This is not One Time Pad encryption. NOT AT ALL. One Time Pad uses a key that is choosen at random, and never re-used (hence "one time"). What is shown here is symmetric encryption. Real One Time Pad encryption is unbreakable. Don't rely on this video.
One-Time-Pad uses SYMMETRIC encryption, meaning the same key is used for both encryption and decryption. in this video he used "KEYWORD" as an example of a secret keyword that is used only once, and is equal or longer than the plain text. This video is a very good and very simple illustration on how a One-Time-Pad work.
"symmetric encryption" isn't really a certain kind of encryption though, it's more like an umbrella type OTP is a kind of symmetric encryption and symmetric encryption can still be unbreakable
@@bobomar5289 Spot On. KEYWORD is the non-fixed or variable element, and MILINT Agents or standard HUMINT spies, they would get their KEY in numbers, letters or a mix, using radio beeps, morse code, or notes/communication. OTPs are unbreakable because even if CI/COINT tries to work, it would have served its use and will not be used again (they strictly watch this).
You missed one idea of this cipher... You didnt explain what happens when the sum of 2 characters is greater then 26. Other then that, good visual learning.
For decryption check subtraction of key letter's number from addition of 26 and the cipher letter's number. If it's lower than 26 just subtract key from the ciphertext. If it's bigger than 25, subtract key letter's number from the addition of 26 and cipher text and then convert it to letter. I made a script to test brute forcing this with a simple php script. It generated 999999 tries within 10 seconds but literally you could find too many MEANINGFUL words mixed in them.
This video only exlains how to convert a plain text into chphertext, but it doesn't explain anything about a One-Time-Pad. What is an OTP? What are the rules for an OTP? How often can you use an OTP? And so on and so on.
Wrong, one-time pad demands you use a "random" keyword, and you have to make sure you use only once. What you explained is the regular Vigenere Cipher.
It is diffrent because you use the key once, then you eat it or burn it or something but other than that pretty much the same although different ciphers than this can also be one time pads if you only use the key once and never again.
you can repeat the KEYWORD, but ideally you have a keyword that is the same length as the message. For example an extract from a book chosen at random.
@@betos-08 if you mix the plain text and key well, even though you keep the keyword smaller than the plain text, it will be good. security decreases but still is very uncrackable. though, it should still be random. i tested it with a php script that generated about 1 million different results with different keys, there were tons of meaningful long words.
uhhh, i dont know what "mod 26" is, do you mean use it as the modulus(idk if im right there) as in, take 35-26 to find the number of places past 26 it is, then use the value assigned as 9?
@@valdecoxib mod is modulus yeah. mod 26 is dividing a number by 26 and the answer is what is left over. So if i did 6 mod 2 the answer would be 0 because 2 goes into 6 evenly 3 times. 6 mod 2 = 0. 6 mod 4 = 2 because 4 goes into 6 once and then there is 2 left over.
this is completely wrong....in one time pad the length of plain text and keyword should be equal, but above in the video it's not same.so don't trust this video's correctness just by the background music dudes
@@franksinatraaintmydadnah3907 Modulus is the answer. What else to say in that man? If someone is doing cryptography then it's the most basic part of that. As per the Forouzan book of Cryptography, encoding the alphabet with mod 26 is the first basic cipher, Ceaser cipher comes after the basic one, which is related to adding 3. So, this one-time pad comes after too many of those.
if you knew the keyword and the numbering of the alphabet: then (Ciphertext Character - Keyword Character) % 26 = The Plaintext word example: 0[14] - K[14] %(mod) 26 = M[12]
Example plain text = bad = 103 Keyword = dab = 301 Encryption = 404 = eae decryption, since you know the key is dab = 301, then encryption - keyword, = 404-301 = 103 = bad, easy??, Very if you have the keyword
Had me on the edge of my seat, what a thriller!
hah !!!
indeed! Felt like I was decoding a nuclear launch code
Great 💯
For one moment I thought I'm in the middle of a strategic game !
fr fr !!
why this feels like a action movie
Thanks for creating the horror effect ☺️
Finally, a concise explanation of how a one-time pad works with a tidy and understandable example.
The music also enhanced the experience.
I'm feeling the adrenaline learning this on god 🙌
on god frfr 💯
This is not One Time Pad encryption. NOT AT ALL.
One Time Pad uses a key that is choosen at random, and never re-used (hence "one time").
What is shown here is symmetric encryption.
Real One Time Pad encryption is unbreakable.
Don't rely on this video.
One-Time-Pad uses SYMMETRIC encryption, meaning the same key is used for both encryption and decryption.
in this video he used "KEYWORD" as an example of a secret keyword that is used only once, and is equal or longer than the plain text.
This video is a very good and very simple illustration on how a One-Time-Pad work.
"symmetric encryption" isn't really a certain kind of encryption though, it's more like an umbrella type
OTP is a kind of symmetric encryption and symmetric encryption can still be unbreakable
@@bobomar5289 Spot On. KEYWORD is the non-fixed or variable element, and MILINT Agents or standard HUMINT spies, they would get their KEY in numbers, letters or a mix, using radio beeps, morse code, or notes/communication. OTPs are unbreakable because even if CI/COINT tries to work, it would have served its use and will not be used again (they strictly watch this).
actually I think we all know what the preconditions are for the OTP...😎
Give me a break. I watched 5 of these vids and still dont get it. This is the closest one and still dont!
Thank you! This was really helpful!
Explain very well but so scary to listen the BGM 😭🙏
Now I know what the numbers mean
Wonderful explanation
No one asked
well presented, just 1 minute but very clear. xoxox
Its also called the vigenere cipher by the way
I am near my exam hall with this
Nice explain so quick
You missed one idea of this cipher... You didnt explain what happens when the sum of 2 characters is greater then 26. Other then that, good visual learning.
you just go back around the list of numbers so if you reach 25 but there is some left over you go back to 0 and continue
for every character -> (Plaintext Character + Keyword Character) % 26 (the alphabet size) = Ciphertext Character
I have a home work with vernam chiper.I have problem with descryption not match with the plaint text after Descrypt
@Jack Obrein % is the modulo operator not multiplication en.wikipedia.org/wiki/Modulo_operation
For decryption check subtraction of key letter's number from addition of 26 and the cipher letter's number. If it's lower than 26 just subtract key from the ciphertext. If it's bigger than 25, subtract key letter's number from the addition of 26 and cipher text and then convert it to letter. I made a script to test brute forcing this with a simple php script. It generated 999999 tries within 10 seconds but literally you could find too many MEANINGFUL words mixed in them.
This is Vigenere cipher...Dont misguide please. Btw nice thriller😂
This is vigenere cipher unless I'm getting something wrong.
bruuuuhh...music semmaaa brooooooo⚡⚡
This video only exlains how to convert a plain text into chphertext, but it doesn't explain anything about a One-Time-Pad.
What is an OTP? What are the rules for an OTP? How often can you use an OTP? And so on and so on.
Wrong, one-time pad demands you use a "random" keyword, and you have to make sure you use only once. What you explained is the regular Vigenere Cipher.
Anyone that starts a response with "wrong" immediately discloses to the audience they are a child. One seeking validation.
Nice video
Yes very naice video nigma miracle
it is wrong in cipher text you write A but A+R=17 means =R the Ans =ORGCR
(plain text + Key) mod 26 = you will get the cipher
thank you! My exam is in an 1 hr :)
Mind explaining how is this different with vigenere cipher?
It is diffrent because you use the key once, then you eat it or burn it or something but other than that pretty much the same although different ciphers than this can also be one time pads if you only use the key once and never again.
if the plain text's lenght is longger than KEYWORD, what to do next?
you can repeat the KEYWORD, but ideally you have a keyword that is the same length as the message. For example an extract from a book chosen at random.
@@AppleMak2010 No, the key must have minimum the same size. If you reuse the key, you have a problem.
@@MBatYT Yes that's what I was saying, but not very well. You can repeat the keyword, but that reduces the security of the message. Cheers
@@betos-08 The keyword is a random set of letters, not words as such.
@@betos-08 if you mix the plain text and key well, even though you keep the keyword smaller than the plain text, it will be good. security decreases but still is very uncrackable. though, it should still be random. i tested it with a php script that generated about 1 million different results with different keys, there were tons of meaningful long words.
anyone else here bc of school?
But I thought tha One Time Pad is based on The XOR operation .
It is.. I think that this guy oversimplified the concept...
Binary XOR is a kind of modulo 2
Best explanation,thanks
good good
aren't they supposed to mod 26?? so the sum of the plain and keyword = 35 (for example) then 35 mod 26 = cipher text??
uhhh, i dont know what "mod 26" is, do you mean use it as the modulus(idk if im right there)
as in, take 35-26 to find the number of places past 26 it is, then use the value assigned as 9?
@@valdecoxib mod is modulus yeah. mod 26 is dividing a number by 26 and the answer is what is left over. So if i did 6 mod 2 the answer would be 0 because 2 goes into 6 evenly 3 times. 6 mod 2 = 0. 6 mod 4 = 2 because 4 goes into 6 once and then there is 2 left over.
Yeah but I have the phrase "bringchange", how do I encrypt that?
I wish my teacher had just showed me this video
One-Time Pad: Ciphertext = (Plaintext + Keyword) mod 26
Goray Ka bacha movie music on cypher iron man coming alive
thankyou.
هذه خوارزمية فيجنيير
what is the difference between it and vigenre?
the same question 😂
Beyhadh bgm Ano ith 🌝
this is completely wrong....in one time pad the length of plain text and keyword should be equal, but above in the video it's not same.so don't trust this video's correctness just by the background music dudes
and how to decrypt it? 🤪🤓
good job
This is using vignere cipher and its NOT AT ALL O-T-P
Am I missing something ..... How does 8 + 24 = 6; 12 + 14 = 0 etc?
Modulus man 🤦
(24+8) mod 26 = 6
@@vaibhav1180 don't be cocky if you can't answer someone's request. Get lost.
@@franksinatraaintmydadnah3907 Modulus is the answer. What else to say in that man? If someone is doing cryptography then it's the most basic part of that. As per the Forouzan book of Cryptography, encoding the alphabet with mod 26 is the first basic cipher, Ceaser cipher comes after the basic one, which is related to adding 3. So, this one-time pad comes after too many of those.
@@franksinatraaintmydadnah3907 So, there wasn't anything about getting cocky in the first place. Think with a cool mind before writing all that.
but...how do you decypher it?
if you knew the keyword and the numbering of the alphabet: then (Ciphertext Character - Keyword Character) % 26 = The Plaintext word
example: 0[14] - K[14] %(mod) 26 = M[12]
Example plain text = bad = 103
Keyword = dab = 301
Encryption = 404 = eae
decryption, since you know the key is dab = 301, then encryption - keyword, = 404-301 = 103 = bad, easy??, Very if you have the keyword
welp i did by trying adding 26 to the cipher text and subtracting key from it. if it's bigger than 25 i just subtract key from cipher itself.
I understand
I was keeping up till
I8 +Y 24 = 6 WT……?
G6 +w22=2 WT……?
M12 + o14=0 WT…..?
How are you coming up with this Ya lost me
吊炸天
Salah dong...
Key = KEYWORD bukan KERWOR
LQQRVYFU
(my profile name without spaces is the keyword)
IMMOTLT
Key is my username with no spaces: KVGPSDKOPSSEEHAGKL
lame duck because the key has to be as long as the message ie no repeating patterns.. else the message is longer key is longer yawns..