One Encryption Standard to Rule Them All! - Computerphile

One Encryption Standard to Rule Them All! - Computerphile

Computerphile

4 года назад

424,260 Просмотров

Ссылки и html тэги не поддерживаются


Комментарии:

@imhaile7568
@imhaile7568 - 24.05.2023 09:46

one ring to rule them all

Ответить
@garybuttherissilent5896
@garybuttherissilent5896 - 10.02.2023 00:06

Joan Daemen is my professor at Radboud University, so awesome to be taught by one of the best :D

Ответить
@pachualt
@pachualt - 04.12.2022 01:18

When he says "sp networks", all I hear is "yes peanut works". I might just be hungry.

Ответить
@josephvanname3377
@josephvanname3377 - 16.11.2022 23:14

I am going to attack the AES. Hopefully I can break it.

Ответить
@lherfel
@lherfel - 11.11.2022 14:54

thanks

Ответить
@RayanMADAO
@RayanMADAO - 24.10.2022 00:57

What does it mean for encryption to be able to work on a hardware level? I'm confused how that works

Ответить
@simplicitas5113
@simplicitas5113 - 19.08.2022 16:29

"Not me, I was quite young at the time"

He would have aced it nowadays obviously

Ответить
@_skeptik
@_skeptik - 15.01.2022 12:31

I hope one day we will see a video about DES

Ответить
@MrMalibublues
@MrMalibublues - 17.12.2021 12:25

For one second there I thought the guy was Ted Chaough from Mad Men.

Ответить
@wildexploit
@wildexploit - 17.12.2021 03:06

One encryption standard to fail us all. When a vulnerability is found.

Ответить
@fribiesdi
@fribiesdi - 11.12.2021 02:49

I like this channel, I will subscribe immediately.

Ответить
@NavySturmGewehr
@NavySturmGewehr - 02.12.2021 20:49

There always seems to be a metric of, one super computer working on this problem. What about if it's spread across thousands of cpus, each attacking a different segment of that 2^128?

Ответить
@MahmudulHoque-yr5xg
@MahmudulHoque-yr5xg - 15.10.2021 23:42

This person is solely responsible for reigniting my interest in academic research. Hope he makes more videos.

Ответить
@PriyanshulGovil
@PriyanshulGovil - 14.07.2021 11:45

..., one encryption to find them. one encryption to bring them all, and in the darkness bind them.

Ответить
@esmatullahsaidy4037
@esmatullahsaidy4037 - 19.05.2021 13:35

This man is genius!!! I like the way he explains cryptography and complex things.

Ответить
@EpicVideoMaster11
@EpicVideoMaster11 - 02.05.2021 16:01

Thank you

Ответить
@cherokeejaxk
@cherokeejaxk - 25.04.2021 22:11

so frodo did keep the ring

Ответить
@uniquechannelnames
@uniquechannelnames - 23.04.2021 14:54

Hahaha this guy gets himself into like 1000 more videos with every video he's in.

"We'll talk about that more in another video"

"We'll go into greater detail on that in another video "

Ответить
@bernardinojosa3777
@bernardinojosa3777 - 19.03.2021 14:00

i thought that he was going to talk about "ryan dahl", the creator of node.js

Ответить
@Jirayu.Kaewprateep
@Jirayu.Kaewprateep - 11.03.2021 20:57

Correct famous algorithms suitable but they aren't limits by input parameters but change it often that create in security by process too. 😃

Ответить
@joerivde
@joerivde - 19.02.2021 14:43

Aaay so we Belgians have something to be proud of at least ^^

Ответить
@josesandro6116
@josesandro6116 - 14.02.2021 01:03

Meu amigo gosto muito do seu canal que Pena que não tem a legenda em cima português???

Ответить
@kpw84u2
@kpw84u2 - 27.12.2020 11:58

He has zero understanding of the power of quantum computers.

Ответить
@mariasyed9416
@mariasyed9416 - 26.09.2020 09:43

isn't triple DES done with 2 keys?

Ответить
@sauron9883
@sauron9883 - 18.08.2020 01:04

One ring to rule them one.

Ответить
@OleTange
@OleTange - 25.07.2020 17:58

"It will take millions of years to break"

That is only if you assume that you buy the hardware today. And thus this is a very wrong assumption.

2^128 is a large number: 3 * 10^38.

Assume you can test 1 G keys per second today, and hardware gets 2x faster every 10 years. That is a fairly modest assumption today.

In the first 10 years you will have tested 10^9 keys/s * 3*10^7 s/year * 10 year = 3*10^17 keys.
In the next 10 years you will have tested 2^1 *10^9 keys/s * 3*10^7 s/year * 10 year = 6*10^17 keys.
In the next 10 years you will have tested 2^2 *10^9 keys/s * 3*10^7 s/year * 10 year = 12*10^17 keys.
...
In year 300-309 you will test 2^30 *10^9 keys/s * 3*10^7 s/year * 10 year = 3*10^26 keys.
...
In year 700-709 you will test 2^70 *10^9 keys/s * 3*10^7 s/year * 10 year = 3*10^38 keys.

So even with very modest assumptions we are not talking millions of years, but instead 700 years.

And if we assume hardware and better algorithms improve by 2x every year (which historically is closer to reality) then we are talking 70 years.

Ответить
@saultube44
@saultube44 - 22.07.2020 21:13

Why not go with Serpent now that computer are way faster and multi-core, 8-16 cores is now common, more secure and would be practically unnoticed; we reinvent the wheel because better wheel. At least an evaluation and real-world practical index should exist, if the usefulness is too low and the security will increase too little for the added power and time consumption by the extra processing, them sure, it's not worth it, but such assessment should occur by the Cryptocommunity

Ответить
@puntypunty8847
@puntypunty8847 - 06.07.2020 20:50

My dad is a journalist and he interwiewed Rijmen en Daelen and they said that they made the name do that english speaking people would'nt be able to pronounce it and ...

Ответить
@ancyntic
@ancyntic - 02.06.2020 16:42

well quantum computers are gonna destroy these keys now. So, we're going to have to come up with a new encryption. If that's even going to be possible.

Ответить
@ZippiWippi
@ZippiWippi - 10.05.2020 11:23

des cats three times

Ответить
@jaspersurmont4803
@jaspersurmont4803 - 17.04.2020 20:22

Vincent Rijmen is my prof at my university :D

Ответить
@litebooks7638
@litebooks7638 - 27.03.2020 07:04

I could listen to him talk all day!

Ответить
@laharl2k
@laharl2k - 21.03.2020 10:36

Coincidentally TrueCrypt uses the three of AES, Serpent and Twofish chained together to encript its data

Ответить
@ripmeep
@ripmeep - 06.03.2020 04:47

Is it just a coincidence that the views are on 256k or am I tripping

Ответить
@joeyhensley9199
@joeyhensley9199 - 29.02.2020 12:05

In physics, a chain is only as strong as its weakest link.
However, in cryptography, the inverse is true. The message is as secure as the strongest method used. Yes, I am talking about "daisy chaining" crypto systems.
1. ROT 13
2. AES.
You can't get to the super simple ROT 13 unless you first break AES..

Ответить
@krisr3868
@krisr3868 - 20.02.2020 22:36

I'd like to see a video on the CAESAR crypto competition one day. And the SHA-3 process as well.


AFAIR (from classes taught by the man himself, though it's a handful of years ago), Lars Knudsen (from the Serpent team) agrees with the choice of Rijndael as AES. Not so much with Keccak as SHA-3.

Ответить
@brunobenetti9756
@brunobenetti9756 - 14.02.2020 15:05

p hoblm

Ответить
@K1RTB
@K1RTB - 12.02.2020 06:18

Here’s an idea: Quadruple DES

Ответить
@trissylegs
@trissylegs - 25.01.2020 05:25

Chacha20's design wasn't just to make it faster in software using conventional hardware. It also designed to avoid side channels in software implementations.
Due to fast implementations of AES needing lookup tables the key can be inferred due to timing differences. (Also the sound the CPU makes which is freaky)
Chacha20 is also seekable, if you have encrypted a 20GB block and you want to read the end of it. In AES-GCM you'd decypt the whole block. In ChaCha you can decrypt any part of the sequence.

(Also XChaCha20 is now used in TLS 1.3)

Ответить
@ifell3
@ifell3 - 19.01.2020 04:06

Keepass uses two fish.

Ответить
@HormetjanYiltiz
@HormetjanYiltiz - 18.01.2020 05:25

Can't believe OpenSSL is mentioned as a standard implementation...

Ответить
@douggief1367
@douggief1367 - 03.01.2020 16:20

Once back door to rule them all.

Ответить
@NerdGlassGamingPA
@NerdGlassGamingPA - 01.01.2020 04:01

What if internet is in the equation. I don't know the details but some people use "trojan like" softwares to make your computer a slave or maybe a joint voluntary attack using the computers of people around the world to brute force stuff ?

Ответить
@_adi_dev_
@_adi_dev_ - 30.12.2019 04:30

Can we look at post quantum encryption standards please

Ответить
@joshuabeha4434
@joshuabeha4434 - 21.12.2019 06:45

Is the ring in the thumbnail a reference to digital fortress?

Ответить