Cryptography: Crash Course Computer Science #33

2024 ж. 16 Мам.
811 717 Рет қаралды

Today we’re going to talk about how to keep information secret, and this isn’t a new goal. From as early as Julius Caesar’s Caesar cipher to Mary, Queen of Scots, encrypted messages to kill Queen Elizabeth in 1587, theres has long been a need to encrypt and decrypt private correspondence. This proved especially critical during World War II as Allan Turing and his team at Bletchley Park attempted to decrypt messages from Nazi Enigma machines, and this need has only grown as more and more information sensitive tasks are completed on our computers. So today, we’re going to walk you through some common encryption techniques such as the Advanced Encryption Standard (AES), Diffie-Hellman Key Exchange, and RSA which are employed to keep your information safe, private, and secure.
Note: In October of 2017, researchers released a viable hack against WPA2, known as KRACK Attack, which uses AES to ensure secure communication between computers and network routers. The problem isn't with AES, which is provably secure, but with the communication protocol between router and computer. In order to set up secure communication, the computer and router have to agree through what's called a "handshake". If this handshake is interrupted in just the right way, an attacker can cause the handshake to fault to an insecure state and reveal critical information which makes the connection insecure. As is often the case with these situations, the problem is with an implementation, not the secure algorithm itself. Our friends over at Computerphile have a great video on the topic: • Krack Attacks (WiFi WP...
Produced in collaboration with PBS Digital Studios: / pbsdigitalstudios
Want to know more about Carrie Anne?
about.me/carrieannephilbin
The Latest from PBS Digital Studios: • All PBS Digital Studio...
Want to find Crash Course elsewhere on the internet?
Facebook - / youtubecrash. .
Twitter - / thecrashcourse
Tumblr - / thecrashcourse
Support Crash Course on Patreon: / crashcourse
CC Kids: / crashcoursekids

Пікірлер
  • Hey guys, there’s been a ton of news the past week about a vulnerability in the WPA2 protocol that protects our Wi-Fi networks, and since we say that AES is secure in this video, we thought it would be helpful to explain how it all relates. In October of 2017, researchers released a viable hack against WPA2, known as KRACK Attack, which uses AES to ensure secure communication between computers and network routers. The problem isn't with AES, which is provably secure, but with the communication protocol between router and computer. In order to set up secure communication, the computer and router have to agree through what's called a "handshake". If this handshake is interrupted in just the right way, an attacker can cause the handshake to fault to an insecure state and reveal critical information which makes the connection insecure. As is often the case with these situations, the problem is with an implementation, not the secure algorithm itself. Our friends over at Computerphile have a great video on the topic: kzhead.info/sun/oL2tps6hoXOKlGw/bejne.html

    @crashcourse@crashcourse6 жыл бұрын
    • I very much appreciate that posted this update; it again demonstrates that you're more into education than simply getting clicks.

      @disorganizedorg@disorganizedorg6 жыл бұрын
    • Those expression should really have another "mod M".

      @SSGranor@SSGranor6 жыл бұрын
    • +Axyron That was a typo, it should have been "(B^Y mod M)^X mod M" it was missing the second modulus.

      @DreadKyller@DreadKyller6 жыл бұрын
    • Useless? How so?

      @DavidChipman@DavidChipman6 жыл бұрын
    • You can slow the playback down, can't you? It's not too fast for me. But I have heard others mentioning changing the speed of playback of youtube videos in general.

      @DavidChipman@DavidChipman6 жыл бұрын
  • I loved cryptography as a kid so much that I actually used to entertain myself with frequency analysis. I had a lot of books on cryptography, and I used to try to crack the examples before the book explained them, the way people try to solve mystery books before they reach the end. Now I'm falling in love with cryptography again, but with a more modern, computerized version. Thanks Crash Course!

    @samuelisaac2984@samuelisaac29844 жыл бұрын
  • As a total n00b in programming or encryption for some reason I understood the Debbie Hellman explanation over the paint trading analogy. Thanks.

    @KikomochiMendoza@KikomochiMendoza6 жыл бұрын
    • I was confused due to being color blind and had to re watch that part, lol.

      @zikomo8913@zikomo89135 жыл бұрын
    • Comrade Dyatlov hows it going so far

      @sam-yx8fr@sam-yx8fr4 жыл бұрын
  • *_COME ON BRAIN!!!!_*

    @Megamen8x@Megamen8x6 жыл бұрын
    • _404 Page not found_

      @ThBlindElephant@ThBlindElephant5 жыл бұрын
    • Overload!.... HAHAHAHA!!!

      @rodneynayo5779@rodneynayo57794 жыл бұрын
  • The "Thanks cryptography" 👍👍 at the end was pure gold.

    @MrKydaman@MrKydaman6 жыл бұрын
  • This is probably one of the best Crash course videos ever made. Really great explanation and somehow more detailed than other ones while still explaining the concepts easily. This videos deserves praise.

    @vezokpiraka@vezokpiraka6 жыл бұрын
  • "Adding another level of... complexity" #trolled

    @ChungusAm0ngus@ChungusAm0ngus6 жыл бұрын
    • I fell for it too

      @MisokoFukumoto@MisokoFukumoto6 жыл бұрын
    • Tbh that whole intro and stuff is from complexity ssooo COPYRIGHT

      @that_goofballrightthere5668@that_goofballrightthere56685 жыл бұрын
  • I look forward to watching this every week. You guys at crash course are keen on the idea of the feynman technique. Making things as simple as possible. I find these videos on computers to be basically an overview of all the things I've studied over the years. It's a very complete and timely piece. Perhaps you guys may choose to go into more depth on some of these topics in the future. Anyway, these are a great introductory learning tool for those who are interested. Power to male and female programmers and tech nerds! While we ride the wave of the future.

    @brocksprogramming@brocksprogramming6 жыл бұрын
  • Just waiting for that quantum computer to mess all of our encryption up.

    @ProfessorSyndicateFranklai@ProfessorSyndicateFranklai6 жыл бұрын
    • We have to invent quantum cryptography then :D

      @Baxtexx@Baxtexx6 жыл бұрын
    • Actually, we already did a long time ago.^^ en.wikipedia.org/wiki/Quantum_cryptography

      @DharmaJannyter@DharmaJannyter6 жыл бұрын
    • Actually, the most devastating quantum attack (Shor) only breaks asymmetric encryption (RSA, DH key exchange). Grover can weaken AES, but that isn't nearly as bad (speedup by at most the square root). Other algorithms, including some asymmetric ones, might not be affected at all. djb & Tanja Lange have a 32C3 talk kzhead.info/sun/YLClm66SgWd6gIk/bejne.html and a mostly readable 2017 paper, "Post-quantum cryptography".

      @nibblrrr7124@nibblrrr71246 жыл бұрын
    • No it won't

      @sneakupakashgaur9935@sneakupakashgaur99355 жыл бұрын
    • If quantum computer come to existence, then One-time Pad will be feasible to use

      @christianalbertjahns2577@christianalbertjahns25774 жыл бұрын
  • Having a blue day? Keep Calm and Carrie Anne!

    @banderi002@banderi0026 жыл бұрын
    • Seriously, she always cheers me up

      @JM-us3fr@JM-us3fr6 жыл бұрын
    • They should sell this on a T-shirt.

      @Pfhorrest@Pfhorrest6 жыл бұрын
    • When I read that in my brain, I suddenly realized Carrie Anne does sound like carry on, if you live in the north as I do...soooo Minnesotan, dontcha know eh?!

      @microbuilder@microbuilder6 жыл бұрын
    • Banderi - OK OK you get a big ughhhhh ! for that...

      @kyoung21b@kyoung21b6 жыл бұрын
  • This is the best asymmetrical cryptography analogy I've seen so far! It makes so much sense to me. Thanks CC!

    @GKS225@GKS2256 жыл бұрын
  • i've been cracking my head open to understand how keys function for the past few weeks since uni started and you just explained it all very clearly with some paint.....insane and amazing, i thank you ALSO finally understanding the math that's behind these encryption techniques thank you so much

    @day_saram@day_saram Жыл бұрын
  • I did not realize there was so much to a secure connection... Amazing! Thanks for the explanation!

    @dcstone@dcstone6 жыл бұрын
  • Wow, this was actually the exact right speed to follow, awesome graphics and amazing good comparisons. I'm actually a little happier now!

    @BlueFlash215@BlueFlash2154 жыл бұрын
  • This is one of the best simple explanations of criptography ! Great work!

    @FakeButt@FakeButt6 жыл бұрын
  • I love this course, and I'd like to add a little more information (due to the fact that CC cannot cover everything in just 15 minutes). First, when Carrie Ann says that one-way functions are "easy to do in one direction, but hard to reverse", "easy" and "hard" refer to computational complexity, specifically polynomial time problems. This means that the time needed to apply a one-way function must be small (a polynomial in the length of the argument of the function), but the time needed to reverse the computation must be awfully big. Second, the existence of one-way functions is an open problem in computer science. Modular exponentiation is a candidate for being a one-way function: indeed, computing the function is easy, even for huge numbers, but the reverse (the modular discrete logarithm) is believed to be difficult (but it has not been proved!).

    @ignaciocorrea6594@ignaciocorrea65946 жыл бұрын
    • Ignacio Correa there is error in video

      @sneakupakashgaur9935@sneakupakashgaur99355 жыл бұрын
    • Ignacio Correa NSA (no such agency) spends serious taxpayer money to preserve email encryption/decryption using the Cypher Chip ( ironically, iirc, proposed by Bill & Hillary Clinton while in White House to preserve emails securely ) Sharing Key Info with NSA (WTF?)

      @davidporowski9512@davidporowski95125 жыл бұрын
  • Your Public/Private key explanation was the best I have ever seen, now I understand it! Thank you so much.

    @ducksoop.x@ducksoop.x5 жыл бұрын
  • This was such an amazing explanation. Perfectly paced, great graphics, fun analogies, easy to understand, and very well spoken. Thank you so much for this!

    @jeaniebeanie6@jeaniebeanie6 Жыл бұрын
  • That's by far the best explanation of asymmetric encryption (in particular, Diffie-Hellman key exchange) I've come across.

    @alwync3253@alwync32534 жыл бұрын
  • I just love the way you explain everything!! Amazing course.

    @fabiomarsiaj8172@fabiomarsiaj81724 жыл бұрын
  • Wow, I knew a few basics of encryption but was always quite hazy on the details. This was so informative! Thanks! :D

    @SoulDragonWithFlow@SoulDragonWithFlow6 жыл бұрын
  • Finally I understand the key exchange, thanks to your color explanation. Very nice :)

    @VitorVelosoSA@VitorVelosoSA5 жыл бұрын
  • It is uncanny how much this series is aligning with what I'm learning in my Defense Against the Dark Arts class haha! Sharing all of these with my professor! Keep 'em coming!

    @drewlyton@drewlyton6 жыл бұрын
  • I've always thought there was something shifty about that Hank guy.

    @donsample1002@donsample10026 жыл бұрын
  • Fantastic Video. I finally understand how key exchange works. i always wondered how it can be secure if the keys need to be known to both parties. Now i know that! Thank you Carie-Anne!

    @starryk79@starryk796 жыл бұрын
  • "For a 128-bit keys, you'd need trillions of years to try every combination, even if you used every single computer on the planet today. So you better get started" XD

    @watchit387@watchit3873 жыл бұрын
  • Awesome video, thank you! I can finally understand a little bit of cryptography.

    @NickShvelidze@NickShvelidze6 жыл бұрын
  • Really good explanation of how the fact that no secret key needs to be exchanged!

    @gasquakestudios@gasquakestudios6 жыл бұрын
  • I love the flying toasters! Obscure reference that brings me back to the 90s PC computing world!

    @christomapher@christomapher5 жыл бұрын
  • Very informative video!

    @Mr_Creasy_@Mr_Creasy_6 жыл бұрын
  • Hands down the best video on cryptography on KZhead. 12 minutes for expert level 😀

    @gnollins@gnollins Жыл бұрын
  • I love simple explanations of complicated things, awesome video

    @max500k@max500k3 жыл бұрын
  • I think it would be a great idea to make a second video where you talk about vulnerabilities of cryptography! For example, Diffie-Hellman is only secure against passive attacks; however you can fool both sides into thinking that a secure connection is established by a man-in-the-middle attack. There are different ways to eliminate this problem. Also public keys need to be stored in a secure source. If an attacker is able to distribute his own public key, it will lead to problems. There are many more examples, which could easily fill another video. I loved this one, it was a great introduction, but I wish you would go into more detail, especially since it might give the impression that these algorithms have no flaws :)

    @Xappreviews@Xappreviews6 жыл бұрын
    • Xappreviews yeah they didn't cover a really important part, the man in the middle attack, they should've mentioned certificates

      @mehdibounya@mehdibounya6 жыл бұрын
  • wow this is the first time I got my head around how public keys work, please do more videos on the subject!

    @sedthh@sedthh6 жыл бұрын
  • Finally! An understandable explanation how prime numbers work in cryptography with color metaphor.

    @tenow@tenow6 жыл бұрын
  • thanks for the awesome videos. this is one of my favourite channels on youtube. can you please do a series on Criminology and also Linguistics? thanks :)

    @milestone2852@milestone28526 жыл бұрын
  • I really liked both the video's content and the narrator - She's great! Good job! :)

    @gustavlarsson1785@gustavlarsson17856 жыл бұрын
  • I love this channel! Awesome videos

    @TravelTrivia@TravelTrivia6 жыл бұрын
  • Thanks, this episode really helped me.

    @DuluthTW@DuluthTW6 жыл бұрын
  • I'm taking a software engineering technical interview and wanted to brush up quickly on this stuff, thanks Crash Course 👍

    @jackkraus6948@jackkraus69482 ай бұрын
  • This series is so awesome!

    @tommrutherford@tommrutherford6 жыл бұрын
  • In practical modular exponantiation you don't calculate the B^n before taking mod m since this number would be stupidly big and probably wont fit into memory. Instead you divide it into a series of taking power 2. If n = 2k is even, then B^n = (B^2)^k. If n = 2k+1 is odd, then B^n = B(B^2)^k. If B^2 > m, let C = B^2 mod m, then and (B^2)^k mod m = (B^2 mod m)^k = C^k (Also B(B^2)^k mod m = B(B^2 mod m)^k = BC^k). It is quite easy to code this if you want to give it a try.

    @eriksatterqvist6027@eriksatterqvist60276 жыл бұрын
  • Thank you very very very much for this great video. It helped me a lot for understanding the fundamentals and history of Cryptography. :)

    @Tharindusri91@Tharindusri915 жыл бұрын
  • The paint analogy was very useful

    @What_was_wrong_w_jst_our_names@What_was_wrong_w_jst_our_names5 жыл бұрын
  • The bit about key exchange was very informational.

    @tellingfoxtales@tellingfoxtales6 жыл бұрын
  • Perfect description

    @annayapaymah7352@annayapaymah73526 жыл бұрын
  • We can more appreciate this by citing non-electronic ciphering/deciphering.. Good job mentioning Ceasar and Columnar

    @FedJimSmith@FedJimSmith6 жыл бұрын
  • Thanks. This was an extremely informative video

    @Arunk0320@Arunk03205 жыл бұрын
  • I did a course on Cryptography and Information Security in my degree. I remember we touched upon DES and AES, and other advanced topics such as elliptic curves.

    @RichyMaths@RichyMaths Жыл бұрын
  • This nice explanation you have given. Hope all needs to watch it.

    @ArjunSutar@ArjunSutar5 жыл бұрын
  • I have learnt more from a few Crash course videos than I did my entire XX years spent at school. Just goes to show education is not education its just there to make you pass tests, not to learn. Thanks CC. Thanks Alan Turing

    @ratgreen@ratgreen6 жыл бұрын
    • It's not that simple. Sure, this is explained in an easy way, but our brains aren't capable of storing this information in a way that you can remember it easily in the future. These videos should in my opinion instead be seen as a support for the subject which you then learn through a more conventional way.

      @Hofftari@Hofftari6 жыл бұрын
    • ratgreen no, you just don't recognise the skills you learnt in school

      @lutze5086@lutze50866 жыл бұрын
    • The videos give you a taste of these subjects, just a scratch on the surface. You need education to learn how to study properly and get as much knowledge as you need. Don't hate school, it's normal to feel that way, but it's a lot more important than you think :)

      @user-qj9gj5cw3b@user-qj9gj5cw3b6 жыл бұрын
  • I fall in love at the end of the video~

    @LeO-hm3tj@LeO-hm3tj5 жыл бұрын
  • This is so interesting, wow!

    @michelleschultze4641@michelleschultze46416 жыл бұрын
  • Thank you for making me understand

    @sarielreigns777@sarielreigns7775 жыл бұрын
  • An interesting addition: The first version of Enigma, the one which had only 3 rotors has been cracked even before the beginning of WWII by 3 Polish mathematicians. Unfortunately their methods became obsolete the moment the 2 additional rotors have been added to the machine, making it again impossible do decipher Enigma until the Turing's breakthrough. (A commemorative memorial of the Polish input was placed in 2002 at Bletchley Park).

    @Lycz@Lycz6 жыл бұрын
  • "so now you know all the _key_ parts of modern cryptography" , this woman makes me crease omg im dying thanks cryptography for bringing this woman to me the puns are fantastic

    @flopped3419@flopped34196 жыл бұрын
  • Tip: if you want to learn something, change the speed to .75

    @hokageenergy9599@hokageenergy95994 жыл бұрын
  • So well explained ! Thanks a lot !

    @Utkarshkharb@Utkarshkharb Жыл бұрын
  • ive watched a GAZILLION videos on cryptography... and i always had the sensation that some part was missing, that it didnt make total sense.. i thought i was just dumb, but FINALLY someone explained it completely and clearly! best explanation EVER. all other videos forget to tell the public key is used in conjunction to the private to create something new. thats key! (pun intended) awesome job! this crash course is truly a masterpiece

    @Ni7ram@Ni7ram Жыл бұрын
  • Love these videos!

    @gavin5861@gavin58616 жыл бұрын
  • Great episode!

    @SergioBobillierC@SergioBobillierC6 жыл бұрын
  • very informative . Good job!

    @darioaguado5981@darioaguado59815 жыл бұрын
  • so proud when turing came up :)

    @tilinapple@tilinapple6 жыл бұрын
  • the wife has got the best cryptography, I dont understand her at all!

    @davidsweeney111@davidsweeney1116 жыл бұрын
    • don't they all?

      @the80386@the803866 жыл бұрын
    • The real question is, who is she encrypting it for? 😏😏😏

      @chasepablo5222@chasepablo52226 жыл бұрын
    • She is hashing, not encrypting

      @NeedForMadnessSVK@NeedForMadnessSVK5 жыл бұрын
    • Well a brute force attack will get you divorced I think so I don't recommend that! How about taking her on a phishing​ trip with you- If you promise to cook the catch and clean the dishes afterwards you may net that critical algorithm!

      @rickh3714@rickh37145 жыл бұрын
    • Boomer humor

      @markzucc3277@markzucc32775 жыл бұрын
  • Absolutely beautiful

    @andrewgrebenisan6141@andrewgrebenisan61416 жыл бұрын
  • B^Y mod M to the X is not equivelent to B^X mod M to the Y. You have to take the modulo afterwards, and it only works for very specific bases and modulos.

    @shalop5614@shalop56145 жыл бұрын
  • With the modular exponent example if somebody in the middle intercepts both sides of the communication they get the same value for the shared key - i'm sure the NSA is already doing this, they already compromised RSA security and functions with backdoors to decrypt without using brute force.

    @dabay200@dabay2006 жыл бұрын
  • This is a great video!

    @windowsforvista@windowsforvista6 жыл бұрын
  • Something you should have mentioned is that cryptography is only perfectly secure in theory - in the real world there are side channel attacks. Id explain it but I think that people who read this comment will have more fun researching this themselves ;)

    @yuvaldolev7969@yuvaldolev79696 жыл бұрын
    • Yep and side channel attacks are the only crypanalysis attacks out there. There isn't a single other more common attack.

      @shalop5614@shalop56145 жыл бұрын
  • Cracking open the code book with the bois

    @hyunjinpark5086@hyunjinpark50866 жыл бұрын
  • EXCELLENT . Nawar

    @nourchtioui3086@nourchtioui30865 жыл бұрын
  • 9:43 That is not mathematically equivalent... See for example: b = 4, x = 3, y = 7, m = 18 You need to take the modulo M of the result to get the same key. In the wikipedia article about that topic they say, that b needs to be a generator of the group of m , but I haven't tried it out yet.

    @moritzmakowski9422@moritzmakowski94226 жыл бұрын
  • Great video, thank you!

    @Lukeff7@Lukeff76 жыл бұрын
  • great video!

    @tgeo2880@tgeo28805 жыл бұрын
  • I love this!

    @nascomfub@nascomfub Жыл бұрын
  • big fans of this series of videos, currently pursuing a diploma in IT. 'd to know if there is any plan for making a video about quantum computing?

    @jameshoe1750@jameshoe17506 жыл бұрын
  • Great video guys!

    @loversdiscovers5099@loversdiscovers50994 жыл бұрын
  • This was awesome :)

    @nandiking5608@nandiking56085 жыл бұрын
  • Have a good day everyone!

    @kareemrshaidat1794@kareemrshaidat17946 жыл бұрын
  • Thanks cryptography!

    @ianrjm969@ianrjm9694 жыл бұрын
  • Great video. Thanks

    @AmanSingh-xc6xv@AmanSingh-xc6xv6 жыл бұрын
  • Very informative

    @maheshirk@maheshirk6 жыл бұрын
  • Amazing animations

    @arielcurra7647@arielcurra76475 жыл бұрын
  • Nice Code Club shout-out - Claire and Linda will be happy :-).

    @cholten99@cholten996 жыл бұрын
  • Hot oil in the medieval ages wasn't used like you see it in Hollywood. Oil was an expensive resources so what they would actually do is pour boiling water or extremely hot sand. Yes there was some occasions where it happened but that's an exception not the norm as it's portrayed.

    @jeremybailey262@jeremybailey2624 жыл бұрын
  • You forgot to show the part where John has to call Daniel Biss and ask what an exponent is.

    @k54ltyd28@k54ltyd286 жыл бұрын
    • Now that's *harsh* LMAO

      @DavidChipman@DavidChipman6 жыл бұрын
  • Nice video, I was really hoping for an illustration of one time pads though.

    @electroninja8768@electroninja87686 жыл бұрын
  • I'm pretty bad at math and could understand this , well done. Although it does beg the question of why people consider math a requirement when the principles have more to do with logic than mathematics.

    @phantomapprentice6749@phantomapprentice674911 ай бұрын
  • The details are amazing 🕺. Thank you Carrianne (mind the spelling)

    @emmanueloshaddai3259@emmanueloshaddai32596 жыл бұрын
  • the best video!!!

    @yurilsaps@yurilsaps6 жыл бұрын
  • Very well made video. You get a like! :)

    @EmmanuelHernandez-yz1wy@EmmanuelHernandez-yz1wy6 жыл бұрын
  • Love the Shirts

    @philward2098@philward20985 жыл бұрын
  • Thank you :)

    @manodlakchanwijayarathne4488@manodlakchanwijayarathne44886 жыл бұрын
  • Alan Turing blinking on the bug of engima was hilarious

    @vikaskadel3005@vikaskadel30054 жыл бұрын
  • OK, managing to get the Wilhelm Scream into a cryptography is an accomplishment in itself… \o/

    @PierreThierryKPH@PierreThierryKPH6 жыл бұрын
  • I love sneaky Hank!

    @kaptenteo@kaptenteo6 жыл бұрын
  • The amount of times hank has been attacked lmao

    @collinsmilgo8869@collinsmilgo88694 жыл бұрын
    • Hey may need to go to -Hotel- Healthcare Trivago.

      @theblinkingbrownie4654@theblinkingbrownie46544 жыл бұрын
  • Fantastic

    @viddeshk8020@viddeshk80204 жыл бұрын
  • 0:30 Wilhelm scream!

    @Danny_Boel@Danny_Boel6 жыл бұрын
  • 3:20, nueral network 😅

    @souvikcseiitk@souvikcseiitk10 ай бұрын
KZhead