Encryption as Fast As Possible

How does data travel around the internet without becoming publicly visible? Encryption! But what is encryption?…

Massdrop link: http://dro.ps/techquickie


28 thoughts on “Encryption as Fast As Possible

  • Historical point: the Allies never actually cracked the Nazi German enigma system. Some of the German enigma operators sending messages used the same opening key phrases like "Heil Hitler" and "Today's weather is …" that random daily keys for the cipher became fatally flawed and associated with specific German enigma operators. The fundamentals of enigma system are actually brilliant but the fatal weakness became the human operators themselves (lucky for the Allies).

  • Hey techquikie this is the half story of web encryption, after a successful public key private key connection their is a AES key exchanges in between 2 PCs and then the whole traffic is encrypts with AES encryption

  • Thumbs down

    The email example shows they do not know how encryption works

    Whilst i appreciate this is a very summarised and basic overview of encryption, to state in email sending the recipient sends a public key to the sender prior to the email being sent is a utter load of tosh

    Encryption is basically nothing more than substituting letters to confuse the reader by scrambling the plain text into ciphered text

    Also dont confuse email with instant messengers which unlike emails, do use end to end encryption, which is what this video was attempting to explain

    Encryption is as old as time its self, a ceaser cipher is named after the method of encryption used by the roman emperor julius ceaser

    The enigma machiene was a phenomenal machiene of its time given that it had a rotatry wheel that could be orderes differently, set up to start at a particular setting and repeat keystrokes would encrypt differently each time, the circuit jumpers added later during ww2 made it further more secure, in that it would jumble up the letters and that unless you had

    The rotatory wheel order
    The key (initial starting point for the wheels)
    And jumper settings

    You had no chance at all of decoding it manually, specially within 24hrs as the germans switched the key frequently

    Today the method of encryption uses computers, to which all use letters which hold a numerical value within the ascii table

    The lowest value being 0 and the highest 255 (tho printable characters start at values 32)

    The number 255 isnt plucket out of thin air, its basically a binary bite (8 bits, which is either 1 or 0)
    In that 11111111 is 255 and 00000000 is 0

    Unlike ascii, you cant reverse the values because they can fall oitside the 255 limit

    Ie 220 is fine being reversed to 022 because its between 0 and 255, but take the letter A which is 065 would become 560

    But the ascii conversion makes it easier to do a cipher shift to scramble up the text before progressing

    Hexidecimal values always fall within 255, so once you convert ascii to hex its easy to reverse the value

    Take the values 0F becoming F0
    0F = 15
    F0 = 240

    You can use a key (public key) that then enables a polyalphabetic cipher in that each letter alters ib the cipher shift based on its numerical positioning in the alphabet

    Add that together with a certificate file or map file to determine which letters should map to what letters as a shifting map done before all of this, and you end up with a virtual enigma machiene with more reels than the one in the war

  • my question is who will generate the public key , private key – is it the recipient (server) ?
    in the scenario when the clients browser request to access google.com , the google server (recipient) generates the public key and pass to the clients browser , then the client encrypts it whereas the server after getting the message decrypts with its own private key

Comments are closed.