Загрузка страницы

The Trithemius Cipher and the Tabula Recta – Let's Create and Break Them

#cryptology, #cryptography, #cryptanalysis

In this video, I introduce the "tabula recta" and the "Trithemius cipher". Both are shown and used in Johannes Trithemius famous book "Polygraphiae". The Trithemius cipher is one of the first polyalphabetic substitution ciphers, which is created using 24 shifted alphabets. It is much more secure than using a simple Caesar cipher, but it lacks of a key. If it is known, that the Trithemius cipher was used for encryption, the decryption is easily possible.

First, I give a short overview of Johannes Trithemius life. Trithemius was a famous Benedictine abbot, a polymath and cryptologist. After that, I introduce the tabula recta and the Trithemius cipher. Then, we create a tabula recta in CrypTool 2 as well as encrypt and decrypt using the Trithemius cipher. Finally, we break the Trithemius cipher using the Vigenère analyzer in CrypTool 2.

If you are interested in learning the basics of cryptology, you should also have a look at our video series about basics of cryptology – also for beginners: https://youtu.be/jbumW7Ym03o

You may download the latest version of CrypTool 2 from here: https://www.cryptool.org/en/ct2/downloads

Видео The Trithemius Cipher and the Tabula Recta – Let's Create and Break Them канала Cryptography for Everybody
Показать
Комментарии отсутствуют
Введите заголовок:

Введите адрес ссылки:

Введите адрес видео с YouTube:

Зарегистрируйтесь или войдите с
Информация о видео
28 ноября 2020 г. 18:25:49
00:17:09
Другие видео канала
Zodiac Killer Ciphers – Let's have a Look at Unicity Distances With ExcelZodiac Killer Ciphers – Let's have a Look at Unicity Distances With Excel10 -  Automatic Translation of CrypTool 2 To a New Language10 - Automatic Translation of CrypTool 2 To a New Language04 - Internationalization of the Component (CrypTool 2 Development Series)04 - Internationalization of the Component (CrypTool 2 Development Series)My Cryptologic Highlights of 2020My Cryptologic Highlights of 2020Crypto Challenge Contest – Video 1Crypto Challenge Contest – Video 1Basics of Cryptology – Part 2 (Cryptanalysis – Terminology & Classical Ciphers)Basics of Cryptology – Part 2 (Cryptanalysis – Terminology & Classical Ciphers)Enigma Machine – Part 1 of 2 – How does it work?Enigma Machine – Part 1 of 2 – How does it work?Basics of Cryptology – Part 20 (Cryptanalysis – Cost & Fitness Functions - Language Models)Basics of Cryptology – Part 20 (Cryptanalysis – Cost & Fitness Functions - Language Models)Digital File Signatures – How Do They Protect Your Computer?Digital File Signatures – How Do They Protect Your Computer?Basics of Cryptology – Part 22 (Cryptography – Kerckhoffs' Principle & Modern Cryptographic Goals)Basics of Cryptology – Part 22 (Cryptography – Kerckhoffs' Principle & Modern Cryptographic Goals)Let's Decipher a Letter of the Silent Film Star Mary Miles Minter That Lead to a ScandalLet's Decipher a Letter of the Silent Film Star Mary Miles Minter That Lead to a ScandalBasics of Cryptology – Part 9 (Modern Cryptography – Block Ciphers – Feistel Ciphers & SDES)Basics of Cryptology – Part 9 (Modern Cryptography – Block Ciphers – Feistel Ciphers & SDES)The Straddling Checkerboard Cipher ExplainedThe Straddling Checkerboard Cipher ExplainedLet's Decipher Two Encrypted English Postcards – Secret Messages From the Past RevealedLet's Decipher Two Encrypted English Postcards – Secret Messages From the Past RevealedLet's Break My Self-Made Cryptographic Challenges From HistoCrypt 2019Let's Break My Self-Made Cryptographic Challenges From HistoCrypt 2019Basics of Cryptology – Part 23 (Cryptography – Modern Hybrid Encryption)Basics of Cryptology – Part 23 (Cryptography – Modern Hybrid Encryption)Break an Encrypted Letter of a Child KillerBreak an Encrypted Letter of a Child KillerBasics of Cryptology – Part 17 (Cryptography/Cryptanalysis – Keyspace and Keyspace Size)Basics of Cryptology – Part 17 (Cryptography/Cryptanalysis – Keyspace and Keyspace Size)An Encrypted Description of a Secret Magic Machine in an 18th Century Alchemy BookAn Encrypted Description of a Secret Magic Machine in an 18th Century Alchemy BookBasics of Cryptology – Part 14 (Modern Cryptography – Passwords)Basics of Cryptology – Part 14 (Modern Cryptography – Passwords)09 -  Create a Unit Test for the Component (CrypTool 2 Development Series)09 - Create a Unit Test for the Component (CrypTool 2 Development Series)
Яндекс.Метрика