Introduction to Basic Cryptography: Simple Cryptography

Поделиться
HTML-код
  • Опубликовано: 10 ноя 2024

Комментарии • 27

  • @doc.steveo4552
    @doc.steveo4552 6 лет назад +3

    Man made it - man can break it... eventually everything gets broken 👹👹👹
    Very good explanation, good work doc.

  • @diniibrahim4004
    @diniibrahim4004 5 лет назад +2

    very informative, well presented thank you so much

  • @nithingundeti
    @nithingundeti 6 лет назад

    Nice content with neat xplanation

  • @leahdereka
    @leahdereka 5 лет назад

    Teaching is definitely your gift. Thank you!!

  • @Romanx24
    @Romanx24 5 лет назад

    Thank you for your explanation it is brief and understand

  • @zhiwarsami5737
    @zhiwarsami5737 5 лет назад

    Thanks so much so useful explanation

  • @sophiainjoy8942
    @sophiainjoy8942 6 лет назад

    thank u for this education in cryptography, Mr Riley.

  • @BambiOnIce19
    @BambiOnIce19 2 года назад

    so you are looking for patterns to break the cipher?

  • @BambiOnIce19
    @BambiOnIce19 2 года назад

    so the key to figure out the secret is to obtain the actual key/s, right? So at which point do you exchange your keys? Before, or during, communication with other parties?

  • @BambiOnIce19
    @BambiOnIce19 2 года назад

    By that logic, you would want to create a cipher where the pattern is not detectable?

  • @BambiOnIce19
    @BambiOnIce19 2 года назад

    So is the entropy source then the source that produces like a random sequence of something?

  • @nyunno
    @nyunno 6 лет назад +1

    Great explanation
    Could it be possible and effective to use the CT from a vigenere cipher and ruin it through another cipher ? And is there a cipher with a reusable decrypting method that is very strong and almost unbreakable ? like for example the one time pad but you can use the key multiple times

  • @BambiOnIce19
    @BambiOnIce19 2 года назад

    So the keys need to be random, as in, there is absolutely no pattern (no repetition), and therefore it is unbreakable? :)

  • @bittu8840
    @bittu8840 4 года назад

    Thanks a lot. :-) Its help me a lot

  • @niteshmalani3742
    @niteshmalani3742 5 лет назад

    I have Ex4 file encrypted so how can editing on it ? How can compile ? I use mt4 platform

  • @BambiOnIce19
    @BambiOnIce19 2 года назад

    It seems to me it is all about the patterns...:)

  • @ThingsHybrid
    @ThingsHybrid 5 лет назад

    Hi Ryan, I am planning to cryptoanalyse substitution cipher using computer, but how do the computer know that it has decrypted the plaintext? as its manually not possible to check 26! factorial decryptions of the plain text. Any idea?

    • @ryanriley5591
      @ryanriley5591  5 лет назад +2

      Hi Rajesh,
      Assuming you are decrypting actual written words, you'll probably want to check your "potential" decryption against some sort of dictionary or spell checker and use that to decide when you think you are done.

    • @ThingsHybrid
      @ThingsHybrid 5 лет назад

      @@ryanriley5591 Just discovered an interest in cryptography, really liked your videos! keep it up.

  • @saranshsaxena207
    @saranshsaxena207 6 лет назад

    Thankx man, helped me with my exam.

    • @ryanriley5591
      @ryanriley5591  6 лет назад

      Good to hear it was helpful. I hope the exam went well.

  • @samueloyinlola8914
    @samueloyinlola8914 2 года назад

    can anyone help with computer security assignment

  • @ferdinandgilbert5692
    @ferdinandgilbert5692 6 лет назад

    gg

  • @ferdinandgilbert5692
    @ferdinandgilbert5692 6 лет назад

    thhis guy is a g

  • @BambiOnIce19
    @BambiOnIce19 2 года назад

    These brute force attacks... they don't sound very elegant, really. Surely there can be other ways to attempt to break the patterns...

  • @kenichimori8533
    @kenichimori8533 4 года назад

    Open simplical crypto cipher.0