Description: In this megaprimer I'm going to talk about cryptography and cryptanalysis. First we will discover some basic algorithms and after some time, we will come to more difficult and stronger algorithms. I'm going to explain the algorithms and math behind them in detail, but for the beginning we will only look at easy methods of encrypting texts and data.
I'm also planning to add some coding in the primer (probably C or Java) and we will look at some open-source projects.
I hope you understand my (bad) english and if you want, I will continue posting this primer in english too.
In this part we are going to discuss how strong a transposition algorithm can be. Se I'm going to show you, that an simple bruteforce against this methode is not very intelligent.
The ppts are available here:
http://uploaded.to/file/dgbohzsm
mirror:
http://letitbit.net/download/59548.533e60adbb37c0de330310035a64/PPTS.zip.html
Hope you enjoy the primer and please leave some comments here.
Tags: cryptographie , cryptoanalysis , cipher , transposition ,
Disclaimer: We are a infosec video aggregator and this video is linked from an external website. The original author may be different from the user re-posting/linking it here. Please do not assume the authors to be same without verifying.
Juggl3r is back...man i was eagerly waiting for the 2nd video.... :-D
yeah ;) Maybe I'm going to record next part this or next night. Also planning some other megaprimers too.
I enjoyed your video ( very easy to understand). I actually took modern cryptography in grad school. This video is going to help a lot of people taking Cryptography in college.This is no big deal at all but 6! is 6 factorial.
Awesome! I think your English is perfect, you worried about that unnecessarily before :)
Quick Recommendation - Please add your name and email address to the first and last slides. This will help the audience get in touch with you if they would like. Of course, if you don't want that you can continue to keep it private.
Look forward to the next video!
-Vivek
Moderator Team
you r great juggl3r!
thanks you, for sharing your knowledge!
regard mutex
simply you rocks :D
bro are there any text we you recommend for helping ?
are there any applications out there help us to apply some cyrpto so we can understand more ?
if the transposition is that strong why we don't use it now days ?
finally ,when you will post the next video coz i cant wait ?
thanks bro for your great work and time sharing and waits for the upcoming megaprimer .
Perfect.... Ur Lang. is good & Easily understandable.... I think, you don't have to look back about ur English.
Thank you for ur time and effort...
Regards,
Gopi Kiran.
@mediumhat: Thanks for your correction! I often don't know the correct word for something and then translate it with google or dic.leo and i translatetet 6!.... But please keep posting some corrections, I'm also some learning guy und this will also help me! So Thanks!
@SecurityTube_Bot:
Thanks, in the next slides there will be some contact-information.
@mutex: thanks
@Mesho:
The most texts I read on this topic are in german, so I'm sorry, because I don't know english texts. I will search for some of them and maybe find some. A good research is also the library of some technical university, maybe you can find there some good material.
I think "cryptotool" is some good app for that. But I will come to all that stuff in later videos. I'm also some learning guy, I don't already know all the stuff, I'm going to show you. I also learn with this videos, because I think the best way to learn something is, to teach it other guys. So I'm also reading some books at the same time as I make new videos.
Your question about transposition: The problem is, that we have to declare some algorithm, which gives as the "rules" how we can rearrange the plain text. And we need some "easy" key which we give to this algorithm. The problem is now to find such an algorithm....
But we come to all that stuff in later videos ;)
I think I'm going to make some new video this night or tomorrow. In the next video we are going to implement some transposition algo in java and then we will see the problem of the transposition.
I'm also planning some other megaprimers, which will start soon. Probably some "Realistic Hacking Megaprimer" where we try to attack same company (not a real company....) from beginn to end (and discover topics like social engineering, bufferoverflow and aslr, wep, mitm, social engineering toolkit, sqli, xss, ....) I want to make some megaprimer with an big "overview", but I must think of it, how I can make this video, so it don't becomes a script-kiddy touch... What I want is a megaprimer, where you can see what is possible and where to get more informations on this topics.
Some other Megaprimers I'm planning are: A Megaprimer how to build some hardware-keylogger, a Primer about Rootkits and about Crypters. But I really don't know, when I have enaught time for that topics.
Thanks Juggl3r ! cool megaprimer.
Anyway it will be great if you did a megaprimer on Crypters, on hardware-keyloggers and Real hacking megaprimer (pro).
Waiting for your next megaprimer, keep them comming.
@Juggl3r
You're doing a great job in this series, taking on this difficult subject of cryptography, breaking it down and explaining it to the rest of us, along with the math behind it. Not only so, but doing it in an easy to follow, and eloquent fashion.
By the way, your English pronunciation is much better then mine, so don't worry about it too much. Looking forward to watch all your videos in this and future megaprimers.
@Mesho
Perhaps it may not be practical to encrypt plain text using transposition alone. But this video and the explanation in it, gives you some insight about password strength. The English alphabet has 26 characters, Unix systems are case sensitive, so you have 52 different symbols with both upper and lower case letters, add numbers 0-9 and you have 62 unique characters, throw in a couple special characters like '@#%!', mix them up really good, and you end up with a very strong 64 character long password that is not going to be very easy to crack using brute force alone.
I'm not an expert on this or any other topic, so don't take my word for it. Perhaps somebody more knowledgeable can comment further.
Thanks for the video Juggl3r! I am really enjoying the series so far and can't wait to see more. Also excited about the realistic hacking megaprimer. The idea of a megaprimer that gives a bird's eye view of what is out there is awesome! I've wanted to see something like this for a long time. Keep up the good work!
really really nice tutorial.clearly explained.
credits goes to juggl3r.
your English is understandable.
waiting for the 3 rd part in English.