Home
Search results “Cryptography or cryptology puzzles”
Cryptography: The Science of Making and Breaking Codes
 
08:21
There are lots of different ways to encrypt a message, from early, simple ciphers to the famous Enigma machine. But it’s tough to make a code truly unbreakable. Hosted by: Michael Aranda ---------- Dooblydoo thanks go to the following Patreon supporters -- we couldn't make SciShow without them! Shout out to Justin Ove, John Szymakowski, Fatima Iqbal, Justin Lentz, David Campos, and Chris Peters. ---------- Like SciShow? Want to help support us, and also get things to put on your walls, cover your torso and hold your liquids? Check out our awesome products over at DFTBA Records: http://dftba.com/scishow Or help support us by becoming our patron on Patreon: https://www.patreon.com/scishow ---------- Looking for SciShow elsewhere on the internet? Facebook: http://www.facebook.com/scishow Twitter: http://www.twitter.com/scishow Tumblr: http://scishow.tumblr.com Instagram: http://instagram.com/thescishow Sources: http://www.vectorsite.net/ttcode_04.html#m3 http://www.simonsingh.net/The_Black_Chamber/crackingprinciple.html http://book.itep.ru/depository/crypto/Cryptography_history.pdf http://www.cs.trincoll.edu/~crypto/historical/gronsfeld.html http://www.sans.org/reading-room/whitepapers/vpns/history-encryption-730 http://ftp.stmarys-ca.edu/jsauerbe/m10s11/chapter5.pdf http://www.turing.org.uk/scrapbook/ww2.html http://enigma.louisedade.co.uk/howitworks.html http://www.codesandciphers.org.uk/enigma/example1.htm http://www.pbs.org/wgbh/nova/military/how-enigma-works.html http://www.cs.miami.edu/~burt/learning/Csc609.051/notes/02.html
Views: 770205 SciShow
Enigma II Encryption Machine & Puzzle - encode & decode cipher
 
09:23
AVAILABLE AT http://www.creativecrafthouse.com/index.php?main_page=product_info&cPath=137&products_id=964 This is an encryption machine that will allow you to encrypt your own messages and in addition we have provided 8 secret messages for you to try and solve. Send and receive secret messages to anyone who has a machine. its quite easy to use but creates messages that can be extremely complex to decode. Hardwood construction with gears cut from ¼” thick wood. All letters and text are deeply laser engraved into the wood. The gears turn on alloy steel pins. Made in USA and designed to last a lifetime. Available in 2 different sizes. The larger one measures approx. 12.75” x 4.5” x 1”. Each gear is approx. 3.75” in diameter . The smaller size measures 9.4” x3.2” x 1”. Each gear is approx. 3.75” in diameter) Avail at CreativeCrafthouse.com We have also recently done the Confederate Army Cipher, the Union Army Cipher (used for flag signaling) and th Mexican Army Cipher
Views: 41648 dj51florida
Top 10 Uncracked Codes and Ciphers
 
07:53
Not even the greatest minds of the world could decipher these codes. Join http://www.WatchMojo.com as we count down our picks for the Top 10 Uncracked Codes and Ciphers. Check us out at http://www.Twitter.com/WatchMojo, http://instagram.com/watchmojo and http://www.Facebook.com/WatchMojo. Also, check out our interactive Suggestion Tool at http://www.WatchMojo.com/suggest :) Special thanks to our user kenn1987 for submitting this idea through our Suggest Tool at http://www.WatchMojo.com/Suggest Check out the voting page here, http://watchmojo.com/suggest/Top+10+Uncracked+Codes/Ciphers If you want to suggest an idea for a WatchMojo video, check out our interactive Suggestion Tool at http://www.WatchMojo.com/suggest :) Want a WatchMojo cup, mug, t-shirts, pen, sticker and even a water bottle? Get them all when you order your MojoBox gift set here: http://watchmojo.com/store/xmas.php WatchMojo is a leading producer of reference online video content, covering the People, Places and Trends you care about. We update DAILY with 2-3 Top 10 lists, Origins, Biographies, Versus clips on movies, video games, music, pop culture and more!
Views: 510559 WatchMojo.com
10 Riddles That Can't Be Solved
 
07:36
Secret codes that can not be cracked Subscribe to our channel: http://goo.gl/9CwQhg For copyright matters please contact us at: [email protected] Description: Our Social Media: Facebook: https://www.facebook.com/TheRichest.org Twitter: https://twitter.com/TheRichest_Com Instagram: http://instagram.com/therichest For more videos and articles visit: http://www.therichest.com/
Views: 2250686 TheRichest
Solving Cryptograms #1 | ASMR
 
46:30
I dust off the cobwebs in this first episode of solving cryptograms for the first time in years in order to help you relax and sleep. Stay tuned for the Crossword Puzzles series... Patreon ► http://bit.ly/1EZgmNi Website: https://ephemeralrift.com Listen to selected works outside of YouTube: Spotify ► http://bit.ly/1V23U60 CDBaby ► http://bit.ly/1AUt3Jj iTunes ► http://apple.co/1xIHLNd Podcasts: EphemRadio (on hiatus) ► http://apple.co/2afSkZQ Arkham Sanitarium (on hiatus) ►http://apple.co/2alraeV Social Media: Facebook ► https://www.facebook.com/ephemeralrift1 Twitter ► https://twitter.com/EphemeralRift IG ► http://instagram.com/e.rift What is ASMR? ASMR stands for Autonomous Sensory Meridian Response. It's a non-scientific word that an everyday person came up with to describe the feeling characterized as a pleasurable tingling sensation felt in the head, scalp, back and other regions of the body in response to visual, auditory, tactile, olfactory, and/or cognitive stimuli, such as crinkling bags, hand movements, whispering, personal attention or watching someone perform a task. It's like goosebumps but much more pleasant and without the uncomfortable chills. ASMR videos are meant to intentionally induce this sensation in the viewer, often referred to as "tingles", but the videos also serve to provide a relaxing, calming and soothing experience for the viewer. Many people who do not experience ASMR still enjoy the videos for their calming and sleepy effect.
Views: 196690 Ephemeral Rift
The Zodiac Ciphers - What do we know, and when do we stop trying to solve them?
 
37:36
http://zodiackillerciphers.com This is a talk I gave at the 2015 Cryptologic History Symposium on October 22, 2015. I've been studying the Zodiac ciphers for a while now, and this presentation is a culmination of my research. The talk was part of the "Ciphers and Crime" panel moderated by FBI historian John Fox. Fellow panelists included FBI Cryptanalysis and Racketeering Records Unit chief Dan Olson and encryption technology author Klaus Schmeh. For much more information about the Zodiac Ciphers, please visit http://zodiackillerciphers.com Some bits of the audio dropped out due to technical issues with my sound recorder - apologies for the parts that are hard to understand! BONUS MATERIAL: At the end of the video, I recorded some new material on miscellaneous things I didn't have time to include in the presentation. ERRATA: At 28m59s, I say the 408 is missing a word or phrase between parts 1 and 2. But actually it is missing between parts 2 and 3.
Views: 125334 David Oranchak
Can you solve the passcode riddle? - Ganesh Pai
 
04:08
View full lesson: http://ed.ted.com/lessons/can-you-solve-the-passcode-riddle-ganesh-pai In a dystopian world, your resistance group is humanity’s last hope. Unfortunately, you’ve all been captured by the tyrannical rulers and brought to the ancient coliseum for their deadly entertainment. Will you be able to solve the passcode riddle and get everyone out safely? Ganesh Pai shows how. Lesson by Ganesh Pai, animation by Jun Zee Myers.
Views: 5641735 TED-Ed
I Hired A Cryptographer To Expose My Deepest Secret
 
10:51
Will Mike's secret be exposed or remain hidden? Check out more awesome videos at BuzzFeedBlue! https://bit.ly/YTbuzzfeedvideo https://bit.ly/YTbuzzfeedblue1 https://bit.ly/YTbuzzfeedviolet GET MORE BUZZFEED: https://www.buzzfeed.com https://www.buzzfeed.com/videos https://www.youtube.com/buzzfeedvideo https://www.youtube.com/boldly https://www.youtube.com/buzzfeedblue https://www.youtube.com/buzzfeedviolet https://www.youtube.com/perolike https://www.youtube.com/ladylike BuzzFeedBlue Sports, video games, Unsolved & more epic daily videos! Credits: https://www.buzzfeed.com/bfmp/videos/21362 EXTERNAL CREDITS Justin Troutman http://justintroutman.com/ + Alec Jones-Trujillo https://www.instagram.com/jonesalecjones/ MUSIC 2 Second Delay Licensed via Warner Chappell Production Music Inc. Sunset Alley Licensed via Warner Chappell Production Music Inc. Skybolt Reloaded Licensed via Warner Chappell Production Music Inc. Crossfire Licensed via Warner Chappell Production Music Inc. All Necessary Speed Licensed via Warner Chappell Production Music Inc. Epic Countdown Licensed via Warner Chappell Production Music Inc. Overtake Licensed via Warner Chappell Production Music Inc. Thunder Race Licensed via Warner Chappell Production Music Inc. Bell Ringer Licensed via Warner Chappell Production Music Inc. Hacking The System Licensed via Warner Chappell Production Music Inc. Reckless Departure Licensed via Warner Chappell Production Music Inc. Nerve Piano Licensed via Warner Chappell Production Music Inc. Ultimate Swarm Licensed via Warner Chappell Production Music Inc. Barrage Licensed via Warner Chappell Production Music Inc. Raptor Licensed via Warner Chappell Production Music Inc. Tarnished Licensed via Warner Chappell Production Music Inc. End Of Days Licensed via Warner Chappell Production Music Inc. Shock Corridor Licensed via Warner Chappell Production Music Inc. Reverse Tension Licensed via Warner Chappell Production Music Inc. Orchestral Blast Licensed via Warner Chappell Production Music Inc. Heavy Heart Licensed via Warner Chappell Production Music Inc. Suspicion Licensed via Warner Chappell Production Music Inc. Terror Streak Hit Licensed via Warner Chappell Production Music Inc. Menace Licensed via Warner Chappell Production Music Inc. Blunt Force Licensed via Warner Chappell Production Music Inc.
Views: 5777691 BuzzFeed Multiplayer
Keeping Secrets: Cryptography In A Connected World
 
01:26:02
Josh Zepps, Simon Singh, Orr Dunkelman, Tal Rabin, and Brian Snow discuss how, since the earliest days of communication, clever minds have devised methods for enciphering messages to shield them from prying eyes. Today, cryptography has moved beyond the realm of dilettantes and soldiers to become a sophisticated scientific art—combining mathematics, physics, computer science, and electrical engineering. It not only protects messages, but it also safeguards our privacy. From email to banking transactions, modern cryptography is used everywhere. But does it really protect us? What took place was a discussion of cryptography’s far-reaching influence throughout history from Julius Caesar’s reign to Julian Assange’s WikiLeaks, and the ways in which it—and our privacy—are constantly under assault today as threats lurk behind IP addresses, computational power increases, and our secrets move online. The World Science Festival gathers great minds in science and the arts to produce live and digital content that allows a broad general audience to engage with scientific discoveries. Our mission is to cultivate a general public informed by science, inspired by its wonder, convinced of its value, and prepared to engage with its implications for the future. Subscribe to our YouTube Channel for all the latest from WSF. Visit our Website: http://www.worldsciencefestival.com/ Like us on Facebook: https://www.facebook.com/worldsciencefestival Follow us on twitter: https://twitter.com/WorldSciFest Original Program Date: June 4, 2011 MODERATOR: Josh Zepps PARTICIPANTS: Orr Dunkelman, Tal Rabin, Simon Singh, Brian Snow Cryptography In A Connected World 00:12 Josh Zepps Introduction 01:33 Participant Introductions 02:30 What is the history of Cryptography? 04:52 What's the difference between Cryptography and Encryption? 06:56 How the enigma machine works. 12:09 You’re Only as Secure as Your Weakest Link 19:18 Public key and private key encryption example. 22:09 What is the distinction between hacking and cryptanalysis? 26:55 The NSA and what they are looking for? 28:25 How do we establish cyber security? 36:20 How do systems get broken into? 45:30 How do you break a code? 56:38 Public key and the key distribution problem. 01:03:04 Codes will need to be tough due to mathematicians getting better. 01:08:15 The cloud and how we protect it. 01:09:22 In a world that is increasingly networked, How do we protect ourselves? 01:14:30 Online voting ... When and how? 01:20:52
Views: 64643 World Science Festival
Cicada 3301 (All Clues and How They Were Solved)
 
15:07
Want to know more about PGP encryption? Here's the video I used https://www.youtube.com/watch?v=3yN4uMMsK8I Songs: 00:40 song {Halsey - Haunting (Official Instrumental) https://www.youtube.com/watch?v=eT6VVntT8lo Piano cover by cragezy https://www.youtube.com/watch?v=4AxBYR11MG8 As not stated, the video is not entirely accurate (i.e notes shown were drawn up for clearity). Please refrain from pointing out the flaws when the majority of the video is correct. Douche Clues Clue 1: 0:00 Clue 2: 1:22 Clue 3: 1:48 Clue 4: 2:00 Clue 5: 5:50 Clue 6: 6:45 Clue 7: 8:22 Clue 8: 10:11 Clue 9: 11:05 Clue 10: 13:08
Views: 3413586 TheBraveZombies
Cryptanalysis Careers @ NSA
 
02:37
Learn more about cryptanalysis and other careers at NSA by visiting IntelligenceCareers.gov/NSA.
Views: 3000 NSA Careers
Uncrackable Pen & Paper Cryptography
 
12:00
Why there is always a safe place for PEOPLE to communicate
Views: 2410 RevK
Lecture 4: Stream Ciphers and Linear Feedback Shift Registers by Christof Paar
 
01:29:40
For slides, a problem set and more on learning cryptography, visit www.crypto-textbook.com
"The Lost Symbol" - Magic Squares and the Masonic Cipher
 
43:15
December 2, 2009 Dan Brown? The Lost Symbol? Masonic cipher? Albrecht Durers magic square? If you know about these things AND you can decipher the message below, then dont bother coming because you know as much as I do. If you dont know about them OR you cant decipher the message below, then by all means come and hear my presentation. Yes, we do have pizza. Ed Brumgnach http://www.qcc.cuny.edu/ecet/magicSquares.asp
Views: 834323 CUNYQueensborough
Cicada 3301: An Internet Mystery
 
17:54
In this video I explore an elaborate cryptographic internet puzzle orchestrated by a mysterious individual or group known as Cicada 3301. Patreon: https://www.patreon.com/lemmino Subreddit: https://www.reddit.com/r/lemmino Twitter: https://www.twitter.com/lemmin0 Facebook: https://www.fb.com/lemmin0 Discord: https://www.discord.gg/lemmino The puzzle I hid in this video has been solved: https://www.lemmi.no/post/my-latest-puzzle [Music] Own work Erang - Forever Lost In An Endless Dream https://erang.bandcamp.com/track/forever-lost-in-an-endless-dream Erang - The Highway Goes Ever On https://erang.bandcamp.com/track/the-highway-goes-ever-on Erang - Silent Bones https://erang.bandcamp.com/track/silent-bones-2 Cicada 3301 - The Instar Emergence https://www.youtube.com/watch?v=YA1fONCH-CY Cicada 3301 - Interconnectedness https://www.youtube.com/watch?v=ActGqDxBD4A [References] https://www.lemmi.no/cicada-3301
Views: 8327549 LEMMiNO
Cryptography with Matrices
 
13:01
This tutorial will show you how to encode and decode messages using matrices.
Views: 10049 Marshematics
Solving The Cicada 3301 2017 Puzzle | PART 1 | The Internet's Most Complex Puzzle
 
16:18
Part 2 Solving Cicada 3301: https://www.youtube.com/watch?v=49VMG-M6kRA Help support my channel on Patreon: https://www.patreon.com/frightknight Ad revenue has been down 90% on my channel due to having mature and non advertiser friendly content. With as little as $1 you will keep my channel up and running. Thank you all! The Truth Has Been Lost. Find It. Linked to #Vault7 Cicada 3301 Linked to Vault7 The new Cicada 3301 puzzle has so far been difficult to solve. Comment below on your findings. Mojave phone booth 760-733-9969 818-396-7281 HTTPS://I.IMGSAFE.ORG/11ED9A4A40.PNR The Minpins by Roald Dahl And above all, watch with glittering eyes the whole world around you because the greatest secrets are always hidden in the most unlikely places. Those who don't believe in magic will never find it. ''A Fludd approches. Chart the stars.A Chord of would WARMS My I 3301'' For the Best experience put on headphones and turn off the lights. Music By: Myuuji https://www.youtube.com/channel/UCiSKnkKCKAQVxMUWpZQobuQ Natureworld1986 https://www.youtube.com/channel/UCKKVT_vF_ef6l0se2GdKJ7g Channel Art: Jeff Simpson Tumblr: jeffsimpsonkh.tumblr.com/ Credit: Bob Creamer: https://www.youtube.com/channel/UCe73fPevmybfnHGfWakmsEw WhoisCicada3301: https://www.youtube.com/channel/UCHilwjKeX6yEGhqtrejcBRA Bashir: https://techgeek365.com/yes-another-bit-cicada-cryptomusic/ Sam Blythe NFG Cicada Solvers Corp Liber(N)ation https://www.youtube.com/watch?v=UpLcnAIpVRA https://www.youtube.com/watch?v=hHOLBvuQSq4 https://www.youtube.com/watch?v=NxBveXPNBGA&t https://www.youtube.com/watch?v=5laTTnrf9Tc Support me on Patreon: https://www.patreon.com/frightknight
Views: 208128 Fright Knight
Cryptology: The Nahavo Code
 
00:19
Enjoy... Or else. -_-
Views: 59 Charlie Cain
Encoding and Decoding Using Matrices
 
09:28
Had a sore throat! Better to play this at a faster speed if you can!! This video teaches you how to encode and decode a matrix with the aid of your graphing calculator.
Views: 54144 Mr. Dan Muscarella
Can We Handle The CRYPTOGRAM PUZZLE POST?
 
19:01
The post is in and it's full of puzzles! Jules has been sent an issue of the Cryptogram Puzzle Post and has challenged his colleagues to complete these complex conundrums, do you think they can hack it? If you want to win an issue yourselves then follow @WCultureGaming as there's going to be a special announcement coming out soon! For more awesome content, check out: http://whatculture.com/gaming Catch us on Facebook at: https://www.facebook.com/whatculturegaming And follow us on Twitter @wculturegaming
Views: 13379 WhatCulture Gaming
Quantum Cryptography Explained
 
08:13
This episode is brought to you by Squarespace: http://www.squarespace.com/physicsgirl With recent high-profile security decryption cases, encryption is more important than ever. Much of your browser usage and your smartphone data is encrypted. But what does that process actually entail? And when computers get smarter and faster due to advances in quantum physics, how will encryption keep up? http://physicsgirl.org/ ‪http://twitter.com/thephysicsgirl ‪http://facebook.com/thephysicsgirl ‪http://instagram.com/thephysicsgirl http://physicsgirl.org/ Help us translate our videos! http://www.youtube.com/timedtext_cs_panel?c=UC7DdEm33SyaTDtWYGO2CwdA&tab=2 Creator/Editor: Dianna Cowern Writer: Sophia Chen Animator: Kyle Norby Special thanks to Nathan Lysne Source: http://gva.noekeon.org/QCandSKD/QCand... http://physicsworld.com/cws/article/n... https://epic.org/crypto/export_contro... http://fas.org/irp/offdocs/eo_crypt_9... Music: APM and YouTube
Views: 260896 Physics Girl
Cryptography Question for competitive exams
 
02:29
Cryptography question asked in competitive exams ... This is easy one ... Lets see if its helpful. Also if have better way to solve it post it...--
Views: 2901 Lets Discuss
How secure is 256 bit security?
 
05:06
Supplement to the cryptocurrency video: How hard is it to find a 256-bit hash just by guessing and checking? What kind of computer would that take? Cryptocurrency video: https://youtu.be/bBC-nXj3Ng4 Thread for Q&A questions: http://3b1b.co/questions Several people have commented about how 2^256 would be the maximum number of attempts, not the average. This depends on the thing being attempted. If it's guessing a private key, you are correct, but for something like guessing which input to a hash function gives a desired output (as in bitcoin mining, for example), which is the kind of thing I had in mind here, 2^256 would indeed be the average number of attempts needed, at least for a true cryptographic hash function. Think of rolling a die until you get a 6, how many rolls do you need to make, on average? Music by Vince Rubinetti: https://vincerubinetti.bandcamp.com/album/the-music-of-3blue1brown ------------------ 3blue1brown is a channel about animating math, in all senses of the word animate. And you know the drill with YouTube, if you want to stay posted on new videos, subscribe, and click the bell to receive notifications (if you're into that). If you are new to this channel and want to see more, a good place to start is this playlist: http://3b1b.co/recommended Various social media stuffs: Website: https://www.3blue1brown.com Twitter: https://twitter.com/3Blue1Brown Patreon: https://patreon.com/3blue1brown Facebook: https://www.facebook.com/3blue1brown Reddit: https://www.reddit.com/r/3Blue1Brown
Views: 804110 3Blue1Brown
What is cryptography? | Journey into cryptography | Computer Science | Khan Academy
 
01:31
What is Cryptography? A story which takes us from Caesar to Claude Shannon. Watch the next lesson: https://www.khanacademy.org/computing/computer-science/cryptography/crypt/v/caesar-cipher?utm_source=YT&utm_medium=Desc&utm_campaign=computerscience Missed the previous lesson? https://www.khanacademy.org/computing/computer-science/algorithms/intro-to-algorithms/v/what-are-algorithms?utm_source=YT&utm_medium=Desc&utm_campaign=computerscience Computer Science on Khan Academy: Learn select topics from computer science - algorithms (how we solve common problems in computer science and measure the efficiency of our solutions), cryptography (how we protect secret information), and information theory (how we encode and compress information). About Khan Academy: Khan Academy is a nonprofit with a mission to provide a free, world-class education for anyone, anywhere. We believe learners of all ages should have unlimited access to free educational content they can master at their own pace. We use intelligent software, deep data analytics and intuitive user interfaces to help students and teachers around the world. Our resources cover preschool through early college education, including math, biology, chemistry, physics, economics, finance, history, grammar and more. We offer free personalized SAT test prep in partnership with the test developer, the College Board. Khan Academy has been translated into dozens of languages, and 100 million people use our platform worldwide every year. For more information, visit www.khanacademy.org, join us on Facebook or follow us on Twitter at @khanacademy. And remember, you can learn anything. For free. For everyone. Forever. #YouCanLearnAnything Subscribe to Khan Academy’s Computer Science channel: https://www.youtube.com/channel/UC8uHgAVBOy5h1fDsjQghWCw?sub_confirmation=1 Subscribe to Khan Academy: https://www.youtube.com/subscription_center?add_user=khanacademy
Views: 783913 Khan Academy
CRYPTOLOGY - Cryptograms
 
12:57
Today I talk about basic substitution ciphers. Please like, comment, and subscribe. Thanks for watching!
The Caesar cipher | Journey into cryptography | Computer Science | Khan Academy
 
02:36
Brit explains the Caesar cipher, the first popular substitution cipher, and shows how it was broken with "frequency analysis" Watch the next lesson: https://www.khanacademy.org/computing/computer-science/cryptography/crypt/v/polyalphabetic-cipher?utm_source=YT&utm_medium=Desc&utm_campaign=computerscience Missed the previous lesson? https://www.khanacademy.org/computing/computer-science/cryptography/crypt/v/intro-to-cryptography?utm_source=YT&utm_medium=Desc&utm_campaign=computerscience Computer Science on Khan Academy: Learn select topics from computer science - algorithms (how we solve common problems in computer science and measure the efficiency of our solutions), cryptography (how we protect secret information), and information theory (how we encode and compress information). About Khan Academy: Khan Academy is a nonprofit with a mission to provide a free, world-class education for anyone, anywhere. We believe learners of all ages should have unlimited access to free educational content they can master at their own pace. We use intelligent software, deep data analytics and intuitive user interfaces to help students and teachers around the world. Our resources cover preschool through early college education, including math, biology, chemistry, physics, economics, finance, history, grammar and more. We offer free personalized SAT test prep in partnership with the test developer, the College Board. Khan Academy has been translated into dozens of languages, and 100 million people use our platform worldwide every year. For more information, visit www.khanacademy.org, join us on Facebook or follow us on Twitter at @khanacademy. And remember, you can learn anything. For free. For everyone. Forever. #YouCanLearnAnything Subscribe to Khan Academy’s Computer Science channel: https://www.youtube.com/channel/UC8uHgAVBOy5h1fDsjQghWCw?sub_confirmation=1 Subscribe to Khan Academy: https://www.youtube.com/subscription_center?add_user=khanacademy
Views: 586939 Khan Academy
[Hindi] What is Cryptography ? | Kya hai cryptography ? | Explained in simple words
 
05:14
Hello Dosto Aaj hum baat karenge cryptography ke bare me ki ye kya hota hai aur iska itemaal kaise aur kaha hota hai. iska sambandh kisi bhi data ya message ko safely pohchane se hota hai aur uski security badhayi jati hai taaki bich me koi an-adhikarik tarike se usko access na kar paye. aasha karta hoo apko ye video pasand ayegi agar aapko ye video achhi lage to isse like kare aur apne dosto ke sath share kare aur abhi tak aapne mera channel subscribe nahi kia hai to jarur is channel ko subscribe kare. Subscribe to my channel for more videos like this and to support my efforts. Thanks and Love #TechnicalSagar LIKE | COMMENT | SHARE | SUBSCRIBE ---------------------------------------------------------------------------------- For all updates : SUBSCRIBE Us on Technical Sagar : www.youtube.com/technicalsagarindia LIKE us on Facebook https://www.facebook.com/technicalsagarindia Follow us on Twitter : http://www.twitter.com/iamasagar
Views: 76622 Technical Sagar
Cypher - Trailer (puzzle/indie game about cryptography)
 
00:54
Release date ► available now on steam Cypher is a first-person puzzle game about cryptography. ► Website ► http://www.matthewbrowngames.com/ ✔ ● 2018 Matthew Brown Check different trailers: ● Moonlighter - Shopkeeping/roguelike/indie game http://bit.ly/Moonlighter1 ● Noita - rogue-lite presented at e3 http://bit.ly/NoitaE3 ● Semblance - puzzle-platformer/indie game http://bit.ly/Semblance1 ● Chasm - platformer/metroidvania game http://bit.ly/ChasmGame ● Dead Cells - platformer/roguelike/castlevania http://bit.ly/DeadCells1 ● Foundiation - city-builder/medieval/management/indie http://bit.ly/2vNrOxB ● Far: Lone Sails - Puzzle-Platformer/story rich http://bit.ly/2OOE1Lf ► Twitter ► https://twitter.com/GameReleasesORG ► Facebook ► https://www.facebook.com/GameReleasesORG/ Cypher is a first-person puzzle game about cryptography. Explore the museum and learn about the history of cryptography, from simple substitution ciphers to the Enigma machine and beyond. Keywords: #PuzzleGame #CryptographyGame #Indiegame
Views: 871 VideoGameTrailers
Ciphers, Codemakers & Codebreakers (National Treasure documentary)
 
09:58
Excerpt from documentary made for the National Treasure DVD.
Views: 10707 Jill Demby Guest
BARBORA - ENIGMA  (1)   CRYPTOLOGY
 
05:38
GET THE ALBUM HERE: https://barbora.bandcamp.com/album/enigma
Views: 498 Barbora
CYPHER 1 Steganography puzzles
 
13:24
Titre : Cypher Genre : Indépendant Développeur : Matthew Brown Éditeur : Matthew Brown Date de parution : 20 févr. 2018 Cypher is a first person puzzle game about cryptography. / Cypher est un puzzle game à la première personne au sujet de la cryptographie. 0:20 Introduction 4:15 Steganography 01 5:05 Steganography 02 6:06 Steganography 03 6:43 Steganography 04 7:34 Steganography 05 8:15 Steganography 06 9:08 Steganography 07 11:28 Steganography 08 Playlist CYPHER : https://www.youtube.com/playlist?list=PLoi8XQWRo3pJNSQya7_QVQc7SNIA5bm52
Views: 4183 Fredericma45 Gaming
Affine Cipher Encryption
 
06:15
gcd: https://www.youtube.com/watch?feature=player_detailpage&v=WA4nP-iPYKE Decryption: http://youtu.be/XFxFPBKFVe8
Views: 20124 Theoretically
Let's Play Cypher!: Digital Cryptography 100% Completion
 
31:02
baXplays Room 6 of Cypher. He's a terrible programmer. We're doing the whole game live on Twitch. Join the fun!: www.twitch.tv/baXcast Support and Subscribe!
Views: 276 baXcast
CRYPTO-KUBROLOGY -  Stanley Kubrick's Puzzle-Language
 
01:33
CRYPTO-KUBROLOGY Main Website http://www.zerozerotwo.org/KUBRICK/KUBROLOGY/MAZEgate.html This Youtube page is the Comment Section for CryptoKubrology Author: Shawn Montgomery Also by this author - The Rife Documentary... The Rise and Fall of a Scientific Genius: The Forgotten Story of Royal Raymond Rife Order Rife DVD at http://www.zerozerotwo.org/ Transcript of the Rife Documentary: An Open Letter To Hollywood... http://rense.com/general96/hollywoodcancerife.html
Views: 6634 shawnfella
The Enigma Code
 
01:05:16
An elementary introduction to the way the famous Enigma code used by the Germans during WWII. David Perry explains some of the history and the mathematics behind the code. This is part of an outreach program sponsored by NSF-VIGRE at UC Davis.
Views: 315081 UCDavis
Stream Ciphers - Encryption/Decryption
 
10:26
A beginner's guide to Stream Ciphers (Encryption/Decryption).
Views: 49515 Daniel Rees
Creating An Unbreakable Cipher (nearly)
 
07:52
Creating Ciphers can be fun, but understanding how they work by using a simple example of developing a cipher is a great way to understand them. This video covers the development of a cipher algorithm and shows how to make it (nearly) unbreakable.
Cryptography
 
07:32
Google IT Support Professional Certificate Course 6 - IT Security: Defense against the digital dark arts, Module 2 - Cryptology To get certificate subscribe at: https://www.coursera.org/specializations/google-it-support ================= The whole course playlist: Google IT Support Professional Certificate https://www.youtube.com/playlist?list=PL2jykFOD1AWZlfwMPcVKwaFrRXbqObI3U ================= IT Security https://www.youtube.com/playlist?list=PL2jykFOD1AWaEXEpyRf-Im3U8WQ962Y4B ================= https://www.facebook.com/cyberassociation/ https://scsa.ge/en/online-courses/ This six-course certificate, developed exclusively by Google, includes innovative curriculum designed to prepare you for an entry-level role in IT support. A job in IT can mean in-person or remote help desk work, either in a small business or at a global company, like Google. Whether you’ve been tinkering with IT or are completely new to the field, you’ve come to the right place. If you’re looking for a job, upon completion of the certificate, you can share your information with top employers, like Bank of America, Walmart, Sprint, GE Digital, PNC Bank, Infosys, TEKsystems, UPMC, and, of course, Google. Course 6 - IT Security: Defense against the digital dark arts About the Course This course covers a wide variety of IT security concepts, tools, and best practices. It introduces threats and attacks and the many ways they can show up. We’ll give you some background of encryption algorithms and how they’re used to safeguard data. Then, we’ll dive into the three As of information security: Authentication, authorization, and accounting. We’ll also cover network security solutions, ranging from firewalls to Wifi encryption options. The course is rounded out by putting all these elements together into a multi-layered, in-depth security architecture, followed by recommendations on how to integrate a culture of security into your organization or team. At the end of this course, you’ll understand: - how various encryption algorithms and techniques work and their benefits and limitations. - various authentication systems and types. - the difference between authentication and authorization. At the end of this course, you’ll be able to: - evaluate potential risks and recommend ways to reduce risk. - make recommendations on how best to secure a network. - help others to understand security concepts and protect themselves Who is this class for: This program is intended for beginners who are interested in developing the skills necessary to perform entry-level IT support. No pre-requisite knowledge is required. However, if you do have some familiarity with IT, you can skip through any content that you might already know and speed ahead to the graded assessments. Module 2 - Cryptology In the second module of this course, we'll learn about cryptology. We'll explore different types of encryption practices and how they work. We'll show you the most common algorithms used in cryptography and how they've evolved over time. By the end of this module, you'll understand how symmetric encryption, asymmetric encryption, and hashing work; you'll also know how to choose the most appropriate cryptographic method for a scenario you may see in the workplace. Learning Objectives • Understand the how symmetric encryption, asymmetric encryption, and hashing work. • Describe the most common algorithms of cryptography. • Choose the most appropriate cryptographic method given a scenario.
Views: 116 intrigano
History - Secrets Exposed - Cryptology - WWII Code breaking
 
12:36
From VOA Learning English, this is EXPLORATIONS in Special English. I'm Jeri Watson. And I'm Jim Tedder. Today we visit a small museum in the American state of Maryland. It is called the National Cryptologic Museum. There you will find information that was once secret. The National Cryptologic Museum is on Fort George G. Meade, a military base near Washington, DC. It tells the story of cryptology and the men and women who have worked in this unusual profession. The word cryptology comes from the Greek "kryptos logos." It means "hidden word." Cryptology is writing or communicating in ways designed to hide the meaning of your words. The museum has many examples of equipment that was once used to make information secret. It also has equipment that was developed to read secret messages. The method of hiding exact meanings is called coding. People have used secret codes throughout history to protect important information. One display at the museum explains American attempts to read Japanese military information during World War Two. Japan's Navy used special machines to change its written information into secret codes. This coded information was then sent by radio to navy ships and military bases. The information included secret military plans and orders. The leaders of the Japanese Navy believed no one could read or understand the secret codes. They were wrong. Americans were working very hard to learn the Japanese code. The United States urgently needed to break the code to learn what Japan was planning. In 1940, an American woman named Genevieve Grotjan found some information being repeated in Japanese coded messages. At the time, she was a civilian working for the government in Washington, DC. Her discovery helped the United States understand secret Japanese diplomatic messages. After the United States understood the code, it was possible to study messages from the Japanese ambassador to Germany and to his supervisors in Japan. After the attack on Pearl Harbor, an American Naval officer named Joseph Rochefort struggled to understand the Japanese navy code. He worked on the American base at Pearl Harbor. It was early in 1942. The American naval commander in the Pacific Ocean was Chester Nimitz. His forces were much smaller than the Japanese Naval forces. And the Japanese had been winning many victories. Joseph Rochefort had worked for several months to read the secret Japanese Naval code called JN-25. If he could understand enough of the code, he would be able to give Admiral Nimitz very valuable information. The admiral could use this information to plan for battle. By the early part of the year, Mr. Rochefort and the men who worked with him could read a little less than 20 percent of the Japanese JN-25 code. Joseph Rochefort had the evidence he needed. "AF" was now known to be the island of Midway. He also told Admiral Nimitz the Japanese would attack Midway on June third. The admiral secretly moved his small force to an area near Midway and waited for the Japanese Navy. The battle that followed was a huge American victory. Experts now say the Battle of Midway was the beginning of the American victory in the Pacific. That victory was possible because Joseph Rochefort learned to read enough of the Japanese code to discover the meaning of the letters "AF." One American code has never been broken. Perhaps it never will. It was used in the Pacific during World War Two. For many years the government would not discuss this secret code. Listen for a moment to this very unusual code. Then you may understand why the Japanese military forces were never able to understand any of it. The code is in the voice of a Native American. The man you just heard is singing a simple song in the Navajo language. Very few people outside the Navajo nation are able to speak any of their very difficult language. At the beginning of World War Two, the United States Marine Corps asked members of the Navajo tribe to train as Code Talkers. The Cryptologic Museum says the Marine Corps Code Talkers could take a sentence in English and change it into their language in about 20 seconds. A code machine needed about 30 minutes to do the same work. The Navajo Code Talkers took part in every battle the Marines entered in the Pacific during World War Two. The Japanese were very skilled at breaking codes. But they were never able to understand any of what they called "The Marine Code." Perhaps the most famous is a World War Two German code machine called the Enigma. The word "enigma" means a puzzle or a problem that is difficult to solve. The German military used the Enigma machine to communicate orders and plans. The United States, Britain, and the government of Poland cooperated in learning to read information sent by the Enigma. It took thousands of people and cost millions of dollars to read the Enigma information. This is a VOA product and is in the public domain
Views: 6067 ListenAndReadAlong
Applied Cryptography: Cracking the substitution Cipher  (1/2)
 
10:12
Previous video: https://youtu.be/SYEiNsYOhE8 Next video: http://youtu.be/nQGh3e_Wa4A
Views: 1814 Leandro Junes
Cryptography: Transposition Cipher
 
10:23
This lesson explains how to encrypt and decrypt a message using a transposition cipher. Site: http://mathispower4u.com
Views: 52167 Mathispower4u
Cryptographic Devices Provide Clues to History, Politics
 
02:18
Duke University research scholar Nicholas Gessler has created a collection of cryptographic devices used by intelligence officers from the seventeenth century up through World War II. He says studying the devices offers clues about historical events, technological trends and social relations. Read more here: http://today.duke.edu/2014/03/gessler.
Views: 1757 Duke University
Solitaire Cipher
 
06:15
Views: 2199 Weiwei Toh
Polyalphabetic Part 2 - Friedman Decryption
 
05:52
A beginner's guide to Polyalphabetic Ciphers Part 2 (Friedman Decryption)
Views: 4156 Daniel Rees
Encrypting Algorithms
 
01:39:41
The topic is extremely important for all high end exams like Infosys, Elitmus, SNAP, XAT and Maths Olympiads
Views: 66627 pankaj gandhi
Route Ciphers
 
01:44
How to use Route Ciphers.
Views: 147 Kitsumaru
Cryptology - Part 1: Matrices
 
36:30
Would it be cool to work for the NSA? :-) Encode and Decode secret messages using matrices. www.learncryptology.appspot.com www.chukwuemekasamuel.com www.samuelchukwuemeka.com
Views: 2376 Samuel Chukwuemeka
1- What is Cryptology ? شرح
 
08:23
الفيديو بيتكلم عن فروع علم التشفير Cryptology .. وانواع انظمه التشفير والفرق بينهم . الفرق بين الSymmetric & Asymmetric Algorithms , Hashing قانون كيرشوف اللي بيوضح ضرورة ان يكون المفتاح المستخدم ف التشفير صعب تخمينه مهما كانت معروفه عملية التشفير من الداخل او نظامها صفحة الفيس بوك لو فيه اى سؤال بخصوص الفيديو https://www.facebook.com/AmsheerTube ## لو عاوز تشوف فيديوهات عن مواضيع معينه ف الCryptography ابعت هنا https://docs.google.com/forms/d/19CBAJ2QozmKORIENFqAiojrD8ilNiPxWQWWOygIyeF0/viewform#start=openform
Views: 5527 Amsheer WaBasheer