AES Encryption 1: Intro and Outline

Поделиться
HTML-код
  • Опубликовано: 15 сен 2024

Комментарии • 76

  • @random6434
    @random6434 3 года назад +2

    I think you're getting confused about DES. When differential cryptanalysis became known publically it was found that DES was "noted by Biham and Shamir that DES was surprisingly resistant to differential cryptanalysis but small modifications to the algorithm would make it much more susceptible" (see the Wikipedia on differential cryptanalysis), showing that the US government knew about differential cryptanalysis long before it was publically known.
    You may be thinking of Dual_EC_DRBG, which was actually backdoored?

  • @saraifortin9027
    @saraifortin9027 5 лет назад +2

    Thank you for this video series! You really broke down the algorithm well. I especially like how you don't just throw the code at us and call it a day, you explain it. Thank you so much :)

  • @ariefekowiranto2826
    @ariefekowiranto2826 6 лет назад +12

    Oh wow this is simpler than I thought.
    Maybe it's difficult material but you explained it nicely

    • @WhatsACreel
      @WhatsACreel  6 лет назад +3

      Cheers mate, thanks for watching

  • @majoro7251
    @majoro7251 8 лет назад +7

    I'm so much excited about this! Wish you kept going and did some functions' bodies but but surely all that info doesn't fit in one video.
    Thank you so much for sharing your knowledge. This channel is like a hidden gem and deserves a lot more views.

  • @hungvan6326
    @hungvan6326 6 лет назад

    finally found a guy can properly explain aes encryption through coding instead typing randomly code caught from internet without saying a single word, 1 sub :D

  • @PantherBlast
    @PantherBlast 6 лет назад +2

    This video was actually more informative than the others i've seen. Thanks so much for actually being informative!

  • @darbyburbidge8976
    @darbyburbidge8976 8 лет назад +2

    This is super interesting! Thank you!
    I don't know much about programming, but since watching your videos and trying to figure it out myself I have begun taking formal classes (to make sure i'm catching anything that might be assumed in your videos). My classes haven't been terribly interesting so far, so getting to watch your videos and learn about something really cool is always nice, even if I don't get all the coding aspects of it. Your videos always go into the general sense of what the program does enough that I can still follow. As much as my knowledge might be minimal, I can still follow your videos and at least get an idea of the kinds of cool stuff I might learn more generally later on. Your videos really get me excited for the potential of what you can do with C++.

    • @WhatsACreel
      @WhatsACreel  8 лет назад

      +Darby Burbidge You're a legend, thanks for watching!

  • @Ahmed.r.a
    @Ahmed.r.a 8 лет назад +3

    very clear explanation, very clear English, this tut is just Great. please do more. thank you so much. Ahmad from Iraq.

    • @muhlumu503
      @muhlumu503 5 лет назад

      @bachelors of trolling degree, 2013 your a fking idiot lol

  • @arandomgiantlizard6452
    @arandomgiantlizard6452 7 лет назад +5

    this should have more views. you actually explained this properly throughout this mini-series, you were not too quite and outside with bad light on a whiteboard, and you fluently speak English. Legit NONE of the other AES videos with more views were this good. they either poorly explain things, never go in-depth on anything, are outside with poor lighting and speak really quietly or they don't speak English fluently so you have no clue what they are trying to tell you. they also don't show you any code and when they do they just scroll past it all which is really annoying. Thank you for making this, it is honestly 30 million times better than the others I have found.

    • @WhatsACreel
      @WhatsACreel  7 лет назад +1

      Thank you so much Mr. Lizard, you made my day!

    • @arandomgiantlizard6452
      @arandomgiantlizard6452 7 лет назад

      yeah these videos were very good and helped a lot when it came to making a python implementation of AES (it not for serious use, its just to play around with). I have started to make a decrypter but have got a little stuck on inverse mix columns. by any chance would you know where I can find an implementation of inverse mix columns? it doesn't matter what language its in, it would just be for reference, but if you don't know of any don't worry about it.

    • @arandomgiantlizard6452
      @arandomgiantlizard6452 7 лет назад

      ah, never mind it got it working.

    • @mazdaboss
      @mazdaboss 7 лет назад

      Do you mind sending me the code? my email is kaijie1229@msn.com

  • @DownrightPhreak
    @DownrightPhreak 8 лет назад

    I've just started some classes related to data protection and security, and may i say, oh boy you're doing a great job at this, keep it up, thanks !

  • @imeade9751
    @imeade9751 4 года назад

    You are a Saviour!! Been trying to understand this for weeks finally

  • @lucioferrando5994
    @lucioferrando5994 3 года назад

    Hey men I love what your doing here thanks for teaching advance security encryption methods for real
    And you explain so well

  • @adithyayuri
    @adithyayuri 6 лет назад

    the best AES mini series ........ keep up the good work

  • @robertogarcia4637
    @robertogarcia4637 5 лет назад +1

    thank you very much. Great light to know how AES works. Nice !

    • @WhatsACreel
      @WhatsACreel  5 лет назад

      Welcome brus! Thanks for watching :)

  • @gekuronmatrix9127
    @gekuronmatrix9127 7 лет назад

    Very nice tutorials! Thank you very much. Hope you'll get more subs and views, you deserve it!

  • @velexter9756
    @velexter9756 7 лет назад

    Beautiful. Learning through programming. Thank you so much for this.

  • @Bri-Sci
    @Bri-Sci 8 лет назад

    I cant wait for the next video. This is something i always wanted to do. but i never took the time to research it.

  • @pronounceword
    @pronounceword 4 года назад

    I like your video very much. It's really great. I'll keep an eye on your channel. I am your fan and I will support you.

  • @theresatobollik2382
    @theresatobollik2382 5 лет назад

    great video and awesome approach for explaining. Thanks!

  • @cmuller1441
    @cmuller1441 6 лет назад +2

    4:25 no you don't want to encrypt each block independently. That's ECB mode that is vulnerable because the same data in will generate the same encrypted data out. CBC with an unpredictable IV.
    en.m.wikipedia.org/wiki/Block_cipher_mode_of_operation#Electronic_Codebook_(ECB)

    • @WhatsACreel
      @WhatsACreel  6 лет назад

      Nice info! There's defo better things you can do than encrypt each block the same.

  • @kilroy8357
    @kilroy8357 5 лет назад

    Your teaching is excellent!!! Thank you!

  • @yeahorightbro
    @yeahorightbro 8 лет назад +6

    "Go use it, bro" hahaha. awesome

  • @tiger18s
    @tiger18s 7 лет назад

    Super video. I learnt something that will make my life easier - how to build the architecture with theory in front :)
    Greetings!

  • @SerendipityMultimediaArts
    @SerendipityMultimediaArts 5 лет назад +2

    loved this!

    • @WhatsACreel
      @WhatsACreel  5 лет назад

      Cheers for watching mate, have a good one :)

  • @ip2design
    @ip2design 6 лет назад

    Excellent tutorial. Many thanks

  • @washingtonsundaresan
    @washingtonsundaresan 5 лет назад +1

    Hi What's a Creel! Thank you for this awesome video series once again. Can you please tell me why you are using decimal values instead of hexadecimal values as the key? Are they getting converted into hex afterwards?

  • @INT41O
    @INT41O 8 лет назад +3

    DES does not have a backdoor, in fact it was specifically designed to be secure even against differential cryptoanalysis which was not publicly known at the time. Today it is still used in the form of 3DES where the message is just encrypted three times with DES with a different key each time (this doubles, not triples, the effective key size to 112 bits)

    • @WhatsACreel
      @WhatsACreel  8 лет назад +1

      +INT41O
      Your comment was marked as spam for some reason?
      Anyway, I unmarked it. Thanks for the great info and have a brilliant day!

    • @gregorykhvatsky7668
      @gregorykhvatsky7668 7 лет назад +1

      DES is still broken though. The thing is that we can now build machines that can bruteforce 56-bit keys. I hope AES will be broken this way one day in the future.

    • @INT41O
      @INT41O 7 лет назад +1

      I think the definition of a broken cipher is actually if there is a way to decrypt a message without access to the key in considerable less time than by bruteforce. So technically DES is still unbroken even though it is very insecure due to the short key length.

    • @luckyluckydog123
      @luckyluckydog123 3 года назад

      @@INT41O correct: DES has no backdoors and hasn't been theoretically broken, its "only" problem is the very short key length which makes brute forcing possible.

  • @sagen620
    @sagen620 4 года назад +2

    Awesome tutorial, really made a "difficult" thing simple to understand.
    Improvement: Use tabs in your code. I got AIDS from the lack of tabbing :/

    • @WhatsACreel
      @WhatsACreel  4 года назад +2

      Well that was Whitesmith bracing, imho the most beautiful bracing style of all! I had to drop it because of all the illness I was causing OTBS peeps... hahaha, anywho, cheers for watching, so good to hear folks find it useful :)

    • @ulysses_grant
      @ulysses_grant 4 года назад

      @@WhatsACreel lol, best answer 😂

  • @shashankmishra4224
    @shashankmishra4224 5 лет назад

    +1 very clearly explained, thank you very much...

  • @rfi-cryptolab4251
    @rfi-cryptolab4251 5 лет назад +1

    Universal AES Key (128):
    EB08 45D1 00A0 4D10
    5960 EAA6 5701 200F
    The Universal Keys for 192 and 256 bit versions haven't been found.

    • @glennforsdick3902
      @glennforsdick3902 5 лет назад

      What is this please? Are you saying 128bit AES is broken ?

  • @sikendongol4208
    @sikendongol4208 3 года назад

    10:20 Stages within Rounds in AES

  • @JJGhostHunters
    @JJGhostHunters 9 месяцев назад

    Hello Creel...Can you provide a full listing of this program? I am trying to implement this with Python for AES-256.
    Essentially, I am trying to build a AES-256 Python implementation and test the following data:
    Key: “00112233445566778899AABBCCDDEEFF00112233445566778899AABBCCDDEEFF”
    IV: “00000000000000000000000000000000”
    Output: ?

  • @ankitsrivas5193
    @ankitsrivas5193 7 лет назад

    if possible please provide the link for slides which u have used

  • @ericromrell8567
    @ericromrell8567 7 лет назад

    This is a great video. Thanks for putting the time into it. Are the slides and code posted somewhere? I can't find them in the description anywhere...

    • @WhatsACreel
      @WhatsACreel  7 лет назад

      Sorry, I don't think they are. I used to post slides to a website, but it's gone now. Thanks for watching, have a good one!

  • @xfrostbite8328
    @xfrostbite8328 4 года назад

    at 4:21 , i don't know who else thought of this. but i came up w/ a formula to find a way to make every number up to 425 equal the same number. how could i imply this to an encryption?

    • @xfrostbite8328
      @xfrostbite8328 4 года назад

      425bytes= 3400 bits ; 425bytes*32(bits)=a(13,600) ; a/3400bits=4 ; to check > 425*32=a.
      424bytes=3392 bit ; 424bytes*32(bits)=a(13,568) ; a/3329bits=4 ; to check > 424*32=a.
      & so on.
      4 bits = 0.5. bytes
      Let me know something.

    • @WhatsACreel
      @WhatsACreel  4 года назад

      @@xfrostbite8328 I'm not sure what you mean mate. AES works on blocks of 16 bytes, so you have to pad if your byte count is not evenly divisible by 16. You can divide 425 by 16 to get 26.5625. That means there's 26 full blocks, but a bit is left over. So for AES you'd need use 27 blocks, and pad the extra bytes however you like.

    • @xfrostbite8328
      @xfrostbite8328 4 года назад

      What's a Creel? Ohh okay. I thought i was on to something. So if the block size is 32bytes then we divide by 32?

    • @xfrostbite8328
      @xfrostbite8328 4 года назад +1

      I will say. I do prefer RSA algorithm. Much more easy to understand lol 😅

    • @WhatsACreel
      @WhatsACreel  4 года назад

      @@xfrostbite8328 Yes, that sounds right! At least, that's how I'd do it :)

  • @davem1492
    @davem1492 8 лет назад +1

    why not a class?

  • @darksky1605
    @darksky1605 8 лет назад +2

    looking forward to the next videos. but please try to remove the background noise. it's is really annoying.

  • @marcosdaniel4237
    @marcosdaniel4237 7 лет назад

    Could you make the file available?

  • @husamsaheb3505
    @husamsaheb3505 7 лет назад

    you are amazing thank you a lot bro

  • @BlueJersey112
    @BlueJersey112 7 лет назад

    I think you have a little feedback 'hum' in your setup.

  • @forheuristiclifeksh7836
    @forheuristiclifeksh7836 5 месяцев назад +1

    9:57

  • @enhancednero5896
    @enhancednero5896 6 лет назад

    Can we have the source code for the whole program? I think I'm missing some lines and would like to compare. Thanks

  • @bandamkaromi
    @bandamkaromi 8 лет назад +1

    omg. miss type. interesting lectue video.. :)

  • @bandamkaromi
    @bandamkaromi 8 лет назад +1

    interneting video.. thank you

    • @WhatsACreel
      @WhatsACreel  8 лет назад

      +Hojeong Lee No probs, thanks for watching!

  • @martovify
    @martovify 6 лет назад

    THANKS

  • @MarceloBoliviaKZ3TP
    @MarceloBoliviaKZ3TP 7 лет назад

    me encorazona

  • @mgames1710
    @mgames1710 5 лет назад +1

    u here to decrypt pooky lololol

  • @luisvelasquez4239
    @luisvelasquez4239 7 лет назад +2

    Hey, Chris. Thanks for such a nice tutorial! I just did it on python, loosely based on yours. If you wanna check it: github.com/luvejo/AES128