ElsieFour – A Low-Tech Cipher Inspired by RC 4
#cryptology, #cryptography, #cryptanalysis
In this video we explain how the low-tech cipher ElsieFour (LC4) works. It is a hand cipher inspired by RC4, Playfair, and the concept of plaintext-dependent key streams. In the video, we discuss how to encrypt text, compute the size of the key space, and compute the Unicity Distance. Finally, we use CrypTool 2 to encrypt and decrypt text with the ElsieFour component.
Specification of LC4: https://eprint.iacr.org/2017/339
If you are interested in learning the fundaments of cryptology, let me invite you to have a look at our video series about the basics of cryptology, also for beginners: https://youtu.be/jbumW7Ym03o
You can download the latest version of CrypTool 2 from here: https://www.cryptool.org/en/ct2/downloads
Visit my blog: https://www.kopaldev.de
Join Discord server: https://discord.gg/8JeTZd8EpT
Видео ElsieFour – A Low-Tech Cipher Inspired by RC 4 канала Cryptography for Everybody
In this video we explain how the low-tech cipher ElsieFour (LC4) works. It is a hand cipher inspired by RC4, Playfair, and the concept of plaintext-dependent key streams. In the video, we discuss how to encrypt text, compute the size of the key space, and compute the Unicity Distance. Finally, we use CrypTool 2 to encrypt and decrypt text with the ElsieFour component.
Specification of LC4: https://eprint.iacr.org/2017/339
If you are interested in learning the fundaments of cryptology, let me invite you to have a look at our video series about the basics of cryptology, also for beginners: https://youtu.be/jbumW7Ym03o
You can download the latest version of CrypTool 2 from here: https://www.cryptool.org/en/ct2/downloads
Visit my blog: https://www.kopaldev.de
Join Discord server: https://discord.gg/8JeTZd8EpT
Видео ElsieFour – A Low-Tech Cipher Inspired by RC 4 канала Cryptography for Everybody
Показать
Комментарии отсутствуют
Информация о видео
13 мая 2023 г. 16:16:55
00:15:14
Другие видео канала
Zodiac Killer Ciphers – Let's have a Look at Unicity Distances With Excel10 - Automatic Translation of CrypTool 2 To a New Language04 - Internationalization of the Component (CrypTool 2 Development Series)My Cryptologic Highlights of 2020Crypto Challenge Contest – Video 1Basics of Cryptology – Part 2 (Cryptanalysis – Terminology & Classical Ciphers)Enigma Machine – Part 1 of 2 – How does it work?Digital File Signatures – How Do They Protect Your Computer?Basics of Cryptology – Part 22 (Cryptography – Kerckhoffs' Principle & Modern Cryptographic Goals)Let's Decipher a Letter of the Silent Film Star Mary Miles Minter That Lead to a ScandalThe Straddling Checkerboard Cipher ExplainedLet's Decipher Two Encrypted English Postcards – Secret Messages From the Past RevealedLet's Break My Self-Made Cryptographic Challenges From HistoCrypt 2019Basics of Cryptology – Part 23 (Cryptography – Modern Hybrid Encryption)Break an Encrypted Letter of a Child KillerBasics of Cryptology – Part 17 (Cryptography/Cryptanalysis – Keyspace and Keyspace Size)An Encrypted Description of a Secret Magic Machine in an 18th Century Alchemy BookLet's Program a Hash Preimage Searcher to Break PasswordsBasics of Cryptology – Part 14 (Modern Cryptography – Passwords)The Trithemius Cipher and the Tabula Recta – Let's Create and Break ThemA Musical Cipher Challenge – End of 2021 – Win a Crypto Book