphers, there was no need for working on strong mechanical cryptographic devices. I think two of the most secure ones (and therefore best pseodo-random ones) are the M-209 and the SG-41, which basically is designed the same way the M-209 is, and the CX-52. Greetings, Nils
Далее
The Affine Cipher - A Mathematical Substitution Cipher
15:35
The British Typex Cipher Machine Explained
22:36
Просмотров 2,6 тыс.
Cracking Enigma in 2021 - Computerphile
21:20
Просмотров 2,4 млн
The moment we stopped understanding AI [AlexNet]
17:38
Просмотров 730 тыс.
7 Cryptography Concepts EVERY Developer Should Know
11:55
Fishy Codes: Bletchley's Other Secret - Computerphile
15:57
Fast Inverse Square Root - A Quake III Algorithm
20:08