Symmetric Key Cryptography: The XOR Cipher
Вставка
- Опубліковано 2 бер 2019
- This is the fourth in a series about cryptography; an extremely important aspect of computer science and cyber security. It covers the XOR logical operation, that is the exclusive OR operation, explaining how it can be used to encrypt and decrypt a sequence of binary digits. XOR is an important process that is employed by many modern day ciphers. Using a spreadsheet, this video demonstrates how the XOR logical operation can be applied to a single character ASCII code to encrypt and decrypt it using the same symmetric key, and the same method.
coming from a professional procrastinator, this video was very well put together and easy to follow. thanks a lot!
You are very welcome. Thanks for getting around to commenting :)KD
This was very well explained. Thank you. It amazes me how some modern textbooks are written by people who likely can't even explain the concepts in person.
Thank you. You're very kind :)KD
This channel is a goldmine, thank you so much for your extraordinary work!
First time I was able to put the XOR decryption process to practice, feels good thank you.
Delighted to help :)KD
and you also explained the name of 'XOR' . shouldn't we know the nature of a thing and then learn how to use it.
it's really a good way to learn everything!
it's really a wonderful video explaining xor and encryption. compared with all other ones i watched this one just makes everything simple and easy for understanding.
thank you!
and i'm looking forward to more videos from you!!
Agree wonderful is the word I also typed. I was feeling like a moron for not understanding until I found this ! Mind blown!
Your explanation is unquestionable and I like how clear your voice is, keep it up! I've subscribed :)
Welcome aboard. :)KD
Simple and easy to understand. Thank you.
Thanks for the effort in making this video. It really clarify and thought us how to think about symmetric cryptography. 👏🏻
my pleasure :)KD
Great explanation boss!
Well done.
Thanks for sharing your knowledge with others.
My pleasure :)KD
2:38 Encryption using the XOR function
2:42 Break down into separate cells
2:50 Any random sequence of 8 bits for the secret key
3:20 Applying the key comparing pairs of bits using XOR operation
3:50 Write 1 if they are different, "1 or the other is a 1", or "exclusively a 1".
7:00 Binary to ASCII in Excel
7:12 ASCII to Letters in Excel.
7:30 Practice exercise
Thanks. If you don't mind, I will add these to the video description, so they become chapters? :)KD
So clear, thank you!
Its really helpful 👌👍 thank you
Beautiful explanation, thank you very much.
You're most welcome :)KD
Awesome video
well summarized and easy to understand, nice video!
Here's the answer (spoiler!)
decrypted binary -> 01111010 01101001 01110000
decrypted ascii -> zip
Thank you :)KD
This is SOOOOO appreciated.
You're very welcome :)KD
excellent explanation! Thanks!
You are welcome ,and thank you :)KD
Very nice explained... THANK YOU
You are welcome. :)KD
perfect explanation thanks!
Thank you. You are most welcome :)KD
To the point! Thank you
good and easy explanation
:) thanks
Thanks for the comment. :) KD
❤️ed your explanation
Thank you :)KD
this helped me!
YW :)KD
Just wonderful wow
Thank you so much 😀KD
Thanks.
You're welcome :)KD
Super
Thanks :)KD
encryption is achieved by the function Y= E(K, X). using this function and given the key 1010011001, encryption the message 0011011 using the AND principle.
btw you make excellent videos! Are you involved in cyber security or computer engineering in any way?
Just a computer science teacher.
Computer Science JUST!! a computer science teacher, I think you're doing a great job
if you guys wondering what was the result of encrypt the letter 'z' it was '/'' :)
what would happen in a situation in which there is an 8-bit symmetric binary encryption key, but a 16-bit binary value to encrypt using the XOR method.
For example with a credit card number, turning each of the individual digits into 4-bit binary values, then combining every 4 into 16-bit chunks then encrypting them.
Interesting question. Why not give it a try? :)KD
The Vernam Cipher introduced this concept when it was patented in 1919
can you do this without using binary digits? Like just with the original ASCII code?
Original ASCII codes ARE in binary. Computers transmit them with pulses of electricity and store them with devices that can be on or off (such as transistors). We express ASCII codes in denary (base 10), and sometimes hexadecimal (base 16) because that makes it easier for computer scientists to talk about them. The XOR cipher only works with binary digits. You can't XOR base 10 numbers together. I'm not aware of a base 10 equivalent. Interesting question! :)KD
Fucking good
what is the answer of this question
Not telling :)KD
zip
zip spoiler alert
zip
Penny dropped?