Encryption Part I: Introduction to Encryption 1

preview_player
Показать описание
The first part of a new series on encryption: what it is, how it works, and how you can protect yourself.
Рекомендации по теме
Комментарии
Автор

Lmao Network Snooping Association. Nice one !

omairbhore
Автор

Even though you said this isn't to get someone in a job for cryptology it made me want to. Thanks for doing so many videos and I can't wait to watch the others. There is so much I want to know and you gave a great intro. and made me feel like although challenging, it was something I can grasp and understand. Thanks so much!! We are having fun here. ;)

Mars
Автор

lol I had to like this video after the NSA joke at the beginning.

mgord
Автор

More, more, I'm lovin' it!
Thanx Shane.

kilroy
Автор

Excellent presentation. Much Appreciated!

TheCTMcG
Автор

Nicely done. It is so very important to know how to keep your personal files and passwords secure and safe.

kuretysoft
Автор

this is really helpful I've been working on a way to decipher encryption codes for a while watching these over again is always helpful thanks ^_^

NYCWIZARD
Автор

Wow. This is fantastic. Such a clear explanation.

yookayman
Автор

"...Alice and Bomb..."

lmao 😂😂😂

_klent
Автор

Quite useful i must say.
definitely going to subscribe to this channel.

RobbieTish
Автор

Thank you very much. A very clean explanation.

pharaohimhotep
Автор

This is very helpful, for the first time I understand this. :)

oliverx
Автор

Haha, you got me on the "Network Snooping Association".

Bubatu
Автор

Lucas Gelf: You posted in a way that won't let me reply, so I hope you're able to find this answer to your question.

XOR is an eXclusive OR, where you compare two bits to see if they match. If they do--if they're 1 1 or 0 0, the resulting bit is 0. If they're different, the resulting bit is 1. XOR is "either, but not both."

We're not worried about characters or whatever. Since the computer works with everything in binary, we XOR things at that level. And yes, the string needs to be the same (or greater) length than the message.

Watch the part beginning at 7:59 to understand what the IV is. Since we don't want to use the same key on the same data twice, we use it as entropy added into the block cipher chain to scramble everything up, so that Tux becomes complete noise, not the Tux-shaped blob in the middle.

shanedk
Автор

After watching this video, I had a couple of questions:

What is an initialization vector and what is xor? I'd assume that one could use a different number of potential codes, other than thirty (ie if you wanted to use more characters), but would one potentially need to have the same amount of possible random numbers? Also, could someone define entropy? I understand basically it is randomizing something more and more each time, but I'm still a bit confused.

Lucas

lucasgelfond
Автор

encrytion router 088 at the end of your router connection different passcode will remain the same but change block router message.

waqertomskinoski
Автор

5:59 I'm lost at how bob can get the pad to decrypt the message but eve can't somehow intercept that pad... doesn't Alice have to send the pad to bob in order for bob to use it? Wouldn't that pad be traveling the same path as the message and therefore the instructions as well as the message could be seen by eve?

kennythawsh
Автор

gave you a like just for the NSA bash.

DaltonHBrown
Автор

Hi, I'm learning encryption and decryption

guidionendonandona
Автор

can u upload a tutorial on video encryption

ccryptoupdates