ADFGVX Cipher: Encryption and Decryption (Updated)

Поділитися
Вставка
  • Опубліковано 9 лип 2024
  • Encryption and Decryption of the World War One ADFGVX Cipher, through examples.
    This video replaces an earlier one with the same content, but has some improvements and corrections.
    #cryptography
  • Наука та технологія

КОМЕНТАРІ • 16

  • @NestPavel
    @NestPavel 2 місяці тому +1

    Came here after Leminno video about Kryptos. Nice video! And the puzzle was fun, althought at first I didn't know what to do with the fact that last row is incomplete. But when you think about it, it becomes more or less obvious.

  • @deandrereichelle831
    @deandrereichelle831 2 роки тому +3

    I see lots of explanations on the famous WWII enigma cipher, but less so the older ciphers that very complex idea was built on the shoulders of, leaving a lot unsaid

  • @MathVisualProofs
    @MathVisualProofs 2 роки тому +2

    Excellent! I teach a course out of The Code Book in Jterm pretty regularly and we do this cipher. I’ll have them watch this next time I teach it.

  • @zhetianzhu2150
    @zhetianzhu2150 2 роки тому +1

    I am currently learning cryptography, and I found all your videos very useful. Thank you for these amazing works!

  • @johnjamesbaldridge867
    @johnjamesbaldridge867 2 роки тому

    First, I've watched a countless (but countable) number of math(s) videos on UA-cam over the years and I'm thrilled the algorithm finally landed me here. I've also done the deep dive into Enigma and, even more interesting, Colossus, the Tiltman break, Tommy Flowers, and all that. I've also seen how the Playfair cipher was used by the Brits in WWII, whose cracking by the Germans was ultimately discovered by Enigma after much damage to northern shipping (they has lost access to Naval Enigma, and regaining that is a story in and of itself), and how the cracking of Italian merchant shipping and low-level Luftwaffe messages using those (Playfair?) and similar ciphers was even more responsible for disrupting Rommel's supply chain in North Africa than Bletchley Park. With that overly long preface, my question has to do with the American Civil War. Grant's, Sherman's, and Horace Porter's memoirs often point out that they had cracked Lee's communications, particularly around Petersburg and Richmond later in the war, hinting at the idea that there were several individual telegraph operators who got really good at it. I've not been able to find any direct information about the ciphers used and whether the CSA had cracked any Union communications, so I'm wondering about that. Love this channel!!!

  • @veehope2702
    @veehope2702 Рік тому

    I would be fascinated in seeing a cryptanalysis of this cipher.

  • @deandrereichelle831
    @deandrereichelle831 2 роки тому +1

    Great explanation! -doggo

  • @iirmii5166
    @iirmii5166 Рік тому +2

    How do you do it if you only know that the cey is 4 letters long without knowing the exact cey?

  • @123bubbleup
    @123bubbleup 2 роки тому

    Awesome!!

  • @Halfcast365
    @Halfcast365 7 місяців тому +1

    when you divide by 6 you get 3 remainder 4? what are you dividing? assuming you are dividing 22 by 6, this is giving us 3.6. could you clarify this part as as you stated it gets tricky but you dont explain the workings of this very clearly

  • @MrKaje72
    @MrKaje72 10 місяців тому +3

    Wait, i don’t understand how you knew the column 2,6 would be the ones to have 3 letters. 3 remainder 4 i understood, but why columns 2 and 6?

    • @3omarhd878
      @3omarhd878 2 місяці тому

      in my opinion , its because when we write the arranged cipher text it dont have gaps in between , i mean i dont have a proof or evidence "why" since she didnt have the time to explain , but you can observe it logically .

  • @electra_
    @electra_ Рік тому +2

    Idea on how to crack:
    Separate the outputs into columns. You won't know which column goes where, but you can do frequency analysis on them. You should see a different frequency pattern for the rows and the columns, since they're generated from a fundamentally different mapping of the inputs.
    Now, pair different row and column groups up, and consider their frequency when put into letters. Comparing the different frequencies of these, you should find a set of frequencies that all match with each other, these are the frequencies of the actual letters. You can now do a simple frequency analysis on this frequency to reverse the polybius square.

  • @ruralcoder
    @ruralcoder 2 роки тому

    Microsoft Access 97 used ADFGVX Cipher! 14x14 polibius square!

  • @user-ll7mp7qx8d
    @user-ll7mp7qx8d 5 місяців тому

    Nn