Symmetric Key Cryptography: The XOR Cipher

preview_player
Показать описание
This is the fourth in a series about cryptography; an extremely important aspect of computer science and cyber security. It covers the XOR logical operation, that is the exclusive OR operation, explaining how it can be used to encrypt and decrypt a sequence of binary digits. XOR is an important process that is employed by many modern day ciphers. Using a spreadsheet, this video demonstrates how the XOR logical operation can be applied to a single character ASCII code to encrypt and decrypt it using the same symmetric key, and the same method.
Рекомендации по теме
Комментарии
Автор

coming from a professional procrastinator, this video was very well put together and easy to follow. thanks a lot!

marshall
Автор

This was very well explained. Thank you. It amazes me how some modern textbooks are written by people who likely can't even explain the concepts in person.

s.garabet
Автор

First time I was able to put the XOR decryption process to practice, feels good thank you.

weslaycock
Автор

and you also explained the name of 'XOR' . shouldn't we know the nature of a thing and then learn how to use it.
it's really a good way to learn everything!

joykou
Автор

This channel is a goldmine, thank you so much for your extraordinary work!

inarisound
Автор

it's really a wonderful video explaining xor and encryption. compared with all other ones i watched this one just makes everything simple and easy for understanding.
thank you!
and i'm looking forward to more videos from you!!

joykou
Автор

Your explanation is unquestionable and I like how clear your voice is, keep it up! I've subscribed :)

estellamariegulles
Автор

2:38 Encryption using the XOR function
2:42 Break down into separate cells
2:50 Any random sequence of 8 bits for the secret key
3:20 Applying the key comparing pairs of bits using XOR operation
3:50 Write 1 if they are different, "1 or the other is a 1", or "exclusively a 1".
7:00 Binary to ASCII in Excel
7:12 ASCII to Letters in Excel.
7:30 Practice exercise

latedeveloper
Автор

Thanks for the effort in making this video. It really clarify and thought us how to think about symmetric cryptography. 👏🏻

kayquer
Автор

well summarized and easy to understand, nice video!

Here's the answer (spoiler!)

decrypted binary -> 01111010 01101001 01110000
decrypted ascii -> zip

hecker
Автор

Well done.
Thanks for sharing your knowledge with others.

belatcradus
Автор

Beautiful explanation, thank you very much.

billchen
Автор

Simple and easy to understand. Thank you.

TheRengade
Автор

encryption is achieved by the function Y= E(K, X). using this function and given the key 1010011001, encryption the message 0011011 using the AND principle.

semiileka
Автор

btw you make excellent videos! Are you involved in cyber security or computer engineering in any way?

sengi
Автор

what would happen in a situation in which there is an 8-bit symmetric binary encryption key, but a 16-bit binary value to encrypt using the XOR method.

For example with a credit card number, turning each of the individual digits into 4-bit binary values, then combining every 4 into 16-bit chunks then encrypting them.

angrysunshinebandit
Автор

if you guys wondering what was the result of encrypt the letter 'z' it was '/'' :)

m.alaiady
Автор

can you do this without using binary digits? Like just with the original ASCII code?

xavierarana
Автор

The Vernam Cipher introduced this concept when it was patented in 1919

JohnSmith-eosp