Enigma Machine – Part 1 of 2 – How does it work?
#cryptology, #cryptography, #cryptanalysis
This video shows how the famous Enigma rotor cipher machine works. It gives an introduction to the historical background and to the internal workings of the machine.
Enigma was invented by Arthur Scherbius in 1918 for the civil market. After its vanish on the civil market, Enigma caught the interest of the German military ("Wehrmacht"). Then, Enigma was used during WWII and about 30,000 machines were produced. From a cryptographic point of view, Enigma was a huge failure since the Allies (Poland, Britain, and US) were able to break Enigma and decrypt the encrypted messages, leading to a huge intelligence advantage in WWII.
We split the topic 'Enigma' into different parts. The cryptanalysis (keyspace size as well as how to break Enigma) will be shown in the next video.
You may download the latest version of CrypTool 2 from our here: https://www.cryptool.org/en/ct2/downloads
Видео Enigma Machine – Part 1 of 2 – How does it work? канала Cryptography for Everybody
This video shows how the famous Enigma rotor cipher machine works. It gives an introduction to the historical background and to the internal workings of the machine.
Enigma was invented by Arthur Scherbius in 1918 for the civil market. After its vanish on the civil market, Enigma caught the interest of the German military ("Wehrmacht"). Then, Enigma was used during WWII and about 30,000 machines were produced. From a cryptographic point of view, Enigma was a huge failure since the Allies (Poland, Britain, and US) were able to break Enigma and decrypt the encrypted messages, leading to a huge intelligence advantage in WWII.
We split the topic 'Enigma' into different parts. The cryptanalysis (keyspace size as well as how to break Enigma) will be shown in the next video.
You may download the latest version of CrypTool 2 from our here: https://www.cryptool.org/en/ct2/downloads
Видео Enigma Machine – Part 1 of 2 – How does it work? канала Cryptography for Everybody
Показать
Комментарии отсутствуют
Информация о видео
6 февраля 2020 г. 19:50:30
00:18:20
Другие видео канала
Zodiac Killer Ciphers – Let's have a Look at Unicity Distances With Excel10 - Automatic Translation of CrypTool 2 To a New Language04 - Internationalization of the Component (CrypTool 2 Development Series)My Cryptologic Highlights of 2020Crypto Challenge Contest – Video 1Basics of Cryptology – Part 2 (Cryptanalysis – Terminology & Classical Ciphers)Basics of Cryptology – Part 20 (Cryptanalysis – Cost & Fitness Functions - Language Models)Digital File Signatures – How Do They Protect Your Computer?Basics of Cryptology – Part 22 (Cryptography – Kerckhoffs' Principle & Modern Cryptographic Goals)Let's Decipher a Letter of the Silent Film Star Mary Miles Minter That Lead to a ScandalBasics of Cryptology – Part 9 (Modern Cryptography – Block Ciphers – Feistel Ciphers & SDES)The Straddling Checkerboard Cipher ExplainedLet's Decipher Two Encrypted English Postcards – Secret Messages From the Past RevealedLet's Break My Self-Made Cryptographic Challenges From HistoCrypt 2019Basics of Cryptology – Part 23 (Cryptography – Modern Hybrid Encryption)Break an Encrypted Letter of a Child KillerBasics of Cryptology – Part 17 (Cryptography/Cryptanalysis – Keyspace and Keyspace Size)An Encrypted Description of a Secret Magic Machine in an 18th Century Alchemy BookLet's Program a Hash Preimage Searcher to Break PasswordsBasics of Cryptology – Part 14 (Modern Cryptography – Passwords)