The ENIGMA of Modern Cryptography

Поділитися
Вставка

КОМЕНТАРІ • 7

  • @juliakruk8184
    @juliakruk8184 8 років тому +1

    I adore your lessons! You explain everything so interesting! Your tutorials helped me to understand IT-Security and to get A+. Thank you very much!

  • @MMABeijing
    @MMABeijing 5 років тому

    thank you Professor, you have successfully conveyed me a real sense of urgency

  • @rustycherkas8229
    @rustycherkas8229 2 роки тому

    Thank you. What was my very, very tentative grasp of the problem has, by your presentation, gained much 'substance'...

    • @GideonTheTeacher
      @GideonTheTeacher  2 роки тому

      Thank you Rusty, glad that this video was useful. Check out the latest: www.linkedin.com/pulse/complexity-class-cryptography-dying-gideon-samid/

    • @rustycherkas8229
      @rustycherkas8229 2 роки тому

      @@GideonTheTeacher
      Yes! Coming from no background (or aptitude, really) in cryptology, your presentation was, for me, very informative about the underpinnings of the science. Again, my thanks...
      Likewise, I stand at the back of the crowd trying to wrap my grey matter around advances in quantum computing... History shows realistic science fiction (or 'magic') becomes fact when given enough time and resources... The downside is to realise that most of the money comes from sources desirous of wielding power over others... *sigh*
      One 'bugbear', that I haven't the ability to resolve, comes from my recent interest in Enigma encryption. I understand the German hubris over 159 quadrillion possibilities providing sufficient complexity to achieve security. I almost understand the efficacy of trying and eliminating vast swathes of possibilities through the codebreakers use of 'cribs'. I think I understand "Enigma's Flaw" imposed by its reflector that was exploited by codebreakers. I would appreciate your comment on a "German workaround" that occurred to me:
      Preparing a message to be enciphered by a device would entail some labour (eg: using "XX" to separate words, writing out numbers (digits) as words, etc.) In my imagination, it would not be difficult to also count and 'circle' every 'n'th letter of the message payload. When using the device, circled letters would bypass the machine; copied directly from 'input' to 'output'. If this were done, ANY letter COULD appear as itself in the ciphertext (each appearing with some periodicity). The daily "grundstellung(?)" instructions to operators could inform both sender and receiver what changing value(s) of 'n' to use each day. (In short: a procedural change not requiring modification of any Enigma devices.)
      I would be very grateful for your comment on this scheme (that's about 80 years too late for the Third Reich to implement.) I wouldn't be here if the war had gone on years longer, so my retrospective intent is purely academic. I'm very glad the good guys won that war.
      Thank you, and thank you for the link to your article.
      Merry Christmas! 🙂

  • @rainbowfx1696
    @rainbowfx1696 7 років тому

    impressive ! I listen it for 4 time because my english is very poor. But I very interested to listen it. It is so helpfull for me to understand this cryptography

  • @timmellis5038
    @timmellis5038 7 років тому

    Yes I agree with the people below, it is good. I kept thinking how I don't really care about war stuff but then I realized my adversary is the guy trying to get my bitcoin. I wonder who it was who realized the keys could be different? You can kind of see how having two keys can help that side out. Then they can play tricks. Like a magician...
    But there's the guy on the other side. He knows how the game is played. What if he's smart as hell, like a Turing... or a Godel?