Symmetric Key Cryptography: The XOR Cipher

Поділитися
Вставка
  • Опубліковано 2 бер 2019
  • This is the fourth in a series about cryptography; an extremely important aspect of computer science and cyber security. It covers the XOR logical operation, that is the exclusive OR operation, explaining how it can be used to encrypt and decrypt a sequence of binary digits. XOR is an important process that is employed by many modern day ciphers. Using a spreadsheet, this video demonstrates how the XOR logical operation can be applied to a single character ASCII code to encrypt and decrypt it using the same symmetric key, and the same method.

КОМЕНТАРІ • 67

  • @marshall02019
    @marshall02019 4 роки тому +38

    coming from a professional procrastinator, this video was very well put together and easy to follow. thanks a lot!

  • @s.garabet1677
    @s.garabet1677 2 роки тому +3

    This was very well explained. Thank you. It amazes me how some modern textbooks are written by people who likely can't even explain the concepts in person.

  • @inarisound
    @inarisound 4 роки тому +5

    This channel is a goldmine, thank you so much for your extraordinary work!

  • @weslaycock466
    @weslaycock466 3 роки тому +4

    First time I was able to put the XOR decryption process to practice, feels good thank you.

  • @joykou2233
    @joykou2233 5 років тому +3

    and you also explained the name of 'XOR' . shouldn't we know the nature of a thing and then learn how to use it.
    it's really a good way to learn everything!

  • @joykou2233
    @joykou2233 5 років тому +4

    it's really a wonderful video explaining xor and encryption. compared with all other ones i watched this one just makes everything simple and easy for understanding.
    thank you!
    and i'm looking forward to more videos from you!!

    • @dieglhix
      @dieglhix 4 роки тому

      Agree wonderful is the word I also typed. I was feeling like a moron for not understanding until I found this ! Mind blown!

  • @estellamariegulles2483
    @estellamariegulles2483 4 роки тому +2

    Your explanation is unquestionable and I like how clear your voice is, keep it up! I've subscribed :)

  • @TheRen0gade
    @TheRen0gade 3 роки тому

    Simple and easy to understand. Thank you.

  • @kayquer
    @kayquer 3 роки тому +1

    Thanks for the effort in making this video. It really clarify and thought us how to think about symmetric cryptography. 👏🏻

  • @velezmusic4350
    @velezmusic4350 2 місяці тому

    Great explanation boss!

  • @belatcradus6123
    @belatcradus6123 3 роки тому +1

    Well done.
    Thanks for sharing your knowledge with others.

  • @latedeveloper7836
    @latedeveloper7836 2 роки тому +4

    2:38 Encryption using the XOR function
    2:42 Break down into separate cells
    2:50 Any random sequence of 8 bits for the secret key
    3:20 Applying the key comparing pairs of bits using XOR operation
    3:50 Write 1 if they are different, "1 or the other is a 1", or "exclusively a 1".
    7:00 Binary to ASCII in Excel
    7:12 ASCII to Letters in Excel.
    7:30 Practice exercise

    • @ComputerScienceLessons
      @ComputerScienceLessons  2 роки тому +1

      Thanks. If you don't mind, I will add these to the video description, so they become chapters? :)KD

  • @luispagarcia
    @luispagarcia 4 роки тому +1

    So clear, thank you!

  • @annanyaartworks8244
    @annanyaartworks8244 5 років тому +2

    Its really helpful 👌👍 thank you

  • @billchen4923
    @billchen4923 3 роки тому +1

    Beautiful explanation, thank you very much.

  • @itsmeayan1728
    @itsmeayan1728 5 років тому +1

    Awesome video

  • @hecker688
    @hecker688 2 місяці тому +1

    well summarized and easy to understand, nice video!
    Here's the answer (spoiler!)
    decrypted binary -> 01111010 01101001 01110000
    decrypted ascii -> zip

  • @marcosduran3091
    @marcosduran3091 2 роки тому +1

    This is SOOOOO appreciated.

  • @Charlestonmike34
    @Charlestonmike34 3 роки тому +1

    excellent explanation! Thanks!

  • @LeittWolff
    @LeittWolff 4 роки тому +1

    Very nice explained... THANK YOU

  • @1CoreGame
    @1CoreGame Рік тому

    perfect explanation thanks!

  • @merlynsalomon9922
    @merlynsalomon9922 3 роки тому

    To the point! Thank you

  • @jheffmat3263
    @jheffmat3263 4 роки тому

    good and easy explanation
    :) thanks

  • @jaithranotla3783
    @jaithranotla3783 3 роки тому +1

    ❤️ed your explanation

  • @isbeb507
    @isbeb507 3 роки тому +1

    this helped me!

  • @dieglhix
    @dieglhix 4 роки тому +1

    Just wonderful wow

  • @mohammadaljboury878
    @mohammadaljboury878 2 роки тому +1

    Thanks.

  • @raghupal.v9751
    @raghupal.v9751 4 роки тому +1

    Super

  • @semiileka9571
    @semiileka9571 4 роки тому

    encryption is achieved by the function Y= E(K, X). using this function and given the key 1010011001, encryption the message 0011011 using the AND principle.

  • @sengi12
    @sengi12 5 років тому +2

    btw you make excellent videos! Are you involved in cyber security or computer engineering in any way?

    • @ComputerScienceLessons
      @ComputerScienceLessons  5 років тому +3

      Just a computer science teacher.

    • @ihabayoub688
      @ihabayoub688 4 роки тому +1

      Computer Science JUST!! a computer science teacher, I think you're doing a great job

  • @m.alaiady3627
    @m.alaiady3627 4 роки тому +1

    if you guys wondering what was the result of encrypt the letter 'z' it was '/'' :)

  • @angrysunshinebandit5114
    @angrysunshinebandit5114 2 роки тому +1

    what would happen in a situation in which there is an 8-bit symmetric binary encryption key, but a 16-bit binary value to encrypt using the XOR method.
    For example with a credit card number, turning each of the individual digits into 4-bit binary values, then combining every 4 into 16-bit chunks then encrypting them.

  • @JohnSmith-eo5sp
    @JohnSmith-eo5sp 3 роки тому

    The Vernam Cipher introduced this concept when it was patented in 1919

  • @xavierarana5109
    @xavierarana5109 3 роки тому +1

    can you do this without using binary digits? Like just with the original ASCII code?

    • @ComputerScienceLessons
      @ComputerScienceLessons  3 роки тому

      Original ASCII codes ARE in binary. Computers transmit them with pulses of electricity and store them with devices that can be on or off (such as transistors). We express ASCII codes in denary (base 10), and sometimes hexadecimal (base 16) because that makes it easier for computer scientists to talk about them. The XOR cipher only works with binary digits. You can't XOR base 10 numbers together. I'm not aware of a base 10 equivalent. Interesting question! :)KD

  • @lordfresh
    @lordfresh 2 роки тому

    Fucking good

  • @lllreddy829
    @lllreddy829 2 роки тому +1

    what is the answer of this question

  • @criticalminds1028
    @criticalminds1028 4 роки тому +4

    zip

  • @sengi12
    @sengi12 5 років тому +2

    zip spoiler alert

  • @kw0505
    @kw0505 3 роки тому +3

    zip