Zodiac Killer Ciphers – Let's have a Look at Unicity Distances With Excel
#cryptology, #cryptography, #cryptanalysis
In this video, I have a look at the unicity distances of the Z-408 and Z-340 ciphers. The unicity distance is the minimum amount of ciphertext needed for cryptanalysis to have only one valid possible solution, when deciphering the ciphertext. Ciphertexts with lenghts below the unicity distance have with very high probability multiple "valid" solutions, meaning, solutions that can not be distinguished to the real valid solution (= original plaintext).
The Z-408 is encrypted using a pure homophonic substitution cipher. The Z-340 is encrypted using a homophonic substitution cipher and an additional "layer" of transposition cipher. For both, I try to compute the unicity distance using Excel.
You can find David Oranchak's newest Zodiac Killer cipher video, which I also mention in my video, here: https://www.youtube.com/watch?v=UfrFSrI05hk
The equation I used for computing the keyspace size of the homophonic substitution cipher you can find here: http://www.cs.sjsu.edu/faculty/stamp/RUA/homophonic.pdf
Video about unicity distance: https://www.youtube.com/watch?v=cxJcTyhzepI
Videou about columnar transposition ciphers: https://www.youtube.com/watch?v=4ONnQonBeZA
Video about Z-408 cipher (homophonic substitution cipher): https://www.youtube.com/watch?v=wVwSn_7q0Cc
If you are interested in learning the basics of cryptology, you should also have a look at our video series about basics of cryptology – also for beginners: https://youtu.be/jbumW7Ym03o
You may download the latest version of CrypTool 2 from here: https://www.cryptool.org/en/ct2/downloads
Видео Zodiac Killer Ciphers – Let's have a Look at Unicity Distances With Excel канала Cryptography for Everybody
In this video, I have a look at the unicity distances of the Z-408 and Z-340 ciphers. The unicity distance is the minimum amount of ciphertext needed for cryptanalysis to have only one valid possible solution, when deciphering the ciphertext. Ciphertexts with lenghts below the unicity distance have with very high probability multiple "valid" solutions, meaning, solutions that can not be distinguished to the real valid solution (= original plaintext).
The Z-408 is encrypted using a pure homophonic substitution cipher. The Z-340 is encrypted using a homophonic substitution cipher and an additional "layer" of transposition cipher. For both, I try to compute the unicity distance using Excel.
You can find David Oranchak's newest Zodiac Killer cipher video, which I also mention in my video, here: https://www.youtube.com/watch?v=UfrFSrI05hk
The equation I used for computing the keyspace size of the homophonic substitution cipher you can find here: http://www.cs.sjsu.edu/faculty/stamp/RUA/homophonic.pdf
Video about unicity distance: https://www.youtube.com/watch?v=cxJcTyhzepI
Videou about columnar transposition ciphers: https://www.youtube.com/watch?v=4ONnQonBeZA
Video about Z-408 cipher (homophonic substitution cipher): https://www.youtube.com/watch?v=wVwSn_7q0Cc
If you are interested in learning the basics of cryptology, you should also have a look at our video series about basics of cryptology – also for beginners: https://youtu.be/jbumW7Ym03o
You may download the latest version of CrypTool 2 from here: https://www.cryptool.org/en/ct2/downloads
Видео Zodiac Killer Ciphers – Let's have a Look at Unicity Distances With Excel канала Cryptography for Everybody
Показать
Комментарии отсутствуют
Информация о видео
30 января 2021 г. 23:47:48
00:23:35
Другие видео канала
04 - Internationalization of the Component (CrypTool 2 Development Series)My Cryptologic Highlights of 2020Crypto Challenge Contest – Video 1Basics of Cryptology – Part 2 (Cryptanalysis – Terminology & Classical Ciphers)Enigma Machine – Part 1 of 2 – How does it work?Basics of Cryptology – Part 20 (Cryptanalysis – Cost & Fitness Functions - Language Models)Digital File Signatures – How Do They Protect Your Computer?Basics of Cryptology – Part 22 (Cryptography – Kerckhoffs' Principle & Modern Cryptographic Goals)Let's Decipher a Letter of the Silent Film Star Mary Miles Minter That Lead to a ScandalBasics of Cryptology – Part 9 (Modern Cryptography – Block Ciphers – Feistel Ciphers & SDES)The Straddling Checkerboard Cipher ExplainedLet's Decipher Two Encrypted English Postcards – Secret Messages From the Past RevealedLet's Break My Self-Made Cryptographic Challenges From HistoCrypt 2019Basics of Cryptology – Part 23 (Cryptography – Modern Hybrid Encryption)Break an Encrypted Letter of a Child KillerBasics of Cryptology – Part 17 (Cryptography/Cryptanalysis – Keyspace and Keyspace Size)An Encrypted Description of a Secret Magic Machine in an 18th Century Alchemy BookBasics of Cryptology – Part 14 (Modern Cryptography – Passwords)The Trithemius Cipher and the Tabula Recta – Let's Create and Break ThemA Musical Cipher Challenge – End of 2021 – Win a Crypto Book