Basics of Cryptology – Part 20 (Cryptanalysis – Cost & Fitness Functions - Language Models)
#cryptology, #cryptography, #cryptanalysis, #lecture, #course, #tutorial
In this video, we show the basics of cryptology (cryptology = cryptography and cryptanalysis).
This video here gives an introduction and overview of cost functions. We use cost functions in heuristics like hill climbing, simulated annealing, and genetic algorithms. This particular video here introduces language models. A language model assigns a float value to a given text, which indiciates how close the text content is to a language, e.g. English. As a rule of thumb, one can say, that the "better" a key in our cryptanalysis of a classical cipher is, the "better" is the cost value.
If you want to have a look at hill climbing, you may watch our video about that (Part 8 of this series): https://youtu.be/RB5rDdEAF7U
Here is a video about genetic algorithms (Part 10 of this series): https://youtu.be/-fKswAHcUdQ
And here is a video about entropy (Part 4 of this series): https://youtu.be/76eBFVBnYnQ
To see all videos in the "Basics of Cryptology" series, use this playlist: https://www.youtube.com/playlist?list=PLMuvAbyIl0PT6zaRVpK0FCSNMgwAOckTt
If you are interested in details about CrypTool 2, you may have a look at this video here, which gives a short introduction: https://www.youtube.com/watch?v=dELT2-Vgsr8
Finally, you may download the latest version of CrypTool 2 here: https://www.cryptool.org/en/ct2/downloads
Видео Basics of Cryptology – Part 20 (Cryptanalysis – Cost & Fitness Functions - Language Models) канала Cryptography for Everybody
In this video, we show the basics of cryptology (cryptology = cryptography and cryptanalysis).
This video here gives an introduction and overview of cost functions. We use cost functions in heuristics like hill climbing, simulated annealing, and genetic algorithms. This particular video here introduces language models. A language model assigns a float value to a given text, which indiciates how close the text content is to a language, e.g. English. As a rule of thumb, one can say, that the "better" a key in our cryptanalysis of a classical cipher is, the "better" is the cost value.
If you want to have a look at hill climbing, you may watch our video about that (Part 8 of this series): https://youtu.be/RB5rDdEAF7U
Here is a video about genetic algorithms (Part 10 of this series): https://youtu.be/-fKswAHcUdQ
And here is a video about entropy (Part 4 of this series): https://youtu.be/76eBFVBnYnQ
To see all videos in the "Basics of Cryptology" series, use this playlist: https://www.youtube.com/playlist?list=PLMuvAbyIl0PT6zaRVpK0FCSNMgwAOckTt
If you are interested in details about CrypTool 2, you may have a look at this video here, which gives a short introduction: https://www.youtube.com/watch?v=dELT2-Vgsr8
Finally, you may download the latest version of CrypTool 2 here: https://www.cryptool.org/en/ct2/downloads
Видео Basics of Cryptology – Part 20 (Cryptanalysis – Cost & Fitness Functions - Language Models) канала Cryptography for Everybody
Показать
Комментарии отсутствуют
Информация о видео
18 декабря 2020 г. 16:38:29
00:17:05
Другие видео канала
Zodiac Killer Ciphers – Let's have a Look at Unicity Distances With Excel10 - Automatic Translation of CrypTool 2 To a New Language04 - Internationalization of the Component (CrypTool 2 Development Series)My Cryptologic Highlights of 2020Crypto Challenge Contest – Video 1Basics of Cryptology – Part 2 (Cryptanalysis – Terminology & Classical Ciphers)Enigma Machine – Part 1 of 2 – How does it work?Digital File Signatures – How Do They Protect Your Computer?Basics of Cryptology – Part 22 (Cryptography – Kerckhoffs' Principle & Modern Cryptographic Goals)Let's Decipher a Letter of the Silent Film Star Mary Miles Minter That Lead to a ScandalBasics of Cryptology – Part 9 (Modern Cryptography – Block Ciphers – Feistel Ciphers & SDES)The Straddling Checkerboard Cipher ExplainedLet's Decipher Two Encrypted English Postcards – Secret Messages From the Past RevealedLet's Break My Self-Made Cryptographic Challenges From HistoCrypt 2019Basics of Cryptology – Part 23 (Cryptography – Modern Hybrid Encryption)Break an Encrypted Letter of a Child KillerBasics of Cryptology – Part 17 (Cryptography/Cryptanalysis – Keyspace and Keyspace Size)An Encrypted Description of a Secret Magic Machine in an 18th Century Alchemy BookLet's Program a Hash Preimage Searcher to Break PasswordsBasics of Cryptology – Part 14 (Modern Cryptography – Passwords)