The Mexican Army Cipher Disk Explained and Broken
#cryptology, #cryptography, #cryptanalysis
The Mexican Army Cipher Disk was used by the Constitutionalists in Mexico at the beginning of the 20th century. It is a homophonic substitution cipher, but rather weak. In this video, we explain how it works, encrypt and decrypt text and also break it using CrypTool 2.
You find the paper model of the Mexican Army Cipher Disk in my blog post here: https://www.kopaldev.de/2022/08/22/i-implemented-the-mexican-army-cipher-disk-and-also-its-cryptanalysis-in-cryptool-2/
If you are interested in learning the fundaments of cryptology, let me invite you to have a look at our video series about the basics of cryptology, also for beginners: https://youtu.be/jbumW7Ym03o
You can download the latest version of CrypTool 2 from here: https://www.cryptool.org/en/ct2/downloads
Visit my blog: https://www.kopaldev.de
Видео The Mexican Army Cipher Disk Explained and Broken канала Cryptography for Everybody
The Mexican Army Cipher Disk was used by the Constitutionalists in Mexico at the beginning of the 20th century. It is a homophonic substitution cipher, but rather weak. In this video, we explain how it works, encrypt and decrypt text and also break it using CrypTool 2.
You find the paper model of the Mexican Army Cipher Disk in my blog post here: https://www.kopaldev.de/2022/08/22/i-implemented-the-mexican-army-cipher-disk-and-also-its-cryptanalysis-in-cryptool-2/
If you are interested in learning the fundaments of cryptology, let me invite you to have a look at our video series about the basics of cryptology, also for beginners: https://youtu.be/jbumW7Ym03o
You can download the latest version of CrypTool 2 from here: https://www.cryptool.org/en/ct2/downloads
Visit my blog: https://www.kopaldev.de
Видео The Mexican Army Cipher Disk Explained and Broken канала Cryptography for Everybody
Показать
Комментарии отсутствуют
Информация о видео
22 августа 2022 г. 18:13:05
00:12:52
Другие видео канала
Zodiac Killer Ciphers – Let's have a Look at Unicity Distances With ExcelMy Cryptologic Highlights of 2020Crypto Challenge Contest – Video 1Basics of Cryptology – Part 2 (Cryptanalysis – Terminology & Classical Ciphers)Enigma Machine – Part 1 of 2 – How does it work?Digital File Signatures – How Do They Protect Your Computer?Basics of Cryptology – Part 22 (Cryptography – Kerckhoffs' Principle & Modern Cryptographic Goals)Let's Decipher a Letter of the Silent Film Star Mary Miles Minter That Lead to a ScandalBasics of Cryptology – Part 9 (Modern Cryptography – Block Ciphers – Feistel Ciphers & SDES)The Straddling Checkerboard Cipher ExplainedLet's Decipher Two Encrypted English Postcards – Secret Messages From the Past RevealedLet's Break My Self-Made Cryptographic Challenges From HistoCrypt 2019Basics of Cryptology – Part 23 (Cryptography – Modern Hybrid Encryption)Break an Encrypted Letter of a Child KillerBasics of Cryptology – Part 17 (Cryptography/Cryptanalysis – Keyspace and Keyspace Size)An Encrypted Description of a Secret Magic Machine in an 18th Century Alchemy BookLet's Program a Hash Preimage Searcher to Break PasswordsBasics of Cryptology – Part 14 (Modern Cryptography – Passwords)The Trithemius Cipher and the Tabula Recta – Let's Create and Break ThemA Musical Cipher Challenge – End of 2021 – Win a Crypto Book