The Book Cipher Explained – Encryption & Decryption Using a Book
#cryptology, #cryptography, #cryptanalysis
In this video, we explain how a book cipher works. First, we have a short look at the background of the book cipher and three famous examples, where book ciphers were used in history. Then, we explain how the cipher works. Finally, we encrypt and decrypt using the book cipher component of CrypTool 2.
If you are interested in learning the fundaments of cryptology, let me invite you to have a look at our video series about the basics of cryptology, also for beginners: https://youtu.be/jbumW7Ym03o
You can download the latest version of CrypTool 2 from here: https://www.cryptool.org/en/ct2/downloads
Visit my blog: https://www.kopaldev.de
Видео The Book Cipher Explained – Encryption & Decryption Using a Book канала Cryptography for Everybody
In this video, we explain how a book cipher works. First, we have a short look at the background of the book cipher and three famous examples, where book ciphers were used in history. Then, we explain how the cipher works. Finally, we encrypt and decrypt using the book cipher component of CrypTool 2.
If you are interested in learning the fundaments of cryptology, let me invite you to have a look at our video series about the basics of cryptology, also for beginners: https://youtu.be/jbumW7Ym03o
You can download the latest version of CrypTool 2 from here: https://www.cryptool.org/en/ct2/downloads
Visit my blog: https://www.kopaldev.de
Видео The Book Cipher Explained – Encryption & Decryption Using a Book канала Cryptography for Everybody
Показать
Комментарии отсутствуют
Информация о видео
26 октября 2022 г. 19:16:45
00:15:13
Другие видео канала
Zodiac Killer Ciphers – Let's have a Look at Unicity Distances With Excel10 - Automatic Translation of CrypTool 2 To a New Language04 - Internationalization of the Component (CrypTool 2 Development Series)My Cryptologic Highlights of 2020Crypto Challenge Contest – Video 1Basics of Cryptology – Part 2 (Cryptanalysis – Terminology & Classical Ciphers)Enigma Machine – Part 1 of 2 – How does it work?Basics of Cryptology – Part 20 (Cryptanalysis – Cost & Fitness Functions - Language Models)Digital File Signatures – How Do They Protect Your Computer?What is New in the CrypTool 2 Release 2020.1?Basics of Cryptology – Part 22 (Cryptography – Kerckhoffs' Principle & Modern Cryptographic Goals)Let's Decipher a Letter of the Silent Film Star Mary Miles Minter That Lead to a ScandalThe Straddling Checkerboard Cipher ExplainedLet's Decipher Two Encrypted English Postcards – Secret Messages From the Past RevealedLet's Break My Self-Made Cryptographic Challenges From HistoCrypt 2019Basics of Cryptology – Part 23 (Cryptography – Modern Hybrid Encryption)Break an Encrypted Letter of a Child KillerBasics of Cryptology – Part 17 (Cryptography/Cryptanalysis – Keyspace and Keyspace Size)An Encrypted Description of a Secret Magic Machine in an 18th Century Alchemy BookBasics of Cryptology – Part 14 (Modern Cryptography – Passwords)09 - Create a Unit Test for the Component (CrypTool 2 Development Series)