Very good job, from one instructor to another. You have class, and the ability to simply complicated subjects. Only one regret, wish I had you as an instructor. :)
Fascinating lecture, I've been toying with steganography in PureBasic and Assembly in combination with compression and encryption (1-bit or 2-bit per color value and optionally alpha channel). The stories in this lecture are amusing to say the least!
Thank you for the info. I had studied "Cryptography and Network Security: Principles and Practice, Second Edition. by William Stallings" in engineering and also went through few chapters of Applied Cryptography. Both of which I had liked a lot. Thank you for the recommendations. I will get "The Codebreakers" first. Have a nice day!
Yes Kahn's brilliant book is "The Codebreakers" and is the best book on the history and principles of cryptography I've had the pleasure to read. The Code Book is another popular book on codes but i've not read it, quite a few of my students like it however. A book I can strong recommend is "Decrypted Secrets" by FL Bauer, and of course Applied Cryptography by Bruce Schneier is a brilliant introduction to the field since the second world war.
@XxAznDarknezZxX : the name is simply "simulation", the magnitude he speaks of is one that simulates space-time itself with all the forces of the universe "in a bottle" so-to-speak. There is no _real_ way to do that (because it would take the power and size of the universe to simulate a universe), you can do a miniature one, but the chances of sentience becomes close to nil (as even out universe is pretty small on our own chance). I'm not sure of any books directly
@XxAznDarknezZxX : As I stated, the chances of life in a universe smaller than our own becomes close to 0 (drake's equation works on the expanses of our universe, if moved to something smaller, the equation drops off). Recursion is even less likely due to information entropy. You can take out one of the universe "powers" (dimension, gravity, radiation, etc.) to make it simpler, but those creatures would have to reduce it again, and again (info entropy).
WHAT IF you use Cryptography inside a Steganography? and the steganographys text is protected from a pass wich is unknown, but it can be seen on the picture itself which is hiding evrything?, and somethink more for example lets say that the way to see the pass remains hiden also on the pic, something like counting down thinks or mesure distance etc. etc. so you have to use logic/maths on the pic. this think becames somethink like a puzzle. but could it be posible to hack the pass? ther are some programs that Encrypt text in pics with pass, is it posible to hack that pass with some way? and if yes! how?
LOL. And, why use numbers to encrypt when you could just use say, raw information, that when put into a 3D printer, would print a message, that the guy who got, would know was in arabian phonetics, that when pronounced backwards, could be deciphered into numbers. How would anyone know the specific steps necessary? This approach seems alot more safe than providing a key for decrypting
Finally had time to watch this, since I was MIA during that lecture.
Absolutely brilliant!!!
Its 2020 and I am watching this, thank you very much
AWESOME - Thanks Richard, so lucid, perfectly explained.
Very good job, from one instructor to another. You have class, and the ability to simply complicated subjects. Only one regret, wish I had you as an instructor. :)
Fascinating lecture, I've been toying with steganography in PureBasic and Assembly in combination with compression and encryption (1-bit or 2-bit per color value and optionally alpha channel). The stories in this lecture are amusing to say the least!
I like how the smiley face game was not only about the finished drawing, but the way it was drew as well.
Thank you for the info. I had studied "Cryptography and Network Security: Principles and Practice, Second Edition. by William Stallings" in engineering and also went through few chapters of Applied Cryptography. Both of which I had liked a lot.
Thank you for the recommendations. I will get "The Codebreakers" first. Have a nice day!
Yes Kahn's brilliant book is "The Codebreakers" and is the best book on the history and principles of cryptography I've had the pleasure to read. The Code Book is another popular book on codes but i've not read it, quite a few of my students like it however. A book I can strong recommend is "Decrypted Secrets" by FL Bauer, and of course Applied Cryptography by Bruce Schneier is a brilliant introduction to the field since the second world war.
I am so jealous of this class... In my school they teach as really ancient stuff (like pascal)
I hope we'll learn in a more accelerated way @ uni
where Can i find mOre infOrmation on the godeL eScHer bach book? I'm inTrigued
Can someone tell the name of the other book he said is very good? Couldn't get it
@XxAznDarknezZxX : the name is simply "simulation", the magnitude he speaks of is one that simulates space-time itself with all the forces of the universe "in a bottle" so-to-speak. There is no _real_ way to do that (because it would take the power and size of the universe to simulate a universe), you can do a miniature one, but the chances of sentience becomes close to nil (as even out universe is pretty small on our own chance). I'm not sure of any books directly
Security via obscurity is interesting, hiding things in plain view!
@XxAznDarknezZxX : As I stated, the chances of life in a universe smaller than our own becomes close to 0 (drake's equation works on the expanses of our universe, if moved to something smaller, the equation drops off). Recursion is even less likely due to information entropy. You can take out one of the universe "powers" (dimension, gravity, radiation, etc.) to make it simpler, but those creatures would have to reduce it again, and again (info entropy).
Hi , i have a question : i have a picture, in this picture we have a hidden key using steganography LSB, how can i pick up the key
Gr8 teacher
What is the difference between watermarking and steganography?
Can you please come to london and teach my Forensic course, i've learnt more in this 30mins than i have in a year at my uni, thanks!
WHAT IF you use Cryptography inside a Steganography? and the steganographys text is protected from a pass wich is unknown, but it can be seen on the picture itself which is hiding evrything?, and somethink more for example lets say that the way to see the pass remains hiden also on the pic, something like counting down thinks or mesure distance etc. etc. so you have to use logic/maths on the pic. this think becames somethink like a puzzle. but could it be posible to hack the pass? ther are some programs that Encrypt text in pics with pass, is it posible to hack that pass with some way? and if yes! how?
+rtyuty htyhtyh lots of thems!!! i know. but if you follow my logic you will see how facinatic it is.
Thanks sir and you speak vary good
Great Video,i subscribed!
does anyone know the date of when this lecture was? I want to reference in in my essay
this has been taking me about 2 hours to finish since i kept pausing
Shouldn't the book be "The Codebreaker" by David Khan.. And not "The Code Book"..??
I am confused..
Good Video. : )
thank you sooooooooooo much
cool stuff
21:03 it's called paralanguage
LOL. And, why use numbers to encrypt when you could just use say, raw information, that when put into a 3D printer, would print a message, that the guy who got, would know was in arabian phonetics, that when pronounced backwards, could be deciphered into numbers.
How would anyone know the specific steps necessary? This approach seems alot more safe than providing a key for decrypting
Nice guy :D
@Orione hahaha me too :D
i swear people like this get paid per comment and rating?