Cracking Enigma in 2021 - Computerphile

  Переглядів 2,407,513

Computerphile

Computerphile

3 роки тому

Enigma is known as the WWII cipher, but how does it hold up in 2021? Dr Mike Pound implemented it and shows how it stacks up against his laptop.
Mikes Code:
bit.ly/C_Mike_enigma
Cryptool v2 is here:
bit.ly/C_Cryptool
The original paper that Mike's attack is based off
web.archive.org/web/200607200...
/ computerphile
/ computer_phile
This video was filmed and edited by Sean Riley.
Computer Science at the University of Nottingham: bit.ly/nottscomputer
Computerphile is a sister project to Brady Haran's Numberphile. More at www.bradyharan.com

КОМЕНТАРІ: 2 000
@humanNumer1
@humanNumer1 3 роки тому
Let's honour great Polish mathematicians (Jerzy Różycki, Henryk Zygalski, Marian Rajewski) who broke the first Enigma giving Turning the basis, so they are not erased from history
@NiedzwiedzWojtekMusic
@NiedzwiedzWojtekMusic 3 роки тому
exactly, this is so overlooked
@DunderKlomp
@DunderKlomp 3 роки тому
If you go to Bletchley Park, you'll see their contribution is well-recognized. Gays FTW!
@deadcatthinks6725
@deadcatthinks6725 2 роки тому
The 2 Zlote coin has an enigma wheel on one face
@Jan-eh7nf
@Jan-eh7nf 2 роки тому
@@DunderKlomp I've been at Bletchley Park Computing Museum 3 years ago and found ZERO (literally) mention about any Polish contribution.
@johndavid360
@johndavid360 2 роки тому
* Turing
@PhilKulak
@PhilKulak 3 роки тому
What a testament to Turing's brilliance: it's not even trivial 80 years later.
@GapWim
@GapWim 3 роки тому
Indeed. But also to Arthur Scherbius, the inventor of the enigma machine itself: it’s not even trivial 80 years later.
@izzyr9590
@izzyr9590 3 роки тому
No joke. I’m a computer science student. After watching “the imitation game” I searched up “how does Enigma work” and I thought “ah it must be so easy to understand and decode now!”. Nope.
@kopasdupas
@kopasdupas 3 роки тому
It's an achievement of many people, including Marian Rejewski, who broke the simpler version of Enigma in 1930. His work was then used by Turing & Park as a foundation for newer Enigma in 1941.
@projecttitanomega
@projecttitanomega 3 роки тому
Not to mention, Mike could code this up on his laptop, pre-built and bought at a store, in a high-level coding language. Turning *built* his computer. Imagine not simply having to write the code, but having to also physically construct a machine solely to run it. No using pre-built chips, no machine code, no assembly code, no standardization, no reference for building such a machine or any help from other learned people, as at the time, no such machine had ever really been built and there were no people who knew how to build it. He was a once in a generation genius.
@Sakkura1
@Sakkura1 3 роки тому
@@projecttitanomega The "bomb" computers were a Polish design, not something Turing came up with.
@AlexSchmid-TheAceofSpades
@AlexSchmid-TheAceofSpades 3 роки тому
" I implemted an enigma machine because it was fun." This is the mark of a true programmer.
@Warlock_UK
@Warlock_UK 3 роки тому
I mean this is why I'm watching this whole video and am not even slightly bored.
@alainbesseleer6516
@alainbesseleer6516 3 роки тому
Haha, I did the same, and it was fun indeed. But I wasn't able the write code to crack Enigma yet. As mentioned in the video, a brute force attack will take too long, even with modern computers.
@Hr1s7i
@Hr1s7i 3 роки тому
@@alainbesseleer6516 An average laptop has like what, 4-6 cores? Try this with a basic workstation that has something like 64 cores slugging through the computations at 4ghz. Just based on the amount of alu available and their sheer size given nowadays they can operate with 64 bit values, you can do quite a bit more than you'd assume and it's relatively affordable (for cracking the enigma at least... forget anything short of a chunk from the national budget to crack a decent modern encryption).
@PiezPiedPy
@PiezPiedPy 3 роки тому
@@Hr1s7i Even better use compute shaders and a stack of GPU's and you will be looking at thousands of cores to do the work of decryption. Also don't use a sequential brute force.
@JorgetePanete
@JorgetePanete 3 роки тому
implemented*
@m.cigledy6769
@m.cigledy6769 2 роки тому
One thing that wasn't mentioned was how difficult it would be to decipher if you didn't start out already knowing that it was an enigma cypher.
@gezzuzzful
@gezzuzzful Рік тому
you just to steal the machine
@Bunny99s
@Bunny99s Рік тому
@@gezzuzzful Well, that's not what he said. Of course knowing how enigma works (i.e. stealing an enigma machine) is the fundament to break the code. The point here is, how do you know if the encrypted message is actually an enigma cypher? Imagine I give you some encrypted message right now. How do you know if this was encrypted with enigma or maybe RSA or AES. Maybe just a simple Caesar cipher or a simple pre-shared-key xor cypher. All your attempts to crack it as if its an enigma cypher would not really help you.
@blackjacktrial
@blackjacktrial Рік тому
Also how difficult to decipher it would be if you didn't know what language was encrypted. If you decide Swahili or Martian successfully, it's still useless to you if you can't recognise it.
@dj1NM3
@dj1NM3 Рік тому
@@Bunny99s It would be abundantly clear that it wasn't a Caeser-shift cypher, if it's a known English (or American) message which fails the ETOAN frequency test. After that, I suspect that it would be a bit of a guessing-game as to what encryption system was used and I doubt that the 5-letter cluster WW2 vintage formatting would be used, as it would most likely be sent as a solid block of characters instead. A modern, digital spin on Enigma could use different sized "virtual rotors" and rather than merely 26 positions (just the English letters in one case), could have upper-case, lower-case, numbers 0-9, space and all the commonly used punctuation marks, making rotors with about 70 positions each. Then there's the possibility of eliminating the "tell" of no symbol being encyphered as itself, but whether that's considered to matter when there's now about 24million possible rotor setting combinations from one arrangement of just 4 rotors, compared to the original 4-rotor Naval Enigma with about 0.5million possible rotor setting combination from one arrangement of 26-position rotors. This is also ignoring the "reflector", which doubles the exponent (70^8 or 26^8 instead of "merely" 70^4 or 26^4) by running the circuit back through the rotors. I would also hazard a cautious guess that some loon could even construct a physical version of a 70-position rotor machine, just for the heck of it.
@operator8014
@operator8014 Рік тому
Lol!
@Saturate0806
@Saturate0806 3 роки тому
Someone has to finish Code Bullet's projects...
@hetsmiecht1029
@hetsmiecht1029 3 роки тому
Lol
@elizabethfransen398
@elizabethfransen398 3 роки тому
I was about to say!
@domninin
@domninin 3 роки тому
Now I finally know
@nullentrophy
@nullentrophy 3 роки тому
Lol
@Crazy1793
@Crazy1793 3 роки тому
Haha yess!
@Liggliluff
@Liggliluff 3 роки тому
What I take from this video is that, if you get one of them correct, it'll be slightly better.
@muizzsiddique
@muizzsiddique 3 роки тому
How many times has he said that throughout the video? I thought I was going crazy.
@pies765
@pies765 3 роки тому
Hmm, I think he should have made that more clear honestly, kinda vague.
@AlePazzaglia
@AlePazzaglia 3 роки тому
@@pies765 Basically he said that if you get one of them correctly, the IoC will tend to get slightly better
@MartinSFesty
@MartinSFesty 3 роки тому
@@AlePazzaglia WHAT?
@MoritzvonSchweinitz
@MoritzvonSchweinitz 3 роки тому
Well, yes. That is the most important vulnerability of the Enigma scheme, and the biggest difference to modern schemes.
@hackcraft_
@hackcraft_ 3 роки тому
"well, the weakness of Enigma is that if we get some of these things right, even if the others are wrong, we get a little bit closer to the answer, usually."
@jordananderson2728
@jordananderson2728 3 роки тому
He addresses that at 20:30, mentioning how with a 128-bit or 256-bit encryption, even if you get the first bit correct you'll still have random noise. The fact that Enigma *did* show marked improvement with correctly guessed settings meant that it was inherently insecure to a degree.
@martinwragg8246
@martinwragg8246 3 роки тому
Not so obvious if you connect 10 stecker plugs, the IOC will hardly change if you guess 1 plug correctly. Without any stecker plugs connected you can crack 100 character text in a few minutes on a laptop.
@Execuor
@Execuor 3 роки тому
@@martinwragg8246 fyi Stecker means plug.
@martinwragg8246
@martinwragg8246 3 роки тому
@@Execuor thanks, I did know, just what I call them. 😉
@modalmixture
@modalmixture 3 роки тому
Is there a cryptographic term for this property?
@mattiiejwheis1350
@mattiiejwheis1350 Рік тому
We cracked enigma a few years ago in our class with our teacher and it was so much fun. He really tried to explain everything and we actually understood it. It was such a great feeling to see this video and remember everything I learned
@jackass123455
@jackass123455 Рік тому
at my school we had a sort of computer club wher we could play call of duty (the original back IN 04, 05) to gain entry you had to get a password that was encrypted with an enigma machine. the clue was HELP (this was the start postion leters of the wheels) and the plug board was pre defined was kinda fun trying to figure it out
@ToadyEN
@ToadyEN 3 роки тому
14:36 “I’m lazy” - programmes enigma machine decoder in spare time 😂
@costa_marco
@costa_marco 3 роки тому
Programmers have a different definition for "laziness": expend 8 hours automating a solution to a job that would take 1 hour to do by hand, just in case you have to do it again in the future. The reasoning: I am lazy... 🤷‍♂️
@RealCadde
@RealCadde 3 роки тому
@@costa_marco And that's why programmers are so much more efficient than most others when it comes to doing stuff on computers. Your regular guy would manually update a spreadsheet by printing out a list of things that needs to be updated on a piece of paper, tediously going over every entry. A programmer would spend 2 hours making an interpreter of the other document to automate that process. Instant 20,000% efficiency for the foreseeable future. And you'd be amazed at how many there are out there sitting at computer keyboards day in and day out doing it manually.
@Anvilshock
@Anvilshock 3 роки тому
@@RealCadde Except xkcd 1319 ;)
@taragnor
@taragnor 3 роки тому
Yeah pretty much the first question any programmer asks "Can I get some machine to do this process for me?"
@Restil
@Restil 3 роки тому
The laziness he's referring to is not the time spent programming the decoder, but the time he'd have to spend waiting for it to produce a response. 3 rotors takes a few seconds. 5 rotors would take hours or days.
@umka7536
@umka7536 3 роки тому
Dr. Mike Pound is definitely my favorite speaker on the Computerphile. His ability to explain complex problems in a very easy to get way is outstanding.
@sammiller6631
@sammiller6631 3 роки тому
Pound's strategy of repeating "if you get one of them correct, it'll be slightly better." over and over might work for you, but the high energy of Professor Moriarty makes for a more engaging Computerphile for me.
@lanboost2773
@lanboost2773 3 роки тому
Agreed, it also helps that he talks about more interesting topics imo
@EndrewsXeudon
@EndrewsXeudon 3 роки тому
And he saved middle earth!
@x0rn312
@x0rn312 3 роки тому
Which one is Professor Moriarty? I'm a big fan of Mike and Dave-but I think they are all great
@JohnSmith-pu8rd
@JohnSmith-pu8rd 2 роки тому
most suspicious too
@DeHerg
@DeHerg 3 роки тому
18:30 "In the war the limited messages to something like 200 characters" Oh great it's Twitter all over again.
@FrVitoBe
@FrVitoBe 2 роки тому
I 2 try to decipher Twitter messages with enigma for the real message
@nickryan3417
@nickryan3417 2 роки тому
Also because having to reliably type and transcribe for transmission a several hundred character message was a serious chore. There were rules about not re-sending the same message, due to errors, however because on occasion this was not adhered to the security was compromised. The smarts of all the people working on decrypting these messages was staggering.
@irrelevant_noob
@irrelevant_noob 2 роки тому
@DeHerg *14:31
@zamalek4079
@zamalek4079 3 роки тому
The known plaintext at the beginning was the salute that referenced their leader. His ego ultimately led to enigma being cracked during the war.
@yestfmf
@yestfmf 3 роки тому
A great deal of the solution is also from laziness on the part of the germans. Instead of using new codes, they used variations of the same codes. Once the english knew this, they could play with variations and find the key fairly easily.
@matthewmayton1845
@matthewmayton1845 3 роки тому
I think the Kriegsmarine did change the codes once and it took the Allies months to decipher again (or was it adding another rotor). Though they never really change the codes afterwards. One of the flaws with the German's was they believed the Allies could not decipher enigma. If they believed the Allies could, the Germans would most likely have changed the codes (assuming they could to begin with). Instead, Germany focused too much on just espionage.
@stargazer7644
@stargazer7644 2 роки тому
@@matthewmayton1845 The Enigma codes were changed every day at midnight. The Germans also had a way to do it every hour, but they rarely did that. What you're referring to was when the Navy added a 4th rotor, but by then the codebreaking was so advanced it didn't add much of a problem.
@alexrossouw7702
@alexrossouw7702 3 роки тому
Enigma machine: "zmnag ttygt lmrus cd!" Alan Turing: "fkxs."
@temkin9298
@temkin9298 3 роки тому
Is that possible to decrypte or not?
@GastevAleksei
@GastevAleksei 3 роки тому
Mike Pound? Enigma machine? Now this video is lit!
@TotallyTacotrap
@TotallyTacotrap 2 роки тому
I like your pfp
@ryhol5417
@ryhol5417 Рік тому
The history of codebreakers, and the skill. It’s amazing. Love the video
@timothyj1962
@timothyj1962 3 роки тому
I worked with something similar in the Army as a Radio Teletype operator. It was called a KW-7. You were handed a slip of paper and on it was pairs of numbers I believe it was 1 to 32. In the KW-7 there was something called the "Block". The block had 32 wires which you would arrange into sockets on the block according to that slip of paper. Once you set these wires in the block, you put the block into the main crypto body, close and lock the lid, then run a system check. In order for it work properly, you would key up the radio, and hold a button for 15 seconds to sync with other receiving stations. At the time, the machine was classified as Confidential, once keyed it was classified as secret. Unfortunately the system was compromised by the Walker Spy Ring. Not only did this group sell the key lists for almost 20 years. But gave them the design specifications. The crypto essentially was rendered ineffective. I was basically out of a job and was reduced in my speciatly as a single channel radio operator. If this interests you. Look up the AN/GRC-142, AN-GRC-122, AN/VSC-2, and the AN/VSC3. Very cool stuff in its time. All museum pieces now. The KW-7 is no longer classified.
@asailijhijr
@asailijhijr 3 роки тому
The fact or property that getting some settings right improves the metrics means that your approach resembles single-pin picking of a lock.
@alpardal
@alpardal 3 роки тому
Yep, it also resembles evolution: a big change by itself it's really unlikely, but small accumulative changes make you progress little by little in the right direction
@jasonc3a
@jasonc3a 3 роки тому
@@alpardal Lies! Miles don't exist! Everything is inches!
@khleta4334
@khleta4334 3 роки тому
This is the Lockpicking Lawyer and what I have for you today is this Enigma...
@barutaji
@barutaji 3 роки тому
@@khleta4334 cracking enigma: A click on three... Ok, nothing on four...
@man100111
@man100111 3 роки тому
@@barutaji two is binding...
@h-0058
@h-0058 3 роки тому
You know that the Enigma Machine was great when it is being talked about even today
@iHack-ms5nr
@iHack-ms5nr 3 роки тому
Yes! I'm taking second year ICT, and we were just watching The Imititation Game today (A movie about Turing breaking the Enigma cipher)
@xplinux22
@xplinux22 3 роки тому
@@iHack-ms5nr I loved that movie so much. Granted, there was a lot of movie dramatization and some factual liberties taken, but it's a terrific film that does a great job of piquing viewers' interest about cryptography and WWII.
@irene1307
@irene1307 3 роки тому
actually, there were much better rotary machines, but nobody talks about them, because they are just not as famous as Enigma.
@michaelsommers2356
@michaelsommers2356 3 роки тому
Enigma is talked about so much because its breaking was so importance in the war. There were other, better machines, such as the American SIGABA or the British TYPEX, that are not talked about, because they don't have such a compelling story, and because their details are still secret (or they were the last time I checked).
@peterfireflylund
@peterfireflylund 3 роки тому
The Enigma was simple enough to (almost) explain and the breaking of it was declassified a long time ago. The Tunny break was only declassified recently (and it was much more complicated). There was no public information until recently about the British codes (and how easily most of them were broken by the Germans). And the Enigma has Turing, of course.
@x0rn312
@x0rn312 3 роки тому
What I love about Professor Pound is that not only is he hilarious - he is also a humble genius
@karelvandervelden8819
@karelvandervelden8819 3 роки тому
After having worked later generation machines (KL-7) in the seventies as a navy radio-operator I marvel at the simplicity of this explanation. Thanks.
@WhoShortsVids
@WhoShortsVids 3 роки тому
Pound is the best speaker on this channel, pound for pound, no contest. Insta watch.
@sanferrera
@sanferrera 3 роки тому
He is great! One of my favourites is the one where he cracks passwords. Super interesting!
@JanStrojil
@JanStrojil 3 роки тому
I second that. There are some really good speakers here, but he just combines incredible energy, understanding, humour. Love his videos.
@TheVergile
@TheVergile 3 роки тому
Rob Miles tho
@zukacs
@zukacs 3 роки тому
d
@s33wagz
@s33wagz 3 роки тому
Lol, pound for pound
@jasonc3a
@jasonc3a 3 роки тому
I love how at 6:50 the transition and lighting makes it look like a whole day has passed while MP has been churning out ciphertext lol
@motabarjavaid5482
@motabarjavaid5482 3 роки тому
Mike is the reason I subscribed to Computerphile. Love the way of his explanation
@delzabrown
@delzabrown 3 роки тому
I have no idea how I didn't know this channel existed even though I've been subscribes to numberphile for 3+ years
@krisk7
@krisk7 3 роки тому
Worth noting that they could start guessing about rotors and all because before the war Polish secret service got a hold of one of the first versions of Enigma, then Polish mathematicians (Marian Rajewski) cracked it without computers and shared the machine and algorithms with British secret service. This facilitated immensely breaking subsequent Enigma versions.
@john1v6
@john1v6 3 роки тому
Very true. The Polish contribution was important. Rajewski and his colleagues did some great work.
@89Sawik
@89Sawik 3 роки тому
I would say was crucial as they provided decrypting algorithm. What Turing did (and it was amazing by itself) was building and electromechanical automaton, which was able to crack codes quick enough to use intercepted intelligence. The third or fourth iteration of enigma's encrypting algorithm become too hard to crack manually. In fact some of the first messages cracked by Poles directly predicted war and even Marshall Piłsudski tried to convince Charles de Gaulle to perform attack on Germany, before it will be too late. That may be one of the reasons, why this truth is not spoken widely.
@telawiw329
@telawiw329 3 роки тому
Face the truth, Jerzy Rozycki, Henryk Zygalski and Marian Rejewski broke the code, wrote algorithms, then tried to come up with some engineering tools to speed braking code up. All having no knowledge about secret military cutting edge technology at that time, called computers. All what Turing made was to build a machine where the numerical methods and algorithms invented by Poles could be efficiently executed. That how the Allies won the war, then as a "thank you" they sold us out to Stalin. Humiliated Poles not inviting us to the victory parade!!! We like the Chinese do not forget this
@MrGoatflakes
@MrGoatflakes 3 роки тому
They also made the first bombe
@Ashitaka255
@Ashitaka255 3 роки тому
@@telawiw329 moron. Turing is the father of modern computer science. He's far beyond just an engineer who built a machine. That was Tommy Flowers. Turing didn't use the Polish algorithms.
@sssveny
@sssveny 3 роки тому
Video’s about mike programming for fun are always gold
@reyblais4858
@reyblais4858 3 роки тому
Anytime I hear about Turing, it always makes me sad to think how he was treated after all his accomplishments.
@tonytungsten4278
@tonytungsten4278 2 роки тому
Do people without any accomplishments deserve to be treated worse?
@technus147
@technus147 2 роки тому
@@tonytungsten4278 than people with accomplishments? yes, otherwise we'd give everyone a nobel prize
@jackass123455
@jackass123455 Рік тому
@@tonytungsten4278 he wasn't treated any beter than anyother homosexual male of the time. the dude was chemically castrated and arrested. eventually (potentially) killing himself via cyanide poisoning.
@mr.pavone9719
@mr.pavone9719 6 місяців тому
​@@tonytungsten4278Are you a fan of participation trophies?
@dowskivisionmagicaloracle8593
@dowskivisionmagicaloracle8593 3 роки тому
Videos like this are why I love the computerphile channel!
@AlRoderick
@AlRoderick 3 роки тому
I'd love to do the same for the Lorentz cypher. I really want to know more about that, no one talks about it nearly to the same degree as enigma but it was the real challenge that they needed a proper computer to crack.
@hotshot17225
@hotshot17225 3 роки тому
Came here to say that! After reading extensively about Lorenz, the process of cracking it and the people involved, I - and excuse me - shat myself upon realization of how incredibly brilliant Bill Tutte (and a lot of others) was.
@luisfiliperosa7511
@luisfiliperosa7511 3 роки тому
Every video with Dr Mike Pound is absolute bliss. Thanks mate.
@NaviYT
@NaviYT 3 роки тому
Thank you, I’ve been waiting for someone to make a video about doing this in modern times, with better computing. Literally perfect!
@baldeepbirak
@baldeepbirak 3 роки тому
Great explanation of the process involved. Shows how hard it was back in the day.
@BillAnt
@BillAnt 10 місяців тому
Indeed, and it was all done with mechanical wheels, yet it was and still is pretty effective if done properly.
@Oodelally
@Oodelally 3 роки тому
Visiting Bletchley park is such a splendid experience
@kuhluhOG
@kuhluhOG 3 роки тому
If you think about the fact that they made these things ~80 years ago, purely mechanical, carry-able and operateable by an average person, it's kinda incredible. Not just that, but there are also 3 things which REALLY helped them to crack it and it was still hard: - they sold a (dumbed down) version before the war commercially - they needed to captured one - after they added more wheels (at some point they kinda noticed and it basically broke the decryption for some time) they needed to capture one again
@gcewing
@gcewing 3 роки тому
That's another thing that's better about modern ciphers. They're still hard to crack even if the enemy has full knowledge of the algorithm. The only thing that needs to be kept secret is the key.
@kilijanek
@kilijanek 3 роки тому
Well, not quite. Commercial version was simplified, had less rotors and few minor differences. Enigma was cracked in 1933 by Polish mathematicians (French declared it impossible to break, British gave up independent work on breaking encryption and relayed on work of Polish Cipher Bearau). It wasn't decoded in real time, but with few hours/days delay - using Zygalski sheets, by hand. When Germany added more rotors, there was a case, when they sent by regular post device to embassy in Warsaw. Thanks to postal service workers (who delayed delivery from Friday to Monday), Poles got like 24h to study new design. What is worth mentioning: knowledge how Enigma is operating is not much of a help to break encryption. The most critical part to break encryption was set of rotors, ring settings. Without those it is far more difficult to predict result of encryption.
@kuhluhOG
@kuhluhOG 3 роки тому
@@kilijanek that's why I said "dumbed down" version
@kilijanek
@kilijanek 3 роки тому
@@kuhluhOG I apologize for my reaction, but I hear far too many times that Turing or US Marines were cause Enigma was broken at all (yeah, too many talks with egocentric Americans T_T )... and that is not true. In his genius, Alan Turing automated and improved process of decryption of Enigma - which is a great achievement itself. Breaking Enigma predates work done by Turing almost for a decade. Aaaaand ofc, US did almost nothing besides using decrypted messages :D
@kuhluhOG
@kuhluhOG 3 роки тому
@@kilijanek well, the US also built more of the decryption machines, but yeah, the US didn't do anything more
@asciimation
@asciimation 3 роки тому
I am glad your code implements the double stepping correctly. As you say implementing Enigma in code is really just array manipulation. I've done a few versions including one in 80s home computer BASIC! The algorithm for Enigma is really quite simple. The Turing/Welchman Bombe, the machine they actually used in WW2 to crack Enigma, is much more complicated. Reverse engineering that, really understanding how it works then making my own was one of my most satisfying projects. Welchman's contribution of the diagonal board to Turing's original design was brilliant. And Welchman was also responsible for coming up with the idea of traffic analysis. I always feel a bit sad that Turing's name is always mentioned but Welchman is nearly unheard of. And yes, as others have rightly pointed out all that work was made possible but the work of the three Polish mathematicians and the Frenchman Bertrand who somehow managed to co-ordinate things between the English, French and Poles. One other difficulty is real Enigma messages were not just plain text. They contained a lot of military jargon and acronyms. Very cool video and well explained, thank you!
@20chocsaday
@20chocsaday 3 місяці тому
The local library had a book about ciphers in the 1970s. Enigma machines and their post-war sale was also discussed. At the back he had written a message which had been through a virtual Enigma machine. He told the readers how to write the program which would decrypt it.
@boredincan
@boredincan 3 роки тому
The Polish then the British mathematicians that cracked Enigma are some of the most amazing thinkers of our time. I got lost during this video, but I understood enough to be very impressed. This is the best example of "standing on the shoulders of giants". Awesome all around.
@nirfz
@nirfz 2 роки тому
I know that the polish cracked the code, but i don't know more about it, but while the british mathematicians around Mr. Turing were impressive, they still had the advantage of captured enigmas and captured documents of which rotors to use when. (Not at the start, but it helped them immensely) Still i think it was impressive that while here in the video he knew how an enigma machine works and could use his own language, it still took longer than i expected. Now imagine, not knowing how it works (the rotors and plugs and the turning) as well as having to decipher a foreign language. (And then using the Navy version with 6 rotors)
@kaydot6889
@kaydot6889 3 роки тому
I was just about to sit down and eat lunch and look what I find in my subscription box... another trip to pound town!
@OElitecorp
@OElitecorp 3 роки тому
I wrote my undergraduate dissertation on ciphertext only cryptanalysis of the enigma machine. Wrote a tool in Java to perform it too. Was a really fun project, such interesting history - helped living in Bletchley too!
@victoryfirst2878
@victoryfirst2878 3 роки тому
This has to be the best explanation of the Enigma machine I have seen so far. Well done fella.
@pauzc5210
@pauzc5210 3 роки тому
I was just thinking about this and now this comes up! Amazing Video!!! Thank you for all the interesting information you share
@NuclearCraftMod
@NuclearCraftMod 3 роки тому
Great idea for a video! I had been thinking about this in the past, but wasn't actually sure how to test it or even categorise the strengths or weaknesses of Enigma in modern cryptographic terms.
@darkwinter6028
@darkwinter6028 3 роки тому
The other thing you can reasonably assume; which a modern computer can take advantage of; is that the message will be in German (both in it’s vocabulary and grammar)...
@thatcherfreeman
@thatcherfreeman 3 роки тому
One challenge is that a lot of the messages from ww2 had loads of abbreviations and shorthand, so that'd serve to make it more difficult
@darkwinter6028
@darkwinter6028 3 роки тому
@@thatcherfreeman To an extent; yes; however much of that can be figured out and added to the dictionary.... for example, dropping vowels.
@sircalvin
@sircalvin 3 роки тому
another thing used was plaintext attacking a very famous line at the bottom of most messages, which i wont put here because i dont want youtube flagging this comment
@darkwinter6028
@darkwinter6028 3 роки тому
@@sircalvin Yeah... something about hailing the guy in charge... 😉
@stephaniesadie832
@stephaniesadie832 2 роки тому
Many of the american encrypts were translated into Navajo and Lacota beforehand. The Axis never cracked those messages.
@andrewcohen426
@andrewcohen426 8 місяців тому
truly a great explanation. thanks
@UkuleleHungary
@UkuleleHungary 8 місяців тому
Absolutely fantastic video!
@madlad255
@madlad255 3 роки тому
1:05 Speaker: "Enigma machine" Subtitles: "Knitting machine" Damn, why are we trying to crack a knitting machine?
@Nekuzir
@Nekuzir 3 роки тому
Fun fact, stitch patterns in sewing machines used punch card programming before computers existed
@madlad255
@madlad255 3 роки тому
@@Nekuzir Damn, I didn't know that, thanks for the fact!
@andrewgoss1682
@andrewgoss1682 3 роки тому
Gram gram been spending too much time making sweaters
@ragnarsdad6065
@ragnarsdad6065 3 роки тому
there was a project on the BOiNC platform trying to crack Enigma messages using brute force decryption, the messages had been intercepted during the war but never decoded. They did manage to crack a few but it took an awful lot of computer power to do so.
@codegeek98
@codegeek98 3 роки тому
I'm sure "an awful lot" back then could be completed in a few days on a single thread of JS running on a semi-smart-phone's toy web browser
@ragnarsdad6065
@ragnarsdad6065 3 роки тому
@@codegeek98 The project (enigma@home) managed to decrypt 4 messages using brute force decryption method. it took over 360,000 years of compute power (based on an AMD Athlon Xp 3500+ single thread processor) to decrypt all 4 message.
@tomstech4390
@tomstech4390 3 роки тому
@@ragnarsdad6065 were they all done? Os it still going? Have many 6, 8, 16 core cpus spare atm.
@f.f.s.d.o.a.7294
@f.f.s.d.o.a.7294 3 роки тому
@@tomstech4390 Just beware the power bill. I used to run Seti@Home, then Boinc aggressively in my business. It was fun. Then I came to appreciate the effect on the power bill.
@steemlenn8797
@steemlenn8797 3 роки тому
@@tomstech4390 afaik enigma@home is still running? Even if not there are many math projects on the BOINC network - or other stuff. Like nedicine research. You can even get paid in cryptocoins if you use Gridcoin (for most of those projects).
@justincase5228
@justincase5228 Рік тому
A particular collection of jumpers in the front of the machine would result in a characteristic collection of letter-rings: A->W->Z, B->X->Y->E->R, etc. This was one of the contributions of the Poles, they delivered this strategy to the Brits right before Poland was invaded. You could analyze a new day's message like this and hack the jumper settings. This then allowed Turing and team to just focus on the rotor combinations and using the German crib WETTER ("weather") which would appear in the first message of the day at a particular offset.
@securatyyy
@securatyyy 3 роки тому
Everyone be really nice to this guy cause he would make a great supervillain.
@bokamosokelopang1694
@bokamosokelopang1694 3 роки тому
Dfn
@AceDeclan
@AceDeclan 3 роки тому
Why?
@crusaderanimation6967
@crusaderanimation6967 2 роки тому
@@AceDeclan Because he seem to be nice and smart so you wouldn't know he is villain until end of movie.
@RamansSon
@RamansSon 2 роки тому
@@crusaderanimation6967 because he has a snake pet and the only people who has snake pet are animal lovers or serial killer
@astropgn
@astropgn 3 роки тому
Moral of the story: Use enigma only if you want to encrypt your tweets.
@emoulson
@emoulson 3 роки тому
And only really tweets before the character count was doubled
@yosefmacgruber1920
@yosefmacgruber1920 3 роки тому
Twitter is pretty much pointless now without President Trump's tweets.
@gayMath
@gayMath 3 роки тому
@@yosefmacgruber1920 ???
@yosefmacgruber1920
@yosefmacgruber1920 3 роки тому
@@gayMath Twitter and FB should be banned for their evil censorship. Or seized and turned into a utility. Did you not know about Twitter censoring truth-tellers, President Trump, and tampering with elections? Twitter has already been banned in a few countries due to that.
@papakaruuu6119
@papakaruuu6119 3 роки тому
@@yosefmacgruber1920 wtf are you smoking i want some
@TomGalonska
@TomGalonska 3 роки тому
I'd listen to Mike Pound talk about anything CS related. But Mike talking about Enigma: Instant click!
@marjotoska
@marjotoska 2 роки тому
I had a minor heart attack when he said "it took a bit of effort to come up with the code". I've been trying for 2 hrs to finish a substitution cipher and was nowhere near close lmao. There's levels to this and it is humbling to know.
@0bits_1
@0bits_1 2 роки тому
Yeah, a couple of years ago I created a small program in C++ that was based on the 'logic' behind Enigma. It took me about a couple of weeks to get it working as intended. In my code, in essence, a string variable would be run through a series of functions (the digital equivalent to the Rotors) that used integers to increment/decrement each character in the string (using the integer as a shift) before passing the variable to the next function, which would repeat the process with a different 'shift', for however many times the user would want to encrypt the string, so that - ultimately - the encrypted text that was put out would be protected by the fact that, A: you could have as many 'Rotors' as required, thereby increasing the number of potential true characters that each letter could decrypt to, and B: were you to successfully decrypt the text once or twice, it would only therefore decrypt to the previously encrypted version of the string and not the true, original plaintext. Back then, I created a Decryptor that was configured as a mirror opposite to the Encryptor, with the assumption being that you could only decrypt the text correctly if you had the Decryptor. I didn't know nearly as much as I do nowadays about coding and cryptography (and I STILL wouldn't trust my skills in that department, I'm still barely an amateur). However, knowing more about Hacking nowadays, I realise that all you would need to do in order to crack the above-mentioned encryption method would be to analyse the code of the Encryptor and simply create an altered version of it in order to decrypt the text. It's a fun thing to try with coding though and I'd highly recommend it to anyone for purely educational purposes in order to practise playing around with integers and variables. Definitely leave hardcore Cryptography to the guys and gals who know their stuff in this field, it's so dangerous if you don't know what you're doing with it.
@samuelweller3394
@samuelweller3394 3 роки тому
"Now some people say that there's no way of doing integer factorisation in polynomial time .. but actually ... I've implemented that as well"
@fischerhansen5647
@fischerhansen5647 3 роки тому
Hahaha :) Yeah, halfway through all his implementations I started to wonder where he got all the time and motivation.
@mceajc
@mceajc 3 роки тому
I now have a slightly better understanding of exactly what Colossus was doing - statistical analysis of cracked code in order to better guess the settings. My admiration of those mathematicians, engineers, linguists and logicians only ever grows.
@paulwomack5866
@paulwomack5866 3 роки тому
Colussus was used against Tunny, not Enigma. Enigma cracking was implemented by Turing's Bombe.
@mceajc
@mceajc 3 роки тому
@@paulwomack5866 where Tunny = the intercepted code from a Lorentz cipher machine. Highly recommend anyone go to the Bletchley museum of they are in the area. Sadly I went when the computing museum was closed, but the working Colossus machine was whirring about. Superbly knowledgeable your guides, but now I see some of the attacks that can be used, the actual working their behind it makes so much sense.
@adamsbja
@adamsbja 3 роки тому
If I remember right what Bombe was doing was plaintext decryption rather than statistical. "Okay, we have a large number of possible combinations, but which ones can deliver the plaintext we think it starts with and not throw any errors down the line?" Then that much smaller subset of combinations would be tested with other analysis and against other messages (remember that they wouldn't change the code for each message so if you cracked one you cracked them all until the code cycled). I don't know if they used the computer for that or went back to doing it by hand once they had a workable subset.
@MrGoatflakes
@MrGoatflakes 3 роки тому
@@paulwomack5866 as much as I admire Turing, he did not invent the bombe, the Polish did.
@paulwomack5866
@paulwomack5866 3 роки тому
@@MrGoatflakes The Polish invented the bomba, the device used at Blethchley was a more advanced development by Turing and Welch, using the bomba as a basis
@ynotnilknarf39
@ynotnilknarf39 3 роки тому
I used to visit an elderly chap who worked for BTM in Letchworth right at the start of WWII as a design engineer (possibly not the correct job description), he knew 'Doc' Keen and Edward Travis for sure. He lived here all his life, went on to be a senior manager for ICL. All we have left of 1/1 is in the name of two of the residential streets on the old site where the Bombes were made, that being Pascal Way and Tabbs Close. He was still very guarded about his work there right up to his death only a few years ago at the age of 98, absolte gent he was and played down his efforts.
@Kilroyan
@Kilroyan 3 роки тому
This was so interesting, thank you for sharing!
@youtubevanced4900
@youtubevanced4900 3 роки тому
We always hear about how brilliant Turing and his team were because they were able to crack the code. I'd love to see something about the dude that invented it. Must of been just as clever to come up with the machine.
@vksasdgaming9472
@vksasdgaming9472 3 роки тому
Arthur Scherbius was his name. Machine was patented 1928 and was commercial system. Of course that was its first version.
@kreiseltower
@kreiseltower 3 роки тому
@@vksasdgaming9472 I don't know too much about this. But I assume that you could just take the basic idea and make it arbitrarily more complicated by adding more rotors, plugs etc. that it easily could have been made unsolvable.
@vksasdgaming9472
@vksasdgaming9472 3 роки тому
@@kreiseltower New plugs and rotors were method to make encryption more complex. In practice fact that military communications follows protocol made it easier. If every message begins with or includes known expression it is easier to break. Informally worded messages might have been unsolvable as there simply was no way to guess what there was being said.
@DumblyDorr
@DumblyDorr 3 роки тому
Awesome video! Love getting that kind of accessible explanation :D ... Also, tiny PSA: „Zuse“ is pronounced „tsoo-suh“, not „Zeus“ ;)
@jishcatg
@jishcatg 3 роки тому
This reminds me of the movie trope where some malicious program is trying to crack an encryption key and it gets 1 character of the key at a time to progressively find the whole key. I remember this at the end of "War Games" but I think I've seen it many times where "hackers" are trying to infiltrate a system.
@mitchellfolbe8729
@mitchellfolbe8729 3 роки тому
And some actor has to shout out, "It has 3 symbols.", "It has 4 symbols. Two more and we're doomed!", etc. with ever greater urgency
@kentix417
@kentix417 Рік тому
That actually didn't happen in War Games. It wasn't cracking one key, it was finding ten different keys, one at a time. It didn't really explain how it was doing that, if I remember correctly.
@Muhahahahaz
@Muhahahahaz Рік тому
Ikr? I’m always like… That’s not how encryption works! But apparently it did a long time ago 😅
@esmeecampbell7396
@esmeecampbell7396 6 місяців тому
​@@kentix417worryingly the nuclear codes at one point actually was "0000 0000" (because they wanted it to be memorable in an emergency 😂) so the computer would have probably got it on its first try...
@danceswithdirt7197
@danceswithdirt7197 3 роки тому
Mike Pound is great! Love the videos with him in.
@jeffrice238
@jeffrice238 2 роки тому
Fascinating! And really nice explanation.
@MrSb192
@MrSb192 3 роки тому
I had actually implemented the Enigma as well as the Turing Welchman Bombe 2 years ago for a cryptography project in college. Java based. It was fun and frustrating. But I've forgotten mostly how the bombe worked...
@melkiorwiseman5234
@melkiorwiseman5234 Рік тому
My understanding is that it was an electro-mechanical dedicated computer which tried to "brute force" the encryption key by looking for a recognised sequence of characters in its output. It was made out of dozens of chained telephone-exchange style "uniselectors" which each had 26 positions.
@YAZlakhdar
@YAZlakhdar 3 роки тому
Follow up video in 10 years: "Cracking Enigma in 30 milliseconds using brute force on a Quantum Computer" Edit: turns out I was probably too conservative, not 30 sec but just a fraction of a second.
@DesertCookie
@DesertCookie 3 роки тому
More like one millisecond.
@YAZlakhdar
@YAZlakhdar 3 роки тому
@@DesertCookie hopefully 🤗 I'd already be impressed with solving 150,000,000,000,000 combinations in 30 sec, which means 5 trillion combinations per sec... but maybe a 3000 qubits trapped ion quantum computer with no errors could do much better 🤷🏻‍♂️ tbh I have no idea.
@draygoes
@draygoes 3 роки тому
@@YAZlakhdar How weird is it that "with no errors" was the first part of that sentence that didn't register as somehow possible one day?
@YAZlakhdar
@YAZlakhdar 3 роки тому
@@draygoes actually very low error rates are already achieved in some Trapped ion QCs with up to 32 fully connected qubits... and we're only in 2021! Imagine what will be achieved in 10-20 years, not to mention further down the line... Think about all the things that people in the 1950's would have deemed impossible, which are now possible or even plain boring for us. I'm sure they'll figure it out ;)
@YAZlakhdar
@YAZlakhdar 3 роки тому
@@DesertCookie actually after looking up the processing power of current state-of-the-art supercomputer, and given the nature of quantum computers, I agree with you that it should be much faster than 30 sec... potentially even a millisecond. Crazy
@andrebalsa203
@andrebalsa203 3 роки тому
Fascinating video, thank you.
@Nightcorehardy
@Nightcorehardy 3 роки тому
The code bullet video we've been waiting for.....
@john1v6
@john1v6 3 роки тому
Great video. Nice mention of Konrad Zuse too.
@markwilliams5654
@markwilliams5654 3 роки тому
how ironic they sent Alan to prison and now he's on a bank note
@Snagabott
@Snagabott 3 роки тому
I wonder which ones of our moral panics will seem unjust to viewers 70 years hence.
@ComicalFlask
@ComicalFlask 3 роки тому
@@Snagabott - Factory farming
@gianluca.g
@gianluca.g 3 роки тому
@@Snagabott Assange case
@memeier9894
@memeier9894 3 роки тому
Too many to name...
@kgb4150
@kgb4150 3 роки тому
@@Snagabott Social justice, probably
@etziowingeler3173
@etziowingeler3173 3 роки тому
Absolutely class this video, I love it!!
@apollyon1
@apollyon1 3 роки тому
this is absolutely incredible.
@DIREWOLFx75
@DIREWOLFx75 3 роки тому
"this isn't something one does by hand right, not quickly" I'll give you one name: Arne Beurling. On his own, without any computation assist, without access to any hardware ( unlike Bletchley park, which had a copy of the early Enigma that was brought out from Poland ), he cracked the Geheimschreiber, which was roughly the Enigma for teleprinters, in 2 weeks.
@stephaniesadie832
@stephaniesadie832 2 роки тому
This is true, but to be fair the identicle feat was later replicated by Bill Tutte at Bletchley Park with the Lorenz teleprinter device
@PiezPiedPy
@PiezPiedPy 3 роки тому
The way Alan was treated at the time was absolutely disgusting, especially after what he had done.
@jag1963
@jag1963 3 роки тому
Britains most shameful hour for sure.
@evilcanuck
@evilcanuck 3 роки тому
@@jag1963 i don't know owning slaves and the genocide of the indigenous peoples of the Americas is pretty up there
@tomx641
@tomx641 3 роки тому
@@evilcanuck Those things were done by people who live in the Americas, not Britain.
@evilcanuck
@evilcanuck 3 роки тому
@@tomx641 who came from Britain
@ComicGladiator
@ComicGladiator 3 роки тому
@@evilcanuck Are you self-hating, or do you come from people without sin?
@ImNotGam
@ImNotGam 2 роки тому
The CodeBullet video we were waiting for
@mitch3384
@mitch3384 3 місяці тому
I haven't seen that printer paper in a loooong time.. that brings back some very warm, fuzzy memories.
@danielstephenson7558
@danielstephenson7558 3 роки тому
Great video. Would love a tutorial to recreate the Enigma Machine in code. Code Bullet started one but never finished it.
@EddiePedalo
@EddiePedalo 3 роки тому
You just explained how to crack the enigma code, in under 20 minutes, to me, who failed GCSE maths, and I understood all of it. That is more impressive than cracking the code. Bravo.
@TonyyStarrkk1994
@TonyyStarrkk1994 3 роки тому
I like finding videos I didn't know I wanted to watch. Great job algorithm.
@pompeymonkey3271
@pompeymonkey3271 3 роки тому
Deconstructing entropy of a cypher. Most excellent!
@T33K3SS3LCH3N
@T33K3SS3LCH3N 3 роки тому
"Let's look very briefly at what a knitting machine is" - thanks subtitles.
@christianborss4850
@christianborss4850 3 роки тому
Great video! When you explained your algorithm, I was wondering how you can avoid that you run into a local maximum. But apperently it happens. Any suggestions how to improve it besides starting again with a different seed and see if you end up with a better fitness?
@robertforster8984
@robertforster8984 2 роки тому
You usually don’t have to throw out all your settings.
@1Cruzer4u
@1Cruzer4u 2 роки тому
Absolutely Fascinating! The magnitude of their intelligence is astounding.
@bradrupp5510
@bradrupp5510 2 роки тому
This is sooo cool. thanks for the videos
@ToyotaCharlie
@ToyotaCharlie 3 роки тому
The automatically generated subtitles are killing me 😂 "churning bombs" and "knitting machines" 🙈
@lombardind
@lombardind 3 роки тому
Every time he finishes a sentence he adjusts his right shoulder. I can't stop watching that.
@djmips
@djmips 3 роки тому
haha, it's his energy, he can't wait to stop talking and start writing / coding.
@Fanchiotti
@Fanchiotti 2 роки тому
Frodo is really smart on his explanations. Thanks!
@pepesworld2995
@pepesworld2995 2 роки тому
man i'm really enjoying this. its great how the hiezenburg uncertainty principal pops up everywhere: short message means you dont have enough information on the frequencies of letters.
@aceroadholder2185
@aceroadholder2185 3 роки тому
As an example of Enigma being difficult to break if the message is no longer than 50-60 characters there are still U-Boat messages that have never been broken. A short message along with the Kreigsmarine Enigma machines that added an additional rotor are very difficult to decipher.
@thepuzzlebox6620
@thepuzzlebox6620 3 роки тому
There was nothing preventing them from manually scrambling their messages on top of the Enigma encoding. All it would take is a manual alphabet switching system that changes based on the number of messages that have been sent. Turing could never have accounted for it.
@stanrogers5613
@stanrogers5613 3 роки тому
Part of the problem with U-boat Enigma messages is that they weren't merely enciphered, they were also encoded. That is, the original message won't necessarily contain _any_ plaintext, so there's no way to know when you've deciphered it.
@kiwidiesel
@kiwidiesel Рік тому
I still feel just as dumb after watching this as I did before hand, however it was very interesting.
@DasHemdchen
@DasHemdchen Рік тому
He doesn‘t go into details such as how to calculate the IoC, the number of possibilities etc., and how he came to know of the rotor properties (which input generates which output letter) and the notches. Statistical language analysis seems to be the key to solve crypto.
@gizmostudioshd
@gizmostudioshd 2 роки тому
I'm not smart enough to understand half of whats going on, but for whatever reason, it fascinates me and gets me hooked, watching the whole thing.
@RetroRobotRadio
@RetroRobotRadio 3 роки тому
I once had an Enigma simulator program for my Commodore 64. This wasn't a program meant to break an Enugma code, but it did simulate and Enigma machine. It came on a floppy disk that was part of a magazine subscription to Loadstar.
@KuittheGeek
@KuittheGeek 3 роки тому
I'm definitely going to start using the phrase, "How English is this?" when correcting grammar. I love the concept of how close is something to a language and just referring to it as "How language is this?". This was a great video. Very informative.
@oooBASTIooo
@oooBASTIooo 2 роки тому
This has nothing to do with grammar. The Index of coincidence is obviously all about how the words are written, i.e. the syntax.
@Eagle0600
@Eagle0600 3 роки тому
At 10:47, when you say 26×3, surely you mean 26^3, since each rotor can individually be in one of 26 positions?
@merrymonarch
@merrymonarch 3 роки тому
The number was a colossal, so yes
@stargazer7644
@stargazer7644 2 роки тому
@@merrymonarch Before the introduction of the plug board, there were only 1,054,560 combinations on the original machines. Hardly colossal. It was the addition of the plug board on the military machines that ran it up to 1.5*10^14 combinations.
@merrymonarch
@merrymonarch 2 роки тому
@@stargazer7644 fair point. Collosal is subjective. You're right about the plug board too. I think I read somewhere that if they'd added an extra rota it would have been too much for the computers they had at Bletchley
@stanrogers5613
@stanrogers5613 2 роки тому
That is the total number of combinations, yes - but we can "break" one wheel at a time, so we don't need to try all of the combinations. The number of tests required is just 26 per wheel, so 23×3, not 23^3.
@CrimFerret
@CrimFerret 3 роки тому
Neat video. I understand there was an improvement made to Enigma that was used by the Allies that allowed for a character to cipher into itself which made it significantly harder to crack with the tools at the time.
@FlyBoyGrounded
@FlyBoyGrounded 2 роки тому
The allies?
@stanrogers5613
@stanrogers5613 2 роки тому
@@FlyBoyGrounded That'd be TypeX - which _could_ have encrypted a letter to itself, but they decided to use the second contact on each rotor face for redundancy and reliability instead for some odd reason, rather than having the reflector circuit feed the outer signal back over the inner circuit. That is, the machine was capable, but the implementation wasn't. (If I were to guess at why, it would be because it would have needed an encrypt mode and a decrypt mode the operator would have had to select, rather than a single mode for both encryption and decryption. I'd think it wouldn't be too very hard to have your terminal equipment operators trained to throw a single switch, but what do I know?)
@diegosolis9681
@diegosolis9681 2 роки тому
This can could narrate paint drying and still make it exciting! What a talent for teaching!
@january1may
@january1may 3 роки тому
Sounds like Enigma decryption is the kind of thing where an evolutionary/genetic algorithm would work _really_ well. I wonder if anyone had tried that yet - it has to be an interesting experiment!
@gschadalavada8980
@gschadalavada8980 Рік тому
Hi I’m curious, what are those algorithms you’ve mentioned?
@marcelreiter181
@marcelreiter181 Рік тому
​@@gschadalavada8980 Usually you start with a bunch of algorithms which are just guessing. However, some will guess better than others. Keep the better ones, mutate their guesses (automatically) a little and repeat, until you have one you're happy with. Just youtube them, there's lots of really cool videos on them :)
@jjoganic
@jjoganic Рік тому
In effect, he is doing precisely that by hand. Notice that he mentioned fitness functions specifically. Whereas the GA would be evaluating the entire solution space starting from a random draw and fiddling with the details, the presenter has chosen to stage the work such that he can evaluate one entire domain comprehensively before moving on to the next one. You could do that with a GA as well, and in my experience, it would converge to the proper solution faster than if you did the whole solution in one pass.
@theadamtron
@theadamtron 3 роки тому
I think whats interesting about cracking enigma at bletchley park was predicting the content that would be sent such as weather reports that would end with the same text or humans always using the same settings/keys. This allowed them to build up a picture of the settings for that day.
@kentbetts
@kentbetts 2 роки тому
The best Enigma vid ever.
@ronchappel4812
@ronchappel4812 3 роки тому
I'd read about some of these techniques before but it's fun to see it done with a modern computer.
@Iris-jw3ci
@Iris-jw3ci 3 роки тому
Everyone always forgets Marian rejewski who cracked the enigma BEFORE ALLEN TURING
@tensevo
@tensevo 2 роки тому
Lessons for thought: Authorities tried to "cancel" Turing. Turing went "off script" (rogue) in order to protect the fact it had been cracked. Brilliant story
@oldbootz
@oldbootz 3 роки тому
I loved this. And thank you.
@uolevig
@uolevig 3 роки тому
I felt a bit weirded out when you show your laptop, as I was watching this video with exactly the same Thinkpad model. Nice video!
Turing's Enigma Problem (Part 1) - Computerphile
19:00
Computerphile
Переглядів 1,3 млн
ChatGPT Jailbreak - Computerphile
11:41
Computerphile
Переглядів 293 тис.
船长被天使剪成光头了?#天使 #小丑 #超人不会飞
00:28
超人不会飞
Переглядів 25 млн
КИРПИЧ ОБ ГОЛОВУ #shorts
00:24
Паша Осадчий
Переглядів 6 млн
Future Computers Will Be Radically Different (Analog Computing)
21:42
How did the Enigma Machine work?
19:26
Jared Owen
Переглядів 7 млн
Enigma - Die legendäre Chiffriermaschine der Deutschen | Terra X
19:00
Terra X History
Переглядів 1,1 млн
LogJam Attack - Computerphile
18:47
Computerphile
Переглядів 177 тис.
The real story of how Enigma was broken - Sir Dermot Turing
1:07:50
Fast Inverse Square Root - A Quake III Algorithm
20:08
Nemean
Переглядів 4,8 млн
Turing breaks Enigma - The Imitation Game (2014)
6:15
Weyland
Переглядів 2 млн
How Enigma was cracked
19:29
Ingenious
Переглядів 70 тис.
Flaw in the Enigma Code - Numberphile
10:58
Numberphile
Переглядів 4,8 млн
Colossus - The Greatest Secret in the History of Computing
1:00:26
The Centre for Computing History
Переглядів 904 тис.