so the key to figure out the secret is to obtain the actual key/s, right? So at which point do you exchange your keys? Before, or during, communication with other parties?
Great explanation Could it be possible and effective to use the CT from a vigenere cipher and ruin it through another cipher ? And is there a cipher with a reusable decrypting method that is very strong and almost unbreakable ? like for example the one time pad but you can use the key multiple times
Hi Ryan, I am planning to cryptoanalyse substitution cipher using computer, but how do the computer know that it has decrypted the plaintext? as its manually not possible to check 26! factorial decryptions of the plain text. Any idea?
Hi Rajesh, Assuming you are decrypting actual written words, you'll probably want to check your "potential" decryption against some sort of dictionary or spell checker and use that to decide when you think you are done.
Man made it - man can break it... eventually everything gets broken 👹👹👹
Very good explanation, good work doc.
very informative, well presented thank you so much
Nice content with neat xplanation
Teaching is definitely your gift. Thank you!!
Thank you for your explanation it is brief and understand
Thanks so much so useful explanation
thank u for this education in cryptography, Mr Riley.
so you are looking for patterns to break the cipher?
so the key to figure out the secret is to obtain the actual key/s, right? So at which point do you exchange your keys? Before, or during, communication with other parties?
By that logic, you would want to create a cipher where the pattern is not detectable?
So is the entropy source then the source that produces like a random sequence of something?
Great explanation
Could it be possible and effective to use the CT from a vigenere cipher and ruin it through another cipher ? And is there a cipher with a reusable decrypting method that is very strong and almost unbreakable ? like for example the one time pad but you can use the key multiple times
I'm glad you enjoyed it!
So the keys need to be random, as in, there is absolutely no pattern (no repetition), and therefore it is unbreakable? :)
Thanks a lot. :-) Its help me a lot
I have Ex4 file encrypted so how can editing on it ? How can compile ? I use mt4 platform
It seems to me it is all about the patterns...:)
Hi Ryan, I am planning to cryptoanalyse substitution cipher using computer, but how do the computer know that it has decrypted the plaintext? as its manually not possible to check 26! factorial decryptions of the plain text. Any idea?
Hi Rajesh,
Assuming you are decrypting actual written words, you'll probably want to check your "potential" decryption against some sort of dictionary or spell checker and use that to decide when you think you are done.
@@ryanriley5591 Just discovered an interest in cryptography, really liked your videos! keep it up.
Thankx man, helped me with my exam.
Good to hear it was helpful. I hope the exam went well.
can anyone help with computer security assignment
gg
thhis guy is a g
These brute force attacks... they don't sound very elegant, really. Surely there can be other ways to attempt to break the patterns...
Open simplical crypto cipher.0