I think you're getting confused about DES. When differential cryptanalysis became known publically it was found that DES was "noted by Biham and Shamir that DES was surprisingly resistant to differential cryptanalysis but small modifications to the algorithm would make it much more susceptible" (see the Wikipedia on differential cryptanalysis), showing that the US government knew about differential cryptanalysis long before it was publically known. You may be thinking of Dual_EC_DRBG, which was actually backdoored?
Thank you for this video series! You really broke down the algorithm well. I especially like how you don't just throw the code at us and call it a day, you explain it. Thank you so much :)
I'm so much excited about this! Wish you kept going and did some functions' bodies but but surely all that info doesn't fit in one video. Thank you so much for sharing your knowledge. This channel is like a hidden gem and deserves a lot more views.
finally found a guy can properly explain aes encryption through coding instead typing randomly code caught from internet without saying a single word, 1 sub :D
This is super interesting! Thank you! I don't know much about programming, but since watching your videos and trying to figure it out myself I have begun taking formal classes (to make sure i'm catching anything that might be assumed in your videos). My classes haven't been terribly interesting so far, so getting to watch your videos and learn about something really cool is always nice, even if I don't get all the coding aspects of it. Your videos always go into the general sense of what the program does enough that I can still follow. As much as my knowledge might be minimal, I can still follow your videos and at least get an idea of the kinds of cool stuff I might learn more generally later on. Your videos really get me excited for the potential of what you can do with C++.
this should have more views. you actually explained this properly throughout this mini-series, you were not too quite and outside with bad light on a whiteboard, and you fluently speak English. Legit NONE of the other AES videos with more views were this good. they either poorly explain things, never go in-depth on anything, are outside with poor lighting and speak really quietly or they don't speak English fluently so you have no clue what they are trying to tell you. they also don't show you any code and when they do they just scroll past it all which is really annoying. Thank you for making this, it is honestly 30 million times better than the others I have found.
yeah these videos were very good and helped a lot when it came to making a python implementation of AES (it not for serious use, its just to play around with). I have started to make a decrypter but have got a little stuck on inverse mix columns. by any chance would you know where I can find an implementation of inverse mix columns? it doesn't matter what language its in, it would just be for reference, but if you don't know of any don't worry about it.
4:25 no you don't want to encrypt each block independently. That's ECB mode that is vulnerable because the same data in will generate the same encrypted data out. CBC with an unpredictable IV. en.m.wikipedia.org/wiki/Block_cipher_mode_of_operation#Electronic_Codebook_(ECB)
Hi What's a Creel! Thank you for this awesome video series once again. Can you please tell me why you are using decimal values instead of hexadecimal values as the key? Are they getting converted into hex afterwards?
DES does not have a backdoor, in fact it was specifically designed to be secure even against differential cryptoanalysis which was not publicly known at the time. Today it is still used in the form of 3DES where the message is just encrypted three times with DES with a different key each time (this doubles, not triples, the effective key size to 112 bits)
DES is still broken though. The thing is that we can now build machines that can bruteforce 56-bit keys. I hope AES will be broken this way one day in the future.
I think the definition of a broken cipher is actually if there is a way to decrypt a message without access to the key in considerable less time than by bruteforce. So technically DES is still unbroken even though it is very insecure due to the short key length.
@@INT41O correct: DES has no backdoors and hasn't been theoretically broken, its "only" problem is the very short key length which makes brute forcing possible.
Well that was Whitesmith bracing, imho the most beautiful bracing style of all! I had to drop it because of all the illness I was causing OTBS peeps... hahaha, anywho, cheers for watching, so good to hear folks find it useful :)
Hello Creel...Can you provide a full listing of this program? I am trying to implement this with Python for AES-256. Essentially, I am trying to build a AES-256 Python implementation and test the following data: Key: “00112233445566778899AABBCCDDEEFF00112233445566778899AABBCCDDEEFF” IV: “00000000000000000000000000000000” Output: ?
at 4:21 , i don't know who else thought of this. but i came up w/ a formula to find a way to make every number up to 425 equal the same number. how could i imply this to an encryption?
425bytes= 3400 bits ; 425bytes*32(bits)=a(13,600) ; a/3400bits=4 ; to check > 425*32=a. 424bytes=3392 bit ; 424bytes*32(bits)=a(13,568) ; a/3329bits=4 ; to check > 424*32=a. & so on. 4 bits = 0.5. bytes Let me know something.
@@xfrostbite8328 I'm not sure what you mean mate. AES works on blocks of 16 bytes, so you have to pad if your byte count is not evenly divisible by 16. You can divide 425 by 16 to get 26.5625. That means there's 26 full blocks, but a bit is left over. So for AES you'd need use 27 blocks, and pad the extra bytes however you like.
I think you're getting confused about DES. When differential cryptanalysis became known publically it was found that DES was "noted by Biham and Shamir that DES was surprisingly resistant to differential cryptanalysis but small modifications to the algorithm would make it much more susceptible" (see the Wikipedia on differential cryptanalysis), showing that the US government knew about differential cryptanalysis long before it was publically known.
You may be thinking of Dual_EC_DRBG, which was actually backdoored?
Thank you for this video series! You really broke down the algorithm well. I especially like how you don't just throw the code at us and call it a day, you explain it. Thank you so much :)
Oh wow this is simpler than I thought.
Maybe it's difficult material but you explained it nicely
Cheers mate, thanks for watching
I'm so much excited about this! Wish you kept going and did some functions' bodies but but surely all that info doesn't fit in one video.
Thank you so much for sharing your knowledge. This channel is like a hidden gem and deserves a lot more views.
finally found a guy can properly explain aes encryption through coding instead typing randomly code caught from internet without saying a single word, 1 sub :D
This video was actually more informative than the others i've seen. Thanks so much for actually being informative!
This is super interesting! Thank you!
I don't know much about programming, but since watching your videos and trying to figure it out myself I have begun taking formal classes (to make sure i'm catching anything that might be assumed in your videos). My classes haven't been terribly interesting so far, so getting to watch your videos and learn about something really cool is always nice, even if I don't get all the coding aspects of it. Your videos always go into the general sense of what the program does enough that I can still follow. As much as my knowledge might be minimal, I can still follow your videos and at least get an idea of the kinds of cool stuff I might learn more generally later on. Your videos really get me excited for the potential of what you can do with C++.
+Darby Burbidge You're a legend, thanks for watching!
very clear explanation, very clear English, this tut is just Great. please do more. thank you so much. Ahmad from Iraq.
@bachelors of trolling degree, 2013 your a fking idiot lol
this should have more views. you actually explained this properly throughout this mini-series, you were not too quite and outside with bad light on a whiteboard, and you fluently speak English. Legit NONE of the other AES videos with more views were this good. they either poorly explain things, never go in-depth on anything, are outside with poor lighting and speak really quietly or they don't speak English fluently so you have no clue what they are trying to tell you. they also don't show you any code and when they do they just scroll past it all which is really annoying. Thank you for making this, it is honestly 30 million times better than the others I have found.
Thank you so much Mr. Lizard, you made my day!
yeah these videos were very good and helped a lot when it came to making a python implementation of AES (it not for serious use, its just to play around with). I have started to make a decrypter but have got a little stuck on inverse mix columns. by any chance would you know where I can find an implementation of inverse mix columns? it doesn't matter what language its in, it would just be for reference, but if you don't know of any don't worry about it.
ah, never mind it got it working.
Do you mind sending me the code? my email is kaijie1229@msn.com
I've just started some classes related to data protection and security, and may i say, oh boy you're doing a great job at this, keep it up, thanks !
You are a Saviour!! Been trying to understand this for weeks finally
Hey men I love what your doing here thanks for teaching advance security encryption methods for real
And you explain so well
the best AES mini series ........ keep up the good work
thank you very much. Great light to know how AES works. Nice !
Welcome brus! Thanks for watching :)
Very nice tutorials! Thank you very much. Hope you'll get more subs and views, you deserve it!
Beautiful. Learning through programming. Thank you so much for this.
I cant wait for the next video. This is something i always wanted to do. but i never took the time to research it.
I like your video very much. It's really great. I'll keep an eye on your channel. I am your fan and I will support you.
great video and awesome approach for explaining. Thanks!
4:25 no you don't want to encrypt each block independently. That's ECB mode that is vulnerable because the same data in will generate the same encrypted data out. CBC with an unpredictable IV.
en.m.wikipedia.org/wiki/Block_cipher_mode_of_operation#Electronic_Codebook_(ECB)
Nice info! There's defo better things you can do than encrypt each block the same.
Your teaching is excellent!!! Thank you!
"Go use it, bro" hahaha. awesome
Super video. I learnt something that will make my life easier - how to build the architecture with theory in front :)
Greetings!
loved this!
Cheers for watching mate, have a good one :)
Excellent tutorial. Many thanks
Hi What's a Creel! Thank you for this awesome video series once again. Can you please tell me why you are using decimal values instead of hexadecimal values as the key? Are they getting converted into hex afterwards?
DES does not have a backdoor, in fact it was specifically designed to be secure even against differential cryptoanalysis which was not publicly known at the time. Today it is still used in the form of 3DES where the message is just encrypted three times with DES with a different key each time (this doubles, not triples, the effective key size to 112 bits)
+INT41O
Your comment was marked as spam for some reason?
Anyway, I unmarked it. Thanks for the great info and have a brilliant day!
DES is still broken though. The thing is that we can now build machines that can bruteforce 56-bit keys. I hope AES will be broken this way one day in the future.
I think the definition of a broken cipher is actually if there is a way to decrypt a message without access to the key in considerable less time than by bruteforce. So technically DES is still unbroken even though it is very insecure due to the short key length.
@@INT41O correct: DES has no backdoors and hasn't been theoretically broken, its "only" problem is the very short key length which makes brute forcing possible.
Awesome tutorial, really made a "difficult" thing simple to understand.
Improvement: Use tabs in your code. I got AIDS from the lack of tabbing :/
Well that was Whitesmith bracing, imho the most beautiful bracing style of all! I had to drop it because of all the illness I was causing OTBS peeps... hahaha, anywho, cheers for watching, so good to hear folks find it useful :)
@@WhatsACreel lol, best answer 😂
+1 very clearly explained, thank you very much...
Universal AES Key (128):
EB08 45D1 00A0 4D10
5960 EAA6 5701 200F
The Universal Keys for 192 and 256 bit versions haven't been found.
What is this please? Are you saying 128bit AES is broken ?
10:20 Stages within Rounds in AES
Hello Creel...Can you provide a full listing of this program? I am trying to implement this with Python for AES-256.
Essentially, I am trying to build a AES-256 Python implementation and test the following data:
Key: “00112233445566778899AABBCCDDEEFF00112233445566778899AABBCCDDEEFF”
IV: “00000000000000000000000000000000”
Output: ?
if possible please provide the link for slides which u have used
This is a great video. Thanks for putting the time into it. Are the slides and code posted somewhere? I can't find them in the description anywhere...
Sorry, I don't think they are. I used to post slides to a website, but it's gone now. Thanks for watching, have a good one!
at 4:21 , i don't know who else thought of this. but i came up w/ a formula to find a way to make every number up to 425 equal the same number. how could i imply this to an encryption?
425bytes= 3400 bits ; 425bytes*32(bits)=a(13,600) ; a/3400bits=4 ; to check > 425*32=a.
424bytes=3392 bit ; 424bytes*32(bits)=a(13,568) ; a/3329bits=4 ; to check > 424*32=a.
& so on.
4 bits = 0.5. bytes
Let me know something.
@@xfrostbite8328 I'm not sure what you mean mate. AES works on blocks of 16 bytes, so you have to pad if your byte count is not evenly divisible by 16. You can divide 425 by 16 to get 26.5625. That means there's 26 full blocks, but a bit is left over. So for AES you'd need use 27 blocks, and pad the extra bytes however you like.
What's a Creel? Ohh okay. I thought i was on to something. So if the block size is 32bytes then we divide by 32?
I will say. I do prefer RSA algorithm. Much more easy to understand lol 😅
@@xfrostbite8328 Yes, that sounds right! At least, that's how I'd do it :)
why not a class?
looking forward to the next videos. but please try to remove the background noise. it's is really annoying.
Could you make the file available?
you are amazing thank you a lot bro
I think you have a little feedback 'hum' in your setup.
9:57
Can we have the source code for the whole program? I think I'm missing some lines and would like to compare. Thanks
omg. miss type. interesting lectue video.. :)
interneting video.. thank you
+Hojeong Lee No probs, thanks for watching!
THANKS
me encorazona
u here to decrypt pooky lololol
Hey, Chris. Thanks for such a nice tutorial! I just did it on python, loosely based on yours. If you wanna check it: github.com/luvejo/AES128
Nice one!