Encryption & Entropy - Computerphile

preview_player
Показать описание
Information theory shows entropy works a little differently with encryption. Dr Tim Muller takes us through an example


This video was filmed and edited by Sean Riley.


Рекомендации по теме
Комментарии
Автор

Great video. I'd love to see more about encryption. Maybe even something that's useful without a computer? One time pads and dice can do the trick but you already mentioned the downside of that.

Inkrementalgeber
Автор

Learned so much from the hand waving 😄

guytoob
Автор

Love these last information theory videos, would be cool to see something about soft vs hard decoding

Pau
Автор

I love the way you use magic markers. Please be sponsored and always use it

RobinHagg
Автор

The marker displaying entropy as he writes about entropy lol.

nesmaster
Автор

speaking of entropy, can u cover physical unclonable functions? something on the hardware side? its pretty intriguing

timng
Автор

In future, may I recommend, when you're filming, to get a pen that works?

cassandraspencer
Автор

I always wondered why the vernam cipher was considered 100% secure

theseed
Автор

Very clearly. So do you know about the NXP recommend upgrade DESFire EV2 to EV3 card that is the encryption AES128 problem or another issue? I'm thinking about the ev2 encryption is not security enough and they refer to EV3 with higher encry....can share with me what do you thing?

hoinguyenvinh
Автор

I still don't understand how you transfer the initial secret keys without having the encryption keys, and without anyone else grabbing those keys.

Yupppi
Автор

0:24 Dude, you gotta stop telling everyone the secret to life, the universe, and everything! 😂

bluegizmo
Автор

A wrench, any size, using percussive maintenance, will decrypt that using the right rhythm

ttos
Автор

The weakness in encrytion is not the algorithms, it is that you can compelled to hand the keys over by law.

engineeringvision
Автор

His way of explaining things is at par with his marker quality

arajalali
Автор

What the deal with 42 ? It comes more often than one might expect.

charismaticaazim
Автор

It sounds, naively, that prepending a verification block to the ciphertext is a weakness, but given a suitably large key and a sufficiently strong cipher, it's actually not. There are other methods of verification as well. Notably OpenSSL in CBC mode uses the PKCS#7 unpadding to determine correctness (although it's not completely robust) and modern cipher modes like GCM handle message authentication and integrity as part of the process.

davidgillies
Автор

This could only mean one thing! But I don't know what that is..

ideallyyours
Автор

What?? That was the most ridiculously confusing word salad I’ve heard in a long time, and I actually write programs dealing with cryptography, CSPRNGs, entropy, symmetrical/asymmetrical algorithms, hashes, etc. and have calculated entropy many times. Wow!!🤪

F_viper_pilot
Автор

The 1's in the font in the animation is so weird.

punkdigerati
Автор

20+42 = 2042
I see he’s using Javascript🤣

noir