The Encryption That Can't Be Cracked: OTP

Поділитися
Вставка
  • Опубліковано 10 чер 2024
  • Go to NordVPN.com/rogue and use code ROGUE to get 75% off a 3 year plan and use code ROGUE for an extra month free!
    🡇 -------------- get your own OTP keys + chart & accreditation -------------- 🡇
    sunrise arm motion - outline can in the air motion - taps nose motion - tugs on brim of hat and then brushes side of shoulder motion - morpheus hand motion
    ------------------------------------------------------------------------------
    Unedited footage for this video ($5+ patrons):
    / 29076666
    ------------------------------------------------------------------------------
    Additional Information
    Generate your own psuedorandom OTP keys
    learningselfreliance.com/one_...
    Get the OTP conversion chart here
    learningselfreliance.com/down...
    How to use a one time pad from the person who offers those resources
    • Communications Encrypt...
    Alternate OTP conversion chart that we made
    i.imgur.com/S4AFMdq.png
    "We're Not So Different, You and I" | Dr. James Grime on Numberphile
    • "We're Not So Differen...
    Information on Benedict Arnold's ciphers
    web.archive.org/web/201006110...
    A transcription and photo of one of his cryptic messages
    web.archive.org/web/201006081...
    A decoded transcription of the same message
    web.archive.org/web/201006110...
    More detail on the books Benedict Arnold used
    cryptiana.web.fc2.com/code/arn...
    Benford's Law on wikipedia
    en.wikipedia.org/wiki/Benford...
    Benford's Law on wolfram
    mathworld.wolfram.com/Benfords...
    One Time Pads on wikipedia
    en.wikipedia.org/wiki/One-tim...
    M. Rohe, 2003, RANDy - A True-Random Generator Based On Radioactive Decay
    citeseerx.ist.psu.edu/viewdoc/...
    A History of U.S. Communications Security (Volumes I and II)
    www.governmentattic.org/18doc...
    ------------------------------------------------------------------------------
    Music used in this video:
    "Vino" by Cap Kendricks
    chillhop.bandcamp.com/track/vino
    "Sinkerator (feat. Dilip & quickly, quickly)" by weird inside
    chillhop.bandcamp.com/track/s...
    "All Us" by Nokiaa x nofeels
    chillhop.bandcamp.com/track/a...
    "Grass" by baaskaT
    chillhop.bandcamp.com/track/g...
    Most of the music from the show: bit.ly/mrspotify
    ------------------------------------------------------------------------------
    Post-production powered by Doghouse Systems
    ------------------------------------------------------------------------------
    This video was made with the help of:
    Brian Brushwood - host -- / shwood
    Jason Murphy - host -- / captainmurphy
    Brandt Hughes - camera operator / editor / caption editor -- / gatowag - / gatowag
    Bryce Castillo - live audio engineer -- / brycas
    John Rael - camera operator -- / skepticallypwnd
    Annaliese Martin - production assistance - / amuseliese
    Jiaying L. (Rev) - caption first draft
    ------------------------------------------------------------------------------
    Our Mailing Address
    Modern Rogue
    539 W. Commerce #1975, Dallas TX 75208
    ------------------------------------------------------------------------------
    Scam Nation: / scamschool
    Patreon: / modernrogue
    Discord (patron reward): / discord
    MR Articles: themodernrogue.com
    Outtakes & BTS: / scamstuff
    Subreddit: modernrogue.reddit.com
    Merch: shop.themodernrogue.com
    Twitter: / modernrogueshow
    Instagram: / modernrogueshow
  • Розваги

КОМЕНТАРІ • 450

  • @ModernRogue
    @ModernRogue  4 роки тому +56

    Tell a friend, gosh-gee-darnit!
    This week, we're giving away a powerhouse deck of cards. It's beveled, it's one-way, AND it's marked--of course I'm talking about the APEX Deck. Whether you're a beginner or an old-hand, this three-in-one deck will open up a new world of possibilities.
    Enter our free weekly giveaway and you could be one of six winners of the APEX Deck. Just sign up at gimme.scamstuff.com and you could win! (No purchase necessary, giveaway ends 8/15/2019)

    • @KamenRiderRaiden
      @KamenRiderRaiden 4 роки тому

      _pauses at __6:30_ Wait.... HA HA!! I know what this is!

    • @aidenburnside6380
      @aidenburnside6380 4 роки тому +2

      Please get your license to broadcast so that you guys can make a number station for us

    • @johnathanhulse8
      @johnathanhulse8 4 роки тому

      I just went back and watched the pepper ball gun episode and got a bad idea for you guys to try. The pepper ball gun shot at around 320 FPS and was semi auto. For a while now I’ve been into airsoft and some of those non-lethal guns can shoot in excess of 600 FPS while shooting near 20RPS in full auto. Why not give some a try?

    • @ethandickinson-grant7268
      @ethandickinson-grant7268 4 роки тому

      The Modern Rogue you got sunrise right so good job kid Brian

    • @kirkw1740
      @kirkw1740 4 роки тому

      Love that Simpsons reference! lol Grimy Grimes

  • @gigglesgaming6362
    @gigglesgaming6362 4 роки тому +119

    How to do a modern rogue intro:
    Person 1: have you ever done a weirdly specific random thing?
    Person 2: reluctantly answers 'yes'
    Person 1: *laughs*
    Person 2: explains what they specifically did

    • @gigglesgaming6362
      @gigglesgaming6362 3 роки тому +1

      @@johnnyparsnips7641 I know this. I'm not hatinf on them lol. I love them. I was just observing something I noticed.

  • @GogiRegion
    @GogiRegion 4 роки тому +48

    I once took a cryptological mathematics class, and after talking about how to crack the Vigenere cipher, the teacher told us about this perfect cipher called the “One Time Pad,” that’s so strong that it’s even been mathematically proven to be impossible to crack. And even RSA, which is what banks and militaries use is still theoretically crackable, even if near impossible to. Of course, we then asked how that’s possible, and that it obviously had to have a downside. She then said, “It’s called the one time pad because you can only use it once per key, or else it’s just like any other Vigenere cipher.” It was really funny to see Brian’s reactions to a lot of the stuff here.

  • @VhenRaTheRaptor
    @VhenRaTheRaptor 4 роки тому +6

    A surprisingly effective way to generate randomness for a OTP is in fact dice.
    Some versions on one-time-pads use numbers purely instead of letters to generate the OTP... so rolling something like a ten-sided dice over and over can generate random enough numbers to generate a pad.

  • @MiWill1988
    @MiWill1988 4 роки тому +40

    That's not a bad patreon bonus. Patrons get the OTP. Videos on UA-cam deliver a coded message

  • @redcatjack
    @redcatjack 4 роки тому +92

    Surprised they didn't talk about Cloudflare using Lava Lamps to get truly random numbers

    • @waitwhat6062
      @waitwhat6062 4 роки тому +10

      Tom scott fans where you at?

    • @Deliphin11
      @Deliphin11 4 роки тому +2

      They didn't because it's not truly random, it's just practically random enough for any use case. Technically, everything they do is predictable, there's just so much to predict that it's practically impossible. Truly random would be literally impossible- no amount of data you could have would get you there.

    • @JooJingleTHISISLEGIT
      @JooJingleTHISISLEGIT 4 роки тому +6

      it is practically truly random, thus it's worth mentioning

    • @Lambda_Ovine
      @Lambda_Ovine 4 роки тому +2

      @@Deliphin11 You're mostly right, but you're wrong by saying that everything they do is technically predictable. Due to the uncertainty principle of quantum mechanics, you can only go as close as have probabilities of what could happen, but you cannot predict what will happen.

  • @asdrugrohl
    @asdrugrohl 4 роки тому +177

    Haha! I watch too much Modern Rogue. I knew it was Grilled cheese since the "G"

    • @nickwilson940
      @nickwilson940 4 роки тому +3

      I thought this the second I counted the letters

    • @user-vn7ce5ig1z
      @user-vn7ce5ig1z 4 роки тому +1

      Why did I think of Frank Grillo? 🤔 That doesn't even start with a 'g'. 😕

    • @asdrugrohl
      @asdrugrohl 4 роки тому +4

      @@user-vn7ce5ig1z but Grank Frillo does

    • @markmcculfor6113
      @markmcculfor6113 4 роки тому

      Yep lol

    • @jeremiahdavis7904
      @jeremiahdavis7904 4 роки тому

      @@user-vn7ce5ig1z Grillo, Frank legal document style fixes that issue lol

  • @ryanwilson3483
    @ryanwilson3483 4 роки тому +155

    Your "made up" sign for day, is actually really close to American Sign language sign for day!!

    • @JZStudiosonline
      @JZStudiosonline 4 роки тому +6

      The opposite motion is night. But sign language is kind of weird since it seems to change over time.

    • @jameslwjtoler
      @jameslwjtoler 4 роки тому

      I noticed that too. It's signed "now" then "day" if I remember correctly.

    • @TristanJCumpole
      @TristanJCumpole 4 роки тому

      On a related note, the closed captions have terrible grammar errors.

    • @andymcl92
      @andymcl92 4 роки тому +4

      @@JZStudiosonline As opposed to thee spoken word which be famously unchanging?

    • @FreeER
      @FreeER 4 роки тому +1

      @@JZStudiosonline "sign language is kind of weird since it seems to change over time"
      Wilcumian stêpan word−cwide mæcca - Welcome to (all) language(s) mate, lingojam.com/OldEnglishTranslator
      my knight loves having knives with silent letters in their names for no reason lol
      (unless you mean it literally changes depending on the time of the day when it's signed, in which case I never came across that in the tiny bit of ASL I tried to learn on memrise lol... gave up because internet is bad and it'd take forever to load the gifs)

  • @djsnackcakes2795
    @djsnackcakes2795 4 роки тому +26

    When I was little, I would use a keypad as the key. Somethinf like "hello" would be 42 32 53 53 63. I still use this to store passwords in notebooks since most people wouldn't think about that

    • @samuelmashil
      @samuelmashil 4 роки тому +2

      Damnnnnnn that's smart

    • @djsnackcakes2795
      @djsnackcakes2795 4 роки тому +1

      @John Melvin the ones you would find on a candybar phone

    • @destrata6616
      @destrata6616 4 роки тому

      What's your current YT password in the code

    • @djsnackcakes2795
      @djsnackcakes2795 4 роки тому

      @@destrata6616 81 42 21 81 74 21 53 21 74 74 43 33 43 32 31

    • @djsnackcakes2795
      @djsnackcakes2795 4 роки тому

      @John Melvin not really from my experience

  • @JakeSnake07
    @JakeSnake07 4 роки тому +3

    What you were saying about the lottery actually reminded me of an experience the other day that I had.
    I had my phone out, and I started playing music from one of my playlists, and after I hit play, I noticed that it wasn't set to Random, so I turned that on. Six songs later, and I'd noticed that it'd played all 8 Siousxie and the Banshees songs in the playlist in a row. Obviously, I assumed that it'd justed played down the list in order, until I looked, and saw that it *was* playing randomly. It just happened to randomly choose to play those 8 songs first out of the 200 in the list.

    • @BrandtHughes
      @BrandtHughes 4 роки тому +2

      I swear I remember hearing an anecdote ages ago that what you experienced is effectively what Apple had to engineer their shuffle feature against. They would get complaints about it not being random because of instances like that or repeated songs or whatever, so they made it less random so that it _felt_ more random on the surface. Hopefully I'm remembering that correctly!

  • @silentwraithgaming8631
    @silentwraithgaming8631 4 роки тому +31

    codded message from end:
    hidden in plain sight code remains unsolved. clues come in pairs six in all. 1 code and one place tell you the goal. freshen up on base 2 and much will be told.

    • @DeLegend27
      @DeLegend27 4 роки тому +1

      base 2 is binary. I wonder if there was a secret binary code hidden here too.

    • @mfultimate
      @mfultimate 4 роки тому +1

      The code in the thumbnail says "wpechme cowards", although I might have done it wrong

    • @joblakh
      @joblakh 4 роки тому +1

      it's probably reffering to the "5 Secret Codes Hidden in Plain Sight" video. At the end there was an SSTV signal that led to this image: imgur.com/gUiE9Sn

    • @MyBroadBandToo
      @MyBroadBandToo 4 роки тому

      @@mfultimate welcome cowards

    • @mfultimate
      @mfultimate 4 роки тому

      @@MyBroadBandToo ahh, that makes a lot more sense lol

  • @Gunbudder
    @Gunbudder 4 роки тому +6

    The US Navy used to use a literal pad of flash paper to do OTP communications. Pretty cool stuff

  • @kavalogue
    @kavalogue 4 роки тому +23

    Literally what I wanted right now thanks lads

  • @moebest
    @moebest 4 роки тому +13

    hidden in plain sight... so far so good. *thinking intensifies*

  • @slpk
    @slpk 4 роки тому +4

    A quick clarification:
    What make pseudo-randomness different from true randomness is not its origin (like the human who built the algorithm), but the fact the such algorithms run on deterministic computers, and a deterministic machine can't create true randomness.
    The bugs or errors in the algorithm would be sources of weakness in the pseudo-random data.

  • @IceDragon978
    @IceDragon978 4 роки тому +1

    The concept of passing messages that only a selected group/individual can understand is so fascinating to me. I've used a book cipher, a transposition cipher, and hiding-information-in-plain-sight-behind-what-appears-to-be-nonsense codes; but I'd never heard of One-Time pads. I'll definitely have to dig deeper into that, it seems amazing.

  • @Brady482
    @Brady482 4 роки тому +19

    Me: *Looks at title* "Hmm, it would be a good opportunity for a Nord VPN spons-
    Brian: "This episode is sponsored by Nord VPN"

  • @matthewmashford
    @matthewmashford 4 роки тому +4

    A lot of respect to you Brian, for respecting who and what Grant Thompson did not only as a youtuber but also as a friend
    Thank you
    May he Rest In Peace
    (A part of the journey is the end) RDJ

  • @richardpowell4281
    @richardpowell4281 4 роки тому +3

    Without going into detail. This is basically how Cryptology works in the military. Its usually kept in a safe, that can only be accessed with people that have the appropriate clearance. and each day they input these alpha numeric codes into the system to ensure proper communications.

    • @libertyts
      @libertyts 4 роки тому

      No... not it isn't... not for normal communication networks up to Top Secret at least. There may be exceptions where this is used, but very few and far between. Having been a Signaler for almost 8 years, I had to deal with crypto on a daily basis. It is no secret that most militaries use hardware encryptors with multiple "entry" options for the keys. Manual entry (typing) of keys is extremely rare.

    • @richardpowell4281
      @richardpowell4281 4 роки тому +1

      @@libertyts I should have been more specific. I was an officer on a ship so I know how crypto works. I said "without going into detail" Because yes obviously you don't just sit there and manually send back and forth garbled messages deciphering them manually. However you do input crypto keys using a one time pad that allows your computer systems to decrypt messages being sent that are only good for a certain period. We always knew when crypto hadn't been loaded properly because it would mess with certain systems and call signs would be off. But ya know I kind of didn't want to go into all that..... because its kind of faux pas to discuss cryptology protocol even if the knowledge is available elsewhere. But ya had to chime in...... hope it felt good.

  • @christopherreed4723
    @christopherreed4723 4 роки тому +1

    My personal favorite pen-and-paper encryption is a late WW2 German system called Rasterschlüssel 44. From what I've been able to find on it, it was significantly harder to crack than Enigma. Since it was used primarily for tactical communications, it simply wasn't useful to take a large percentage of the hardware that was being used to attack Enigma traffic offline and allocate it to breaking individual RS44 messages, since the content would have had little operational value by the time it was read. And the machines would *not* have been available to break Enigma messages in that time. Until quite recently the majority of RS44 messages intercepted were unbroken. It was simply too much trouble to attack the system.

  • @Sen-ey5fg
    @Sen-ey5fg 4 роки тому +18

    Candidate Jeep Jop was the first member of TMZ Cobra to be converted into a changeling hybrid creature

  • @FalconicofPern
    @FalconicofPern 4 роки тому +2

    As a linguist and a Deaf Culture/ASL geek: pidgin sign like that can be a good stepping stone to a desire to learn a real sign language, you guys should do a series on learning ASL and local deaf culture interpretation from interpreters/deaf folk!
    Like to signal boost!!!

  • @lane1639
    @lane1639 4 роки тому

    Great video! You guys always brighten my day when I watch a video of yours. They've been great since the start of this channel and I can't wait to see more!

  • @1224chrisng
    @1224chrisng 4 роки тому +32

    yes, One True Pairing(s) are very convoluted

  • @stephenburley4581
    @stephenburley4581 4 роки тому +32

    Candidate Jeep Jop?! You're dating your content! He's The Right Honourable Jeep Jop now!

    • @1224chrisng
      @1224chrisng 4 роки тому +3

      the scary thing is that Rt.-Hon. Former Mayor Jeep Jop of Greater London is in charge of the trident sub nukes, and it's not even with like a complicated password system, it's literally a letter in a safe in another safe with instructions on it

    • @LuxFerre4242
      @LuxFerre4242 4 роки тому +1

      @@1224chrisng Sounds good to me. You can't hack a letter in a safe.

    • @stephenburley4581
      @stephenburley4581 4 роки тому +2

      @@1224chrisng Now, I wasn't gonna get that political... But that made me laugh so hard.

  • @vitus4514
    @vitus4514 4 роки тому +7

    "1 1 1 1 1 1" Well, d&d players knows that it happens

  • @oblonggrape7580
    @oblonggrape7580 4 роки тому

    Sweet!! I love how you guys are delving back into all of the cold war tech you explored earlier in the show's history

  • @TheEraihiryuu
    @TheEraihiryuu 4 роки тому +8

    Yet another brilliant episode. With privacy being harder and harder to secure, something like this is always a interesting subject. Thank you! Oh and no injuries...other than Brian's pride. ^.^

  • @thatrandomperson8263
    @thatrandomperson8263 4 роки тому +1

    You should do more of this ciphers are so cool!

  • @GatlinsFuckinCornfield
    @GatlinsFuckinCornfield 4 роки тому +1

    I like more educational episodes like this please do more of these.

  • @MrNutrio6
    @MrNutrio6 4 роки тому

    These episodes are so fun to watch. Thanks again guys :)

  • @dead-wi2el
    @dead-wi2el 4 роки тому +13

    we all have been trained to know it ws grilled cheese

  • @stormflyer6574
    @stormflyer6574 4 роки тому +15

    The cool kids use the dovah language from skyrim

  • @tzisorey
    @tzisorey 4 роки тому +1

    I remember statistics class in the 90's. Because the internet wasn't really a thing, and computers are as bad as people at generating true randomness - we had to buy a book (same sort of size as an exercise book) filled with just random numbers. The fact they could be used as a One Time Pad did come up in class.

  • @moose43h
    @moose43h 4 роки тому

    I was waiting for this for years

  • @WinsTooLittle
    @WinsTooLittle 4 роки тому

    Notification popped up and I immediately hit the video. Love the vids, keep going lads!

    • @robbzooi
      @robbzooi 4 роки тому

      that makes you special

  • @monazach
    @monazach 4 роки тому +30

    Don’t say first I have a blue shell
    Edit: sorry for doing this but thanks for the likes! It really makes my day!😀

  • @tigerarabia383
    @tigerarabia383 4 роки тому +10

    Teacher sees 8:27
    **Wikipedia isn’t a real reference REEEEEEEEEEEEEEEEE**

  • @upinarms79
    @upinarms79 4 роки тому +1

    If I recall correctly, some number stations had some of their messages decoded because they supposedly got lazy and were re-using OTP keys. Of course it could have just as well been intentional.

  • @MissCin101
    @MissCin101 4 роки тому +1

    So really really similar to the diana cipher. I have the cipher wheel for that one and it also uses the one time pad.

  • @toaster9123
    @toaster9123 4 роки тому

    This is a great video. Thanks!

  • @NinjaProofVest
    @NinjaProofVest 4 роки тому

    Reminds me of the infinite improbability drive from The Hitchhiker's Guide to the Galaxy. When Brian said the lottery numbers being all ones, it reminded me how the IID would take you exactly where you wanted to go because it's so improbable to randomly blink to the location you suggest that it works. Lol. Silly but fun to think about.

  • @739redrose
    @739redrose 4 роки тому +5

    This could be improved by pairing it up with a fountain pen filled with Noodler's Blue Ghost ink. Why that ink? It's waterproof, write the message on the envelope instead of the letter. They won't see that coming LOL
    EDIT: if you want to make a random OTP by hand, use a bag of scrabble pieces. Dip your hand in and record the letters.

  • @curtishoffmann6956
    @curtishoffmann6956 4 роки тому

    As mentioned in other comments below, the table used in the video is basically the Vigenere table. There are a few variations on this, including Beaufort, Variant and Gronsfeld. OTP by itself is nothing really special. If you use a short keyword or phrase, you just keep repeating it to make the full key for the message you're sending. Doing this, though, makes the key periodic, and once someone else figures out what the period is, it's easy to crack the cipher. OTP is just the use of a key that's the same length as the message, so it's not periodic. Reusing an OTP key doesn't automatically compromise the system, because there's no guarantee that your two different messages will contain the same important words. That is, one message could be a weather report, and the other could be "escape now, your cover is blown". What's important, though, is to keep the messages short.
    What makes OTP so secure is that, with the Vigenere table, any message can be created just by changing the key. If the ciphertext is "ccccc", one OTP key could give you "CHESS" and another one could give you "MARTY", yet both keys could be wrong and you'd never know. The real weakness in using pseudo-random number generators is not so much in the predictability of digit strings in a particular OTP key, but that there's going to be repeated strings of digits from one OTP key to the next. If you've captured enough enemy traffic, no matter how many OTP keys have been used, that non-random part in making up ALL the keys on your one-time pad is going to mean that you're going to be able to read parts of different messages.
    As for how to get the OTP to the guy you want to communicate with, how about putting the keys on an SD card and using dead drops?

  • @brianzetzer4227
    @brianzetzer4227 4 роки тому

    Always interesting and funny! Thank you!

  • @calebdaily1049
    @calebdaily1049 4 роки тому +1

    when I was in 7th or 8th grade, the science textbook showed how certain groups of three nucleotides corresponded to specific amino acids. so I started making a similar code that used a pool of five letters instead of DNA's four. this yielded 125 possible results where as if I had gone with four, I would have had only 64

  • @jeffryvaughan3167
    @jeffryvaughan3167 4 роки тому +5

    Actually, your sign for day was pretty close to ASL. Essentially what you did, but backwards.

  • @andrew5689
    @andrew5689 4 роки тому

    Damn, I love this channel so much.

  • @PlagueHD1080p
    @PlagueHD1080p 4 роки тому +1

    Love it guys!

  • @ClokworkGremlin
    @ClokworkGremlin 4 роки тому +1

    I'd always kind of wondered how One-Time Pads work. This basically explains everything and now I want to write a program to use it.
    So the OTP can't be cracked because there's *nothing to crack.* As Jason explains in the episode, each individual letter uses a different encryption key, which is only ever used once and then thrown away.
    Normally, you use an encryption key for an entire message or to identify a person (see PGP signatures... actually that could be a fun episode), but if the key gets compromised somehow, then that entire channel is compromised.

  • @RafaelZolet
    @RafaelZolet 4 роки тому

    The sign used by Brian for "today" is actually very similar with the sign used in brazilian sign language for "morning", because it represents the sunrise, only diference is the hand configuration: in bsl it is with the thumb touching the index finger, like an ok sign

  • @graceatkins7486
    @graceatkins7486 4 роки тому

    As someone who knows American Sign Language, Brain actually signed "today" correctly. One hand rising on the other can be day, Sunrise, or sunset (depending on how you're sign) though sunset is normally going down.

  • @libertyts
    @libertyts 4 роки тому +1

    Ya' killing me! I've spent WAAAAAAAY too long trying to figure this code out. The first layer is simple enough if not a little time-consuming (regretting not writing some code to figure it out for me rather than doing it manually...). Finding those extra clues is not going well though. I feel like you guys did an episode that touched on binary at some stage, but I can't for the life of me figure out which one?!?! Hmmmm, good play boys, good play!

  • @vikingtenfifty
    @vikingtenfifty 4 роки тому +1

    There is also a (MM) in the encoded message that corresponds to two different letters in the decoded message, D and C.

  • @RabidPorkupine
    @RabidPorkupine 4 роки тому

    Assuming that this method does not code word breaks, some information can be inferred by the length of words. It also does not change the overall length of the message.

  • @darkhero6303
    @darkhero6303 4 роки тому

    Loved this video

  • @erwingifslang
    @erwingifslang 4 роки тому

    radioactive decay is seen as random because we haven't found any pattern in it and we don't know all variables that may come in in to it. it is possible that some variables haven't been discovered yet

  • @cipherpunk7409
    @cipherpunk7409 4 роки тому

    It's interesting to note the reason that you cannot reuse the one time pad to encrypt a second message. If someone gets a hold of two messages encrypted with the same key, the security is completely compromised. An attacker would only need to guess at a small portion of the plaintext in either message (a probable word, for example) and test the hypothesized key on the other message to see if it produces additional plaintext. The attack jumps back and forth between the two messages until it totally unravels. It might be a little tedious to do by hand but a computer would crack it nearly instantly.

  • @Performak_YT
    @Performak_YT 4 роки тому +2

    You can encrypt a message, and encrypt the encryption, making it even more secure (but probably you don't need that kind of security...)

    • @TheStrangerous
      @TheStrangerous 4 роки тому +1

      Performak Ah. Yeah. Good point. Multiple layers.

    • @p4nz9r60
      @p4nz9r60 4 роки тому

      In the case of OTP, re-encrypting the already encrypted message would not make it more secure, due to the nature of how OTP works.

  • @rekeamohcsreed7719
    @rekeamohcsreed7719 4 роки тому

    Amazing timing for this one guys 😂

  • @johnechelbarger7832
    @johnechelbarger7832 3 роки тому +1

    YES! The Rogues need to have a secret communication network!

  • @idogtv
    @idogtv 4 роки тому

    Whoa. I kid you not, just today at work I was working on implementing OTP. Although, in this case, OTP stood for "One Time Password" (essentially the same concept, though). But it was interesting to get home after working on "OTP" all day only to see "OTP" in my subscription box.

  • @ContentCalvin
    @ContentCalvin 4 роки тому

    The dank meme material able to be extracted from this one episode is threw the roof son

  • @josephrissler9847
    @josephrissler9847 4 роки тому

    A desktop computer can generate random numbers from human input. The exact timing between keystrokes, for example, is unpredictable. I believe they also incorporate numbers from hardware events (e.g. exactly how long a disk read takes, for example). This works because if you add two random numbers together modulo some maximum value (such as the maximum value that the computer holds in one integer) then you get a number that is more random than either number.

  • @zachdeany626
    @zachdeany626 4 роки тому

    I would like to say thank you for some really personal stuff that I don't really want to say on this public site I just want you to know that you helped me recently

  • @PhazonBlaxor
    @PhazonBlaxor 4 роки тому

    One time pad encrypted messages are like library of babel: the message can be every combination of words within the number of letters it contains. So, you can try to brute force it and find a message that makes sense, but it's not necessarily the real message.

  • @GogiRegion
    @GogiRegion 4 роки тому +1

    I’m surprised you guys didn’t talk about how the only way to get truly random results is with quantum states. The easiest way to do this is with radioactive decay, because the exact intervals and strengths at a given time are truly random. You also can use a quantum computer to generate true random numbers.

    • @BrandtHughes
      @BrandtHughes 4 роки тому

      We did touch on that, although briefly, at 2:42

  • @jamespreston5661
    @jamespreston5661 4 роки тому

    YEAAH NEW UPLOAD

  • @ancientsled4778
    @ancientsled4778 4 роки тому +5

    Brian's made up name in the Nord commercial is "Jeep Jop".
    Brian drives a Jeep.
    Brian's brain is not random.

  • @m4rt_
    @m4rt_ 2 роки тому

    If you have a Vigenère cipher where the key is longer or just as long as the input text, then it is essentially unbreakable, unless you want to do brute forcing and figuring out what outputs might be the right answer, manually or through algorithms or ai.

  • @phonicleproductions
    @phonicleproductions 4 роки тому +3

    I knew it was gonna be grilled cheese as soon as I saw the G. I've been watching too much of these two.

  • @beni9129
    @beni9129 4 роки тому +1

    Nowadays truly random number generators use atmospheric noise to create numbers. Since electrons are truly moving in a random orientation we can discern a number value to certain orientations of an election as it's moving in space. this is how we create random numbers for since related matters like determining where to study a population in a micro population study. Now it's possible that electrons are not random however, we don't know enough about quantum physics to understand them in that way.

  • @jacobyoung7000
    @jacobyoung7000 3 роки тому

    Jason reminds me of Daniel Stern... but funnier. Love the video!

  • @daniellbondad6670
    @daniellbondad6670 4 роки тому

    Knew about the Vigenere cipher and one time pad.But not about adding numbers to the grid.

  • @Zwedgy
    @Zwedgy 4 роки тому +1

    You guys should do the Diffie-Hellman key exchange by hand. This way you can generate a secret between two people without letting anyone listening know the secret.

  • @phauntis
    @phauntis 4 роки тому

    Me and a friend came up with the Hopilop language as kids. Stupidly easy to break but it counts. Clue is in the name and its soooo inefficient. But also have a kind of understood hand/body language thing going with a mate i've played airsoft for years with. Its gotten to a point where we can convey quite complex details across without a word though misinterpretations have happened a plenty

  • @user-vn7ce5ig1z
    @user-vn7ce5ig1z 4 роки тому +2

    2:40 - Half the Internet's security runs on lava lamps (yes that's a simplification and generalization): ua-cam.com/video/1cUUfMeOijg/v-deo.html
    5:39 - It's tricky to do key-exchange, but especially so in-band. But out-of-band key-exchange isn't always practical (Internet).
    6:12 - What you thought is also valid. It doesn't make a difference in which order you index the array, as long as it's consistent.
    Like you said, OTPs aren't practical in some situations like the Internet, so asymmetric/public-key cryptography endures.

  • @Darth_Callous
    @Darth_Callous 4 роки тому

    I remember watching something about a science experiment that used two telescopes which observed separate stars in the night sky and used their twinkling to generate randomness can't remember the specifics or why it was needed but still cool :)

  • @reggiep75
    @reggiep75 4 роки тому

    3:52 - I always remember the number stations vid as it started with 'Man, I miss the Cold War!' and my eyes went like plates and I burst out laughing.
    It was also one the first MR vids I watched and thought 'Where has this true gangstah sh*t been? I shall binge it at once!'

  • @iout
    @iout 4 роки тому

    From what I remember from a book on ciphers and codes I had in middle school, the Vigenere Cipher (the one used in this episode), actually isn't all that secure. Don't get me wrong, It's very secure to the average person, like myself, but to someone with enough experience there is a method of approximation that can get decently close to deciphering a message. I can't remember what it was though.
    Obviously it's a lot easier to crack if you encrypt the message poorly, though. To encrypt the message well use a random key, make the key as long if not longer than the message itself, block your enciphered message so the word lengths don't remain the same as before, keep the message short, etc. All of which are done in this video. It's also possible to make the cipher more secure by rearranging the reference alphabets. So instead of making the top alphabet "abcdefg...", make it "dfgcbae...". Same for the side alphabet. Taking these steps makes the Vigenere cipher more secure, and now that I think about it, it seems like it _should_ be impossible to decode as is, but I seem to recall that there are ways to decode it. And not even with a computer. I could be wrong on that part though.
    Also, coincidentally enough, just this week I finished making a spreadsheet that could encipher and decipher a vigenere encrypted message with given alphabets, input message, and key. Unfortunately, I made it so that it uses just letters and no numbers, so it's annoyingly useless in deciphering that last message in the video.
    Edit: Hmm, Hidden in plain sight, much will be told.

  • @bravok1lo
    @bravok1lo 4 роки тому

    Nice haircut Brian 👍

  • @caydenmcgough8841
    @caydenmcgough8841 4 роки тому

    how do they not have more subs i mean there so good they deserve so much better than this i guess the youtube algorithm doesnt put them on peoples recomended hey keep goin though i think anyone would love these guys if they were more represented

  • @keepitreal8998
    @keepitreal8998 4 роки тому

    Guys that’s amazing!

  • @sr-xv7eu
    @sr-xv7eu 3 роки тому

    Honestly was good to hear you say Scotland.

  • @Guysm1l3y
    @Guysm1l3y 4 роки тому

    You can get "random entropy generators" for computers that look like a USB flash drive to get truly random numbers from quantum processes like the breakdown of a diode junction.

  • @ianmcdaniel7059
    @ianmcdaniel7059 4 роки тому +1

    Awesome

  • @AFrogInTheStars
    @AFrogInTheStars 4 роки тому

    Never been this early wow. And youtube did not notify me
    Also the beginning was gold

  • @X0verXDriveX
    @X0verXDriveX 4 роки тому +1

    Did you guys know that Grant Thompson died in a paragliding accident in Utah on July 29th?

  • @wanna877
    @wanna877 4 роки тому

    The cool part is that you can have 2 pseudo random machines that produce the OTP key, which are synchronized........ and it can be something as small as a thumb drive, or can be made to look like a normal app in a cellphone.

    • @wanna877
      @wanna877 4 роки тому

      (This is pretty much how garage door controller work)

  • @jasonpatterson8091
    @jasonpatterson8091 4 роки тому

    The other quality that a one time pad MUST have is that the pad must be as long or longer than the message that is sent. If not, then it becomes a Vigenere cipher instead, and if the message is longer than the pad and the users cycle through it multiple times, it can be quite easy to determine the key using letter frequency analysis alone (it's not a ONE TIME pad anymore, you know?) This was actually done on some occasions when users weren't given new pads and simply reused old ones. Again, the "one time" part of one time pad is vital.

  • @edu-kt
    @edu-kt 4 роки тому

    0:50 tha reference alone justifies the like.

  • @erustownsend9790
    @erustownsend9790 4 роки тому +1

    In programming random number that special pattern is called a Seed

  • @june012006
    @june012006 4 роки тому +2

    Perhaps I missed it, but one critical requirement is that the key is as long, or longer than the message. Otherwise you have to reuse, which removes the unbreakability of the cipher. Technically though, it's not unbreakable, but if you follow the rules (never reuse), every possible translation is equally probable. The moment your opponent has two messages with the same key, there is a pattern, and it is simple to break.

    • @june012006
      @june012006 2 роки тому

      @Joe King if the key is equal to or greater in length than the message, and is only used for encryption once, then it is actually unbreakable, because literally every possible decrypted value is equally probable. Sure the enemy may correctly guess the translation, but they have no way of knowing that. It has nothing to do with computational power. As soon as the rule is broken though, both messages are vulnerable, as there is only one possible key that will give an intelligible message out of both.

    • @june012006
      @june012006 2 роки тому

      @Joe King the problem has nothing to do with time, or computational power. Every letter in the message effectively has its own key, with no relation to any other letter. Assume a 26 letter character set, for every character X in the encrypted message, there are 26 equally probable possibilities, and the previous and following Xs have no relevance. There is no pattern to discern. Once there is a second message encrypted with the same key however, a pattern will emerge, and decryption is easy. The one time use rule is the only thing that keeps it "unbreakable".

    • @june012006
      @june012006 2 роки тому

      @Joe King computers are great at finding patterns, and in nearly every cipher, there is a pattern to find. With a one time pad, there is no pattern whatsoever. Computers aren't magical, if there is a mathematical way of deriving the answer, a computer will eventually find it, but if there is no mathematical way of finding the answer, the computer is powerless.

    • @june012006
      @june012006 2 роки тому

      @Joe King you clearly haven't understood a thing I've said. A computer cannot find an answer when every single possible answer is equally valid. Most forms of encryption can be broken given enough time, but that's because there is only one correct answer. The one time pad has an infinite number of equally valid possible answers, with no way of determining which is correct.

  • @ThatGuy-ou4ev
    @ThatGuy-ou4ev 4 роки тому

    There is a video somewhere about lavalamps that are recorded to generate truly random codes.

  • @DarkKnightofIT
    @DarkKnightofIT 3 роки тому

    You could go a step further and start from a predetermined number of characters in, like start decrypting from the second line in the key.

  • @TheMaritimeHorror
    @TheMaritimeHorror 4 роки тому +1

    "First letter is going to be G" immediately knew the phrase would be grilled cheese.

  • @MRA_3
    @MRA_3 4 роки тому +1

    Any new viewers, check out the description of this video. It has many additional info and secrets

  • @jamescritchlow3445
    @jamescritchlow3445 4 роки тому

    if im correct that is either the actual sign for day or really close

  • @adammaclean4730
    @adammaclean4730 4 роки тому

    One time these were in fact cracked was by the US governments operation Vernona which exposed the most prolific soviet agent in history known as agent Homer at the time. It was cracked cause during the winter war the fins captured an NKVD division and all their onetime pads which had been mass produced and weren't unique at all because of the need for a massive amount of covert codes

  • @Keyumiz
    @Keyumiz 3 роки тому

    How is the number distribution affected when time is used as a factor for generating the random numbers