Enigma Machine – Part 2 of 2 – Let's break it!
#cryptology, #cryptography, #cryptanalysis
This video shows how the famous Enigma rotor cipher machine can be broken. It gives an introduction to the period length of the Enigma and the keyspace size. Also, an overview of the history of breaking the Enigma – from the Polish to the US – is briefly shown. A modern computer-based attack by Gillogly is presented. This attack is also implemented in CT2. And, we show, how it works in CT2.
We split the topic 'Enigma' into different parts. The cryptanalysis (keyspace size as well as how to break Enigma) is shown in this video. The basics of the Enigma – how it works, who invented it – is shown in the first video. For the first video, have a look at https://www.youtube.com/watch?v=FG59my_HLtI.
You may download the latest version of CrypTool 2 from here: https://www.cryptool.org/en/ct2/downloads
Видео Enigma Machine – Part 2 of 2 – Let's break it! канала Cryptography for Everybody
This video shows how the famous Enigma rotor cipher machine can be broken. It gives an introduction to the period length of the Enigma and the keyspace size. Also, an overview of the history of breaking the Enigma – from the Polish to the US – is briefly shown. A modern computer-based attack by Gillogly is presented. This attack is also implemented in CT2. And, we show, how it works in CT2.
We split the topic 'Enigma' into different parts. The cryptanalysis (keyspace size as well as how to break Enigma) is shown in this video. The basics of the Enigma – how it works, who invented it – is shown in the first video. For the first video, have a look at https://www.youtube.com/watch?v=FG59my_HLtI.
You may download the latest version of CrypTool 2 from here: https://www.cryptool.org/en/ct2/downloads
Видео Enigma Machine – Part 2 of 2 – Let's break it! канала Cryptography for Everybody
Показать
Комментарии отсутствуют
Информация о видео
14 февраля 2020 г. 19:07:24
00:19:15
Другие видео канала
Zodiac Killer Ciphers – Let's have a Look at Unicity Distances With Excel10 - Automatic Translation of CrypTool 2 To a New LanguageMy Cryptologic Highlights of 2020Crypto Challenge Contest – Video 1Enigma Machine – Part 1 of 2 – How does it work?Digital File Signatures – How Do They Protect Your Computer?Basics of Cryptology – Part 22 (Cryptography – Kerckhoffs' Principle & Modern Cryptographic Goals)Let's Decipher a Letter of the Silent Film Star Mary Miles Minter That Lead to a ScandalBasics of Cryptology – Part 9 (Modern Cryptography – Block Ciphers – Feistel Ciphers & SDES)The Straddling Checkerboard Cipher ExplainedLet's Decipher Two Encrypted English Postcards – Secret Messages From the Past RevealedLet's Break My Self-Made Cryptographic Challenges From HistoCrypt 2019Basics of Cryptology – Part 23 (Cryptography – Modern Hybrid Encryption)Break an Encrypted Letter of a Child KillerBasics of Cryptology – Part 17 (Cryptography/Cryptanalysis – Keyspace and Keyspace Size)An Encrypted Description of a Secret Magic Machine in an 18th Century Alchemy BookLet's Program a Hash Preimage Searcher to Break PasswordsBasics of Cryptology – Part 14 (Modern Cryptography – Passwords)A Musical Cipher Challenge – End of 2021 – Win a Crypto BookThe Mexican Army Cipher Disk Explained and BrokenThe Stream Cipher Trivium Explained