Cryptography, Perfect Secrecy and One Time Pads | Two Minute Papers #25

Subscribers:
1,720,000
Published on ● Video Link: https://www.youtube.com/watch?v=Q-XKOPNIDAg



Duration: 5:43
13,574 views
287


Cryptography helps us to communicate securely with someone in the presence of third parties. We use this when we do for instance, online banking or even as mundane tasks as reading our gmail. In this episode, we review some cipher techniques such as the Caesar cipher, rot13, and as we find out how easy they are to break, we transition to the only known technique to yield perfect secrecy: one time pads. Are they practical enough for everyday use? How do our findings relate to extraterrestrial communications? Both questions get answered in the video.

Additional comment: "In modern certification cryptanalysis, if a cipher output can be distinguished from a PRF (pseudo random functions), it's enough to deem it broken." - Source: https://twitter.com/cryptoland/status/666721478675668993

______________________

The paper "Cipher printing telegraph systems: For secret wire and radio telegraphic communications" is available here:
http://math.boisestate.edu/~liljanab/Math509Spring10/vernam.pdf

You can try encrypting your own messages on these websites:
http://practicalcryptography.com/ciphers/caesar-cipher/
http://rot13.com/index.php
http://www.braingle.com/brainteasers/codes/onetimepad.php

Subscribe if you would like to see more of these! - http://www.youtube.com/subscription_center?add_user=keeroyz

The thumbnail background was created by Adam Foster (CC BY 2.0) - https://flic.kr/p/b99vsi
Splash screen/thumbnail design: Felícia Fehér - http://felicia.hu

Károly Zsolnai-Fehér's links:
Patreon → https://www.patreon.com/TwoMinutePapers
Facebook → https://www.facebook.com/TwoMinutePapers/
Twitter → https://twitter.com/karoly_zsolnai
Web → https://cg.tuwien.ac.at/~zsolnai/




Other Videos By Two Minute Papers


2015-12-20Painting with Fluid Simulations | Two Minute Papers #33
2015-12-16How Do Genetic Algorithms Work? | Two Minute Papers #32
2015-12-12OpenAI - Non-profit AI company by Elon Musk and Sam Altman
2015-12-10Randomness and Bell's Inequality [Audio only] | Two Minute Papers #31
2015-12-03Automatic Parameter Control for Metropolis Light Transport | Two Minute Papers #30
2015-11-29Artificial Superintelligence [Audio only] | Two Minute Papers #29
2015-11-25Are We Living In a Computer Simulation? | Two Minute Papers #28
2015-11-22Google DeepMind's Deep Q-Learning & Superhuman Atari Gameplays | Two Minute Papers #27
2015-11-21Multiple-Scattering Microfacet BSDFs with the Smith Model
2015-11-18Terrain Traversal with Reinforcement Learning | Two Minute Papers #26
2015-11-15Cryptography, Perfect Secrecy and One Time Pads | Two Minute Papers #25
2015-11-11How Does Deep Learning Work? | Two Minute Papers #24
2015-11-07Recurrent Neural Network Writes Sentences About Images | Two Minute Papers #23
2015-11-06Be a Part of Two Minute Papers on Patreon!
2015-11-03Automatic Lecture Notes From Videos | Two Minute Papers #22
2015-10-30Real-Time Facial Expression Transfer | Two Minute Papers #21
2015-10-26Gradients, Poisson's Equation and Light Transport | Two Minute Papers #20
2015-10-23Recurrent Neural Network Writes Music and Shakespeare Novels | Two Minute Papers #19
2015-10-20Modeling Colliding and Merging Fluids | Two Minute Papers #18
2015-10-173D Printing a Glockenspiel | Two Minute Papers #17
2015-10-14Metropolis Light Transport | Two Minute Papers #16



Tags:
two minute papers
perfect cryptography
perfect secrecy
caesar cipher
vernam cipher
Cipher printing telegraph systems: For secret wire and radio telegraphic communications
cipher
one time pad
online banking cryptography
what is broken cryptography
one time pad vernam cipher
deep learning
cryptography tutorial
one time pad tutorial
one time pad explained
cryptography explained
enigma
encryption tutorial
one time pad encryption
one-time-pad
cryptography research