Basics of Cryptology – Part 4 (Modern Cryptanalysis – Shannon's Entropy and Brute-Force Attack)
#cryptology, #cryptography, #cryptanalysis, #lecture, #course, #tutorial
In this video, we show the basics of cryptology (cryptology = cryptography and cryptanalysis).
This particular video introduces the Shannon's information entropy, which we use for a brute-force attack on a (keyspace-reduced) DES cipher.
First, we give a short historical overview on the term "entropy". Then, we discuss the Shannon's information entropy, which is a measure for the value of information of data. Finally, we use the Cost Function component in CrypTool 2 to have a look at entropy values of plaintext and ciphertext and we also use the CrypTool 2 KeySarcher component to break a DES cipher-encrypted ciphertext (with a search space of 24 bit).
To see all videos in the "Basics of Cryptology" series, use this playlist: https://www.youtube.com/playlist?list=PLMuvAbyIl0PT6zaRVpK0FCSNMgwAOckTt
If you are further interested in details on classic ciphers, you may have a look at the classic ciphers playlist: https://www.youtube.com/watch?v=VLXuLbclCxw
If you are interested in details about CrypTool 2, you may have a look at this video here, which gives a short introduction: https://www.youtube.com/watch?v=dELT2-Vgsr8
Finally, you may download the latest version of CrypTool 2 here: https://www.cryptool.org/en/ct2/downloads
Видео Basics of Cryptology – Part 4 (Modern Cryptanalysis – Shannon's Entropy and Brute-Force Attack) канала Cryptography for Everybody
In this video, we show the basics of cryptology (cryptology = cryptography and cryptanalysis).
This particular video introduces the Shannon's information entropy, which we use for a brute-force attack on a (keyspace-reduced) DES cipher.
First, we give a short historical overview on the term "entropy". Then, we discuss the Shannon's information entropy, which is a measure for the value of information of data. Finally, we use the Cost Function component in CrypTool 2 to have a look at entropy values of plaintext and ciphertext and we also use the CrypTool 2 KeySarcher component to break a DES cipher-encrypted ciphertext (with a search space of 24 bit).
To see all videos in the "Basics of Cryptology" series, use this playlist: https://www.youtube.com/playlist?list=PLMuvAbyIl0PT6zaRVpK0FCSNMgwAOckTt
If you are further interested in details on classic ciphers, you may have a look at the classic ciphers playlist: https://www.youtube.com/watch?v=VLXuLbclCxw
If you are interested in details about CrypTool 2, you may have a look at this video here, which gives a short introduction: https://www.youtube.com/watch?v=dELT2-Vgsr8
Finally, you may download the latest version of CrypTool 2 here: https://www.cryptool.org/en/ct2/downloads
Видео Basics of Cryptology – Part 4 (Modern Cryptanalysis – Shannon's Entropy and Brute-Force Attack) канала Cryptography for Everybody
Показать
Комментарии отсутствуют
Информация о видео
27 марта 2020 г. 15:03:15
00:24:47
Другие видео канала
Zodiac Killer Ciphers – Let's have a Look at Unicity Distances With Excel10 - Automatic Translation of CrypTool 2 To a New LanguageMy Cryptologic Highlights of 2020Basics of Cryptology – Part 2 (Cryptanalysis – Terminology & Classical Ciphers)Enigma Machine – Part 1 of 2 – How does it work?Basics of Cryptology – Part 20 (Cryptanalysis – Cost & Fitness Functions - Language Models)Digital File Signatures – How Do They Protect Your Computer?Basics of Cryptology – Part 22 (Cryptography – Kerckhoffs' Principle & Modern Cryptographic Goals)Let's Decipher a Letter of the Silent Film Star Mary Miles Minter That Lead to a ScandalBasics of Cryptology – Part 9 (Modern Cryptography – Block Ciphers – Feistel Ciphers & SDES)The Straddling Checkerboard Cipher ExplainedLet's Decipher Two Encrypted English Postcards – Secret Messages From the Past RevealedLet's Break My Self-Made Cryptographic Challenges From HistoCrypt 2019Basics of Cryptology – Part 23 (Cryptography – Modern Hybrid Encryption)Break an Encrypted Letter of a Child KillerBasics of Cryptology – Part 17 (Cryptography/Cryptanalysis – Keyspace and Keyspace Size)An Encrypted Description of a Secret Magic Machine in an 18th Century Alchemy BookLet's Program a Hash Preimage Searcher to Break PasswordsBasics of Cryptology – Part 14 (Modern Cryptography – Passwords)The Trithemius Cipher and the Tabula Recta – Let's Create and Break ThemA Musical Cipher Challenge – End of 2021 – Win a Crypto Book