Home
Search results “Secret history the story of cryptography”
A Short History of Cryptography - A Brief History of Cryptography
 
44:55
A Short History of Cryptography - A Brief History of Cryptography
Views: 34130 fb
Cryptography: The Science of Making and Breaking Codes
 
08:21
There are lots of different ways to encrypt a message, from early, simple ciphers to the famous Enigma machine. But it’s tough to make a code truly unbreakable. Hosted by: Michael Aranda ---------- Dooblydoo thanks go to the following Patreon supporters -- we couldn't make SciShow without them! Shout out to Justin Ove, John Szymakowski, Fatima Iqbal, Justin Lentz, David Campos, and Chris Peters. ---------- Like SciShow? Want to help support us, and also get things to put on your walls, cover your torso and hold your liquids? Check out our awesome products over at DFTBA Records: http://dftba.com/scishow Or help support us by becoming our patron on Patreon: https://www.patreon.com/scishow ---------- Looking for SciShow elsewhere on the internet? Facebook: http://www.facebook.com/scishow Twitter: http://www.twitter.com/scishow Tumblr: http://scishow.tumblr.com Instagram: http://instagram.com/thescishow Sources: http://www.vectorsite.net/ttcode_04.html#m3 http://www.simonsingh.net/The_Black_Chamber/crackingprinciple.html http://book.itep.ru/depository/crypto/Cryptography_history.pdf http://www.cs.trincoll.edu/~crypto/historical/gronsfeld.html http://www.sans.org/reading-room/whitepapers/vpns/history-encryption-730 http://ftp.stmarys-ca.edu/jsauerbe/m10s11/chapter5.pdf http://www.turing.org.uk/scrapbook/ww2.html http://enigma.louisedade.co.uk/howitworks.html http://www.codesandciphers.org.uk/enigma/example1.htm http://www.pbs.org/wgbh/nova/military/how-enigma-works.html http://www.cs.miami.edu/~burt/learning/Csc609.051/notes/02.html
Views: 810247 SciShow
Telling a Scary Story: history of prose horror (with Critical Lit)
 
05:06
Prose scares. Poetry haunts: http://youtu.be/lcq0S4TD0Vg Subscribe to Critical Lit: http://www.youtube.com/CriticalLit The history of a scary story formula... There's a Halloween horror checklist for the prose narrative of movies, novels and video games we love to fear. It's a focused use of language that took centuries to develop. - menace (+1 social ills) - intimidation - macguffin - plot twist (+1 unreliable narrator) Corrections: - "aswang": ə'swaŋ instead of my nativized pronunciation here (thanks, bokology!) Hallway images: Erik Karlsson Peter Wagner Music: Kevin MacLeod (incompetech.com) Jason Shaw (audionautics.com) CC images: Hitchcock by Jack Mitchell
Views: 27110 NativLang
The Caesar cipher | Journey into cryptography | Computer Science | Khan Academy
 
02:36
Brit explains the Caesar cipher, the first popular substitution cipher, and shows how it was broken with "frequency analysis" Watch the next lesson: https://www.khanacademy.org/computing/computer-science/cryptography/crypt/v/polyalphabetic-cipher?utm_source=YT&utm_medium=Desc&utm_campaign=computerscience Missed the previous lesson? https://www.khanacademy.org/computing/computer-science/cryptography/crypt/v/intro-to-cryptography?utm_source=YT&utm_medium=Desc&utm_campaign=computerscience Computer Science on Khan Academy: Learn select topics from computer science - algorithms (how we solve common problems in computer science and measure the efficiency of our solutions), cryptography (how we protect secret information), and information theory (how we encode and compress information). About Khan Academy: Khan Academy is a nonprofit with a mission to provide a free, world-class education for anyone, anywhere. We believe learners of all ages should have unlimited access to free educational content they can master at their own pace. We use intelligent software, deep data analytics and intuitive user interfaces to help students and teachers around the world. Our resources cover preschool through early college education, including math, biology, chemistry, physics, economics, finance, history, grammar and more. We offer free personalized SAT test prep in partnership with the test developer, the College Board. Khan Academy has been translated into dozens of languages, and 100 million people use our platform worldwide every year. For more information, visit www.khanacademy.org, join us on Facebook or follow us on Twitter at @khanacademy. And remember, you can learn anything. For free. For everyone. Forever. #YouCanLearnAnything Subscribe to Khan Academy’s Computer Science channel: https://www.youtube.com/channel/UC8uHgAVBOy5h1fDsjQghWCw?sub_confirmation=1 Subscribe to Khan Academy: https://www.youtube.com/subscription_center?add_user=khanacademy
Views: 597270 Khan Academy
What is cryptography? | Journey into cryptography | Computer Science | Khan Academy
 
01:31
What is Cryptography? A story which takes us from Caesar to Claude Shannon. Watch the next lesson: https://www.khanacademy.org/computing/computer-science/cryptography/crypt/v/caesar-cipher?utm_source=YT&utm_medium=Desc&utm_campaign=computerscience Missed the previous lesson? https://www.khanacademy.org/computing/computer-science/algorithms/intro-to-algorithms/v/what-are-algorithms?utm_source=YT&utm_medium=Desc&utm_campaign=computerscience Computer Science on Khan Academy: Learn select topics from computer science - algorithms (how we solve common problems in computer science and measure the efficiency of our solutions), cryptography (how we protect secret information), and information theory (how we encode and compress information). About Khan Academy: Khan Academy is a nonprofit with a mission to provide a free, world-class education for anyone, anywhere. We believe learners of all ages should have unlimited access to free educational content they can master at their own pace. We use intelligent software, deep data analytics and intuitive user interfaces to help students and teachers around the world. Our resources cover preschool through early college education, including math, biology, chemistry, physics, economics, finance, history, grammar and more. We offer free personalized SAT test prep in partnership with the test developer, the College Board. Khan Academy has been translated into dozens of languages, and 100 million people use our platform worldwide every year. For more information, visit www.khanacademy.org, join us on Facebook or follow us on Twitter at @khanacademy. And remember, you can learn anything. For free. For everyone. Forever. #YouCanLearnAnything Subscribe to Khan Academy’s Computer Science channel: https://www.youtube.com/channel/UC8uHgAVBOy5h1fDsjQghWCw?sub_confirmation=1 Subscribe to Khan Academy: https://www.youtube.com/subscription_center?add_user=khanacademy
Views: 792706 Khan Academy
Unsolved - The History and Mystery of the World’s Greatest Ciphers
 
01:26:06
Craig Bauer, author of Unsolved Ciphers and editor of Cryptologia, will examine these and other vexing ciphers yet to be cracked. Some may reveal the identity of a spy or serial killer, provide the location of buried treasure, or expose a secret society—while others may be elaborate hoaxes. Guests are invited to stay after his talk for some collaborative cipher-breaking fun. ----------------------------------------------------------------- Facebook: https://www.facebook.com/IntlSpyMuseum Twitter: https://twitter.com/intlspymuseum SpyCast: https://audioboom.com/channel/spycast
Views: 10413 IntlSpyMuseum
The Enigma Machine Explained
 
07:59
As technology increases, so do the methods of encryption and decryption we have at our disposal. World War II saw wide use of various codes from substitution ciphers to employing Navajo code talkers in the Pacific theater. Here, science journalist and author Simon Singh demonstrates the German enigma machine, a typewriter-like device used to encrypt communications. He demonstrates not only its operation, but both the strength and fatal flaws in its method. Watch the Full Program Here: https://youtu.be/nVVF8dgKC38 Original Program Date: June 4, 2011 The World Science Festival gathers great minds in science and the arts to produce live and digital content that allows a broad general audience to engage with scientific discoveries. Our mission is to cultivate a general public informed by science, inspired by its wonder, convinced of its value, and prepared to engage with its implications for the future. Subscribe to our YouTube Channel for all the latest from WSF. Visit our Website: http://www.worldsciencefestival.com/ Like us on Facebook: https://www.facebook.com/worldsciencefestival Follow us on twitter: https://twitter.com/WorldSciFest
Views: 489090 World Science Festival
Famous UNCRACKED Codes That STILL Exist!
 
12:26
Check out these famous uncracked codes that still exist! From secret riddles to unsolved mysteries, this top 10 list contains cryptography that's still unexplained today! Subscribe For New Videos! http://goo.gl/UIzLeB Watch our "Most CRAZY Things Ancient Egyptians Did!" video here: https://youtu.be/T0zERiMJFQo Watch our "Most CRAZY Things Ancient Greeks Did!" video here: https://youtu.be/-JkhVvn_dow Watch our "REAL Evidence That Aliens EXIST!" video here: https://youtu.be/dtwJT2eilx0 10. Chinese Gold Bar Cipher In 1933, General Wang in Shanghai, China, allegedly received seven gold bars. These gold bars appear to represent metal certificates related to a bank deposit with a U.S. Bank. The gold bars themselves have pictures, Chinese writing, some form of script writing, and cryptograms in Latin letters. Not surprisingly, experts debate concerning the validity of the claim for the deposit. It may help to resolve the dispute if someone can decipher the cryptograms on the bars. Someone translated the Chinese writing, which discusses a transaction in excess of $300,000,000. It also refers to these gold bars, which weigh a total of 1.8 kilograms. The rest remains a mystery. 9. D’agapeyeff Cipher The D’Agapeyeff cipher is an as-yet unbroken cipher that appears in the first edition of Codes and Ciphers, an elementary book on cryptography published by the Russian-born English cartographer Alexander D’Agapeyeff in 1939. Offered as a “challenge cipher” at the end of the book, it was not included in later editions. D’Agapeyeff supposedly admitted later to having forgotten how he had encrypted it. Some argue that the failure of all attempts at decryption is due to D’Agapeyeff incorrectly encrypting the original text. However, it has also been argued that the cipher may still be successfully attacked using computational methods such as genetic algorithms. Whatever those are. 8. The Beale Ciphers If this next one isn’t a hoax then the person who solves it could become very, very rich. This question of authenticity has bothered cryptoanalysts ever since these ciphers first appeared in an 1885 pamphlet called The Beale Papers, which recounts a fantastic story of buried treasure. According to the pamphlet, a man named Thomas Jefferson Beale, a man no one has proven even existed, discovered gold during an 1816 expedition into the American West. The treasure, as the story goes, was then transported to Bedford County, Virginia, and buried. The gold's secret location was allegedly provided by three cryptograms, of which one was already cracked. Unfortunately, the cracked code only detailed the type of treasure there and not a specific location. To find out anything more specific would involve cracking the two other ciphers. The problem is that figuring it out requires comparing them to unknown historical texts. The decrypted cipher, for example, used the Declaration of Independence. The first number, 115, corresponds with the first letter of the 115th word in the Declaration: "instituted." That means 115 stands for "I." So what are the translation texts for the other two ciphers? No one knows, and they may very well not exist at all. There are also questions over whether the other ciphers may just be unintelligible, as if the whole thing was made up by the pamphlet's author decades after the gold was supposed to have been discovered. 7. Dorabella In 1897, a 40-year-old composer named Edward Elgar sent an encrypted letter to 23-year-old Dora Penny, the stepdaughter of one of his friends. Why he sent it is part of the mystery and can only be answered if anyone ever cracks the code. To figure it out would involve deciphering 87 characters all made of strings of semi-circles oriented in different directions. Attempts at translating the cipher yielded a message just short of gibberish. Experts say that shorter ciphers are always harder to solve. Another theory has it that the code is an example of a distinct private language shared only between Penny and Elgar. If that's the case, then solving it may be simply impossible, since no one but them would understand the references. In 2016, a police officer in Cleveland believes he’s cracked at least part of the code, revealing a line of melody. Inspector Mark Pitt read 100 books on the Dorabella Cipher; he hopes to write one on his discoveries. Whether or not that’s really the meaning, though, remains to be seen. Origins Explained is the place to be to find all the answers to your questions, from mysterious events and unsolved mysteries to everything there is to know about the world and its amazing animals!
Views: 1247137 Origins Explained
Whitfield Diffie on the History of Cryptography
 
01:14:31
In this episode, I talk with legend of cryptography, Whitfield Diffie. Whit was working on cryptography long before Bitcoin existed, building the foundations for which Bitcoin relies upon. We discuss his history, Bitcoin and his views on privacy. LISTEN TO THE FULL EPISODE HERE AND ACCESS LINKS TO THE SHOW NOTES https://www.whatbitcoindid.com/podcast/whitfield-diffie-on-the-history-of-cryptography WHERE TO FIND THE SHOW → My website: https://www.whatbitcoindid.com/podcast/ → iTunes: https://apple.co/2OOlzVV → Spotify: https://spoti.fi/2ygc4W1 → Stitcher: https://bit.ly/2IQO8fX → SoundCloud: https://bit.ly/2CGSVQR → YouTube: https://bit.ly/2pR3s3g → TuneIn: https://bit.ly/2ywystr LISTEN TO OLD EPISODES → By guest: https://www.whatbitcoindid.com/guests/ → By topic: https://www.whatbitcoindid.com/topics/ → Transcriptions: https://www.whatbitcoindid.com/transcriptions/ SUPPORT THE SHOW → https://www.whatbitcoindid.com/sponsorship/ → Become a Patron: https://www.patreon.com/whatbitcoindid/ → Subscribe on iTunes → Leave a review on iTunes → Share the show out with your friends and family on social media → Drop me a line on [email protected] WHERE TO FOLLOW ME: → Twitter: https://twitter.com/whatbitcoindid/ → Medium: https://medium.com/@whatbitcoindid/ → Instagram: http://instagram.com/whatbitcoindid/ → Facebook: https://www.facebook.com/whatbitcoindid/ → YouTube: https://www.youtube.com/whatbitcoindid/ → Website: https://www.whatbitcoindid.com/ → Email list: https://www.whatbitcoindid.com/subscripton/ LEARN ABOUT BITCOIN & CRYPTO: → Step by Step Guide: https://www.whatbitcoindid.com/beginners-guide/ → Training: https://www.whatbitcoindid.com/training/ → Resources: https://www.whatbitcoindid.com/resources/ ***** “It is rare for first implementations of such broad concepts to do as well as that did, Bitcoin is still here 10 years after it started out.” — Whitfield Diffie Interview location: Palo Alto Interview date: Thursday 31st Jan, 2019 Company: Cryptomathic Role: Cryptographer and Security Expert A number of pioneers developed the cryptographic and technical foundations for which Bitcoin is built upon. Nick Szabo highlighted a number of these people in his Tweet: “Inventors of the most important technologies in Bitcoin: digital signatures and Merkle trees (Merkle), elliptic curve crypto (Koblitz), malicious-fault-tolerant consensus (Lamport), elliptic curve crypto (independent inventor: Miller).” Many others along the way have contributed to the success of Bitcoin, either through early work or attempts at created a digital currency, names such as Adam Back, David Chaum and Szabo himself. Whitfield Diffie sits alongside all of these people. His work on cryptography should not be forgotten in the history of Bitcoin and I had the pleasure of sitting down with him to discuss this, how he was introduced to Bitcoin and other such topics as privacy and security. ***** 00.03.09: Intro and welcome 00.03.48: The father of cryptography 00.04.46: Cryptography third wave with cryptocurrencies 00.05.44: Whit’s back story 00.07.44: The journey to become a cryptographer 00.18.14: Understanding cryptography 00.25.16: Early thoughts of money with cryptography 00.28.12: The centralisation problem with digital currencies 00.30.51: Whit’s exposure to Bitcoin 00.36.19: Where we use cryptography 00.39.55: Privacy 00.43.29: Thoughts on the evolution of technology 00.47.10: Cryptography and world security 00.56.27: Quantum computing 00.59.14: Significant unsolved problems in cryptography
Views: 1493 whatbitcoindid
The science of secrecy
 
01:36:50
Join Imperial's Institute for Security Science and Technology for an informative presentation on codes, ciphers and computers. Professor Richard Aldrich, Dr Martin Knight, Professor Sir Peter Knight and Dr Simon Singh take you on a tour of cryptography through the ages. From its beginnings in pen and paper to its future in quantum computing. Professor David Edgerton, Hans Rausing Chair in the Centre for the History of Science, Technology and Medicine at Imperial College London, will chair the panel: The beginnings of cryptography - Dr Simon Singh, science writer, journalist, TV producer, Imperial alumnus and author of 'The code book' Bletchley Park and the greatest secret in WWII - Dr Martin Knight, Chairman of Imperial Innovations and former Chief Operating Officer at Imperial College London Intelligence gathering in the Cold War - Professor Richard Aldrich, Professor of International Security at the University of Warwick and author of 'GCHQ: the uncensored story of Britain's most secret intelligence agency' Quantum cryptography - Professor Sir Peter Knight FRS, President elect of the Institute of Physics, Principal of the Kavli Royal Society International Centre and Senior Research Investigator at Imperial College London For more information please visit : http://www3.imperial.ac.uk/newsandeventspggrp/imperialcollege/eventssummary/event_14-7-2011-14-15-33
WTF is Encryption!?
 
02:16
WTF is encryption? Here's a quick explainer on the history of encryption from Real Future's Kashmir Hill and Yahoo's Chief Information Security Officer, Bob Lord. Subscribe to Fusion: https://www.youtube.com/user/thisisfusion
Views: 1392 FUSION
History - Secrets Exposed - Cryptology - WWII Code breaking
 
12:36
From VOA Learning English, this is EXPLORATIONS in Special English. I'm Jeri Watson. And I'm Jim Tedder. Today we visit a small museum in the American state of Maryland. It is called the National Cryptologic Museum. There you will find information that was once secret. The National Cryptologic Museum is on Fort George G. Meade, a military base near Washington, DC. It tells the story of cryptology and the men and women who have worked in this unusual profession. The word cryptology comes from the Greek "kryptos logos." It means "hidden word." Cryptology is writing or communicating in ways designed to hide the meaning of your words. The museum has many examples of equipment that was once used to make information secret. It also has equipment that was developed to read secret messages. The method of hiding exact meanings is called coding. People have used secret codes throughout history to protect important information. One display at the museum explains American attempts to read Japanese military information during World War Two. Japan's Navy used special machines to change its written information into secret codes. This coded information was then sent by radio to navy ships and military bases. The information included secret military plans and orders. The leaders of the Japanese Navy believed no one could read or understand the secret codes. They were wrong. Americans were working very hard to learn the Japanese code. The United States urgently needed to break the code to learn what Japan was planning. In 1940, an American woman named Genevieve Grotjan found some information being repeated in Japanese coded messages. At the time, she was a civilian working for the government in Washington, DC. Her discovery helped the United States understand secret Japanese diplomatic messages. After the United States understood the code, it was possible to study messages from the Japanese ambassador to Germany and to his supervisors in Japan. After the attack on Pearl Harbor, an American Naval officer named Joseph Rochefort struggled to understand the Japanese navy code. He worked on the American base at Pearl Harbor. It was early in 1942. The American naval commander in the Pacific Ocean was Chester Nimitz. His forces were much smaller than the Japanese Naval forces. And the Japanese had been winning many victories. Joseph Rochefort had worked for several months to read the secret Japanese Naval code called JN-25. If he could understand enough of the code, he would be able to give Admiral Nimitz very valuable information. The admiral could use this information to plan for battle. By the early part of the year, Mr. Rochefort and the men who worked with him could read a little less than 20 percent of the Japanese JN-25 code. Joseph Rochefort had the evidence he needed. "AF" was now known to be the island of Midway. He also told Admiral Nimitz the Japanese would attack Midway on June third. The admiral secretly moved his small force to an area near Midway and waited for the Japanese Navy. The battle that followed was a huge American victory. Experts now say the Battle of Midway was the beginning of the American victory in the Pacific. That victory was possible because Joseph Rochefort learned to read enough of the Japanese code to discover the meaning of the letters "AF." One American code has never been broken. Perhaps it never will. It was used in the Pacific during World War Two. For many years the government would not discuss this secret code. Listen for a moment to this very unusual code. Then you may understand why the Japanese military forces were never able to understand any of it. The code is in the voice of a Native American. The man you just heard is singing a simple song in the Navajo language. Very few people outside the Navajo nation are able to speak any of their very difficult language. At the beginning of World War Two, the United States Marine Corps asked members of the Navajo tribe to train as Code Talkers. The Cryptologic Museum says the Marine Corps Code Talkers could take a sentence in English and change it into their language in about 20 seconds. A code machine needed about 30 minutes to do the same work. The Navajo Code Talkers took part in every battle the Marines entered in the Pacific during World War Two. The Japanese were very skilled at breaking codes. But they were never able to understand any of what they called "The Marine Code." Perhaps the most famous is a World War Two German code machine called the Enigma. The word "enigma" means a puzzle or a problem that is difficult to solve. The German military used the Enigma machine to communicate orders and plans. The United States, Britain, and the government of Poland cooperated in learning to read information sent by the Enigma. It took thousands of people and cost millions of dollars to read the Enigma information. This is a VOA product and is in the public domain
Views: 6344 ListenAndReadAlong
History of the alphabet | Journey into information theory | Computer Science | Khan Academy
 
09:23
The origin of letters Watch the next lesson: https://www.khanacademy.org/computing/computer-science/informationtheory/info-theory/v/rosetta-stone-196-b-c-e?utm_source=YT&utm_medium=Desc&utm_campaign=computerscience Missed the previous lesson? https://www.khanacademy.org/computing/computer-science/informationtheory/info-theory/v/language-of-coins-2-8-proto-writing?utm_source=YT&utm_medium=Desc&utm_campaign=computerscience Computer Science on Khan Academy: Learn select topics from computer science - algorithms (how we solve common problems in computer science and measure the efficiency of our solutions), cryptography (how we protect secret information), and information theory (how we encode and compress information). About Khan Academy: Khan Academy is a nonprofit with a mission to provide a free, world-class education for anyone, anywhere. We believe learners of all ages should have unlimited access to free educational content they can master at their own pace. We use intelligent software, deep data analytics and intuitive user interfaces to help students and teachers around the world. Our resources cover preschool through early college education, including math, biology, chemistry, physics, economics, finance, history, grammar and more. We offer free personalized SAT test prep in partnership with the test developer, the College Board. Khan Academy has been translated into dozens of languages, and 100 million people use our platform worldwide every year. For more information, visit www.khanacademy.org, join us on Facebook or follow us on Twitter at @khanacademy. And remember, you can learn anything. For free. For everyone. Forever. #YouCanLearnAnything Subscribe to Khan Academy’s Computer Science channel: https://www.youtube.com/channel/UC8uHgAVBOy5h1fDsjQghWCw?sub_confirmation=1 Subscribe to Khan Academy: https://www.youtube.com/subscription_center?add_user=khanacademy
Views: 102120 Khan Academy Labs
The History of Mathematics and Its Applications
 
21:18
Join Facebook Group: https://www.facebook.com/groups/majorprep/ Follow MajorPrep on Twitter: https://twitter.com/MajorPrep1 ►Courses Offered Through Coursera (Affiliate Links) Logic: https://click.linksynergy.com/deeplink?id=vFuLtrCrRW4&mid=40328&murl=https%3A%2F%2Fwww.coursera.org%2Flearn%2Fmathematical-thinking Graph Theory: https://click.linksynergy.com/deeplink?id=vFuLtrCrRW4&mid=40328&murl=https%3A%2F%2Fwww.coursera.org%2Flearn%2Fgraphs Discrete Math (includes a range of topics meant for computer scientists including graph theory, number theory, cryptography, etc): https://click.linksynergy.com/deeplink?id=vFuLtrCrRW4&mid=40328&murl=https%3A%2F%2Fwww.coursera.org%2Fspecializations%2Fdiscrete-mathematics Intro to Complex Analysis: https://click.linksynergy.com/deeplink?id=vFuLtrCrRW4&mid=40328&murl=https%3A%2F%2Fwww.coursera.org%2Flearn%2Fcomplex-analysis Game Theory: https://click.linksynergy.com/deeplink?id=vFuLtrCrRW4&mid=40328&murl=https%3A%2F%2Fwww.coursera.org%2Flearn%2Fgame-theory-1 Cryptography: https://click.linksynergy.com/deeplink?id=vFuLtrCrRW4&mid=40328&murl=https%3A%2F%2Fwww.coursera.org%2Flearn%2Fcrypto ►Books (Affiliate Links) Graph Theory: https://amzn.to/2IUXQ0A Logic/Proofs: https://amzn.to/2Cgh2oj Algorithms: https://amzn.to/2Cg0kWg Cryptography: https://amzn.to/2CKIATS Fermat's Last Theorem: https://amzn.to/2yzWNhY Chaos Theory: https://amzn.to/2Cgup83 ►Related Youtube Videos Turning a Sphere Inside Out: https://www.youtube.com/watch?v=-6g3ZcmjJ7k Cutting a Mobius Strip (Visual): https://www.youtube.com/watch?v=XlQOipIVFPk Group Theory Lectures: https://www.youtube.com/watch?v=O4plQ5ppg9c&index=1&list=PLAvgI3H-gclb_Xy7eTIXkkKt3KlV6gk9_ Chaos Theory Lectures: https://www.youtube.com/watch?v=ycJEoqmQvwg&index=1&list=PLbN57C5Zdl6j_qJA-pARJnKsmROzPnO9V Geodesics Animation: https://www.youtube.com/watch?v=Wl8--BsbNnA ►Support the Channel Patreon: https://patreon.com/majorprep PayPal(one time donation): https://www.paypal.me/majorprep MajorPrep Merch Store: https://teespring.com/stores/majorprep ►Check out the MajorPrep Amazon Store: https://www.amazon.com/shop/majorprep *************************************************** ► For more information on math, science, and engineering majors, check us out at https://majorprep.com Best Ways to Contact Me: Facebook, twitter, or email ([email protected])
Views: 106672 MajorPrep
The Secret History of Silicon Valley
 
56:33
Google Tech Talks December 18, 2007 How Stanford & the CIA/NSA Built the Valley We Know Today, presented by Steve Blank. How much does an average Googler know about the history of the place he/she works in - Silicon Valley? Come and test your knowledge. I have seen this talk and I assure you - even seasoned Silicon Valley veterans will find this story interesting. Silicon Valley entrepreneur Steve Blank will talk about how World War II set the stage for the creation and explosive growth of Silicon Valley, and the role of Frederick Terman and Stanford in working with government agencies (including the CIA and the National Security Agency) to set up companies in this area that sparked the creation of hundreds of other enterprises. Steve Blank spent nearly 30 years as founder and executive of high tech companies in Silicon Valley, most recently the enterprise software firm E.piphany. He has been involved in or co-founded eight Silicon Valley startups, ranging from semiconductors to video games, and personal computers to supercomputers. He teaches entrepreneurship at U.C. Berkeley's Haas School of Business, Columbia University and Stanford's Graduate School of Engineering. This talk was hosted by Boris Debic
Views: 245663 GoogleTechTalks
Best Documentary Ever The Most Thrilling Story about Monsters [Documentaries 2016]
 
02:37:05
Thanks for watching Please Like, Share, Comment and Subscribe
Views: 515795 Jeanne R. Letendre
Cicada 3301: An Internet Mystery
 
17:54
In this video I explore an elaborate cryptographic internet puzzle orchestrated by a mysterious individual or group known as Cicada 3301. Patreon: https://www.patreon.com/lemmino Subreddit: https://www.reddit.com/r/lemmino Twitter: https://www.twitter.com/lemmin0 Facebook: https://www.fb.com/lemmin0 Discord: https://www.discord.gg/lemmino The puzzle I hid in this video has been solved: https://www.lemmi.no/post/my-latest-puzzle [Music] Own work Erang - Forever Lost In An Endless Dream https://erang.bandcamp.com/track/forever-lost-in-an-endless-dream Erang - The Highway Goes Ever On https://erang.bandcamp.com/track/the-highway-goes-ever-on Erang - Silent Bones https://erang.bandcamp.com/track/silent-bones-2 Cicada 3301 - The Instar Emergence https://www.youtube.com/watch?v=YA1fONCH-CY Cicada 3301 - Interconnectedness https://www.youtube.com/watch?v=ActGqDxBD4A [References] https://www.lemmi.no/post/cicada-3301#refs
Views: 12294688 LEMMiNO
Caesar Cipher - Ancient Cryptography
 
01:19
Caesar cipher was a simple technique for disguising a message. Used for hundreds of years to keep secrets. Cryptography begins with the Caesar cipher. Stock footage under CC license from Prelinger Archive
Views: 6770 Art of the Problem
Secret Codes - Cryptography, Decipherment and the Imitation Game
 
01:56
Hidden messages, and how we uncover them. A quick look at cryptography, cryptanalysis and decipherment. The 2014 film, The Imitation Game, centers on Alan Turing and the cracking of the Enigma Machine. There’s a whole history of “figuring out” behind Turing’s discovery. Three secretive subjects come to mind. Cryptography finds ways of keeping your messages secret. Cryptanalysis reverse engineers those ways and finds out your secrets. Decipherment tries to read an unknown writing system. My next video will look at 9 scripts and codes that are still a mystery to this day: https://www.youtube.com/watch?v=emX-DNtSXpI&index=2&list=UUMk_WSPy3EE16aK5HLzCJzw Are you interested in tales of decipherment, like the deciphering of Egyptian hieroglyphs? Leave a comment! Not a subscriber? Subscribe for more videos about language! Music: Cycles (audionautix.com) Creative Commons 3.0 photos used here: Enigma machine, Turing statue and pics of undeciphered scripts
Views: 21715 NativLang
Sexpionage (Cold War Spy Documentary) | Timeline
 
48:06
Check out our new website for more incredible history documentaries: HD and ad-free. http://bit.ly/2O6zUsK Sexpionage tells the stories of two women who were seduced by secret agents working for the East German intelligence service, the Stasi. At the height of the Cold War the Stasi would regularly despatch their agents to the West German capital, Bonn, armed with the task of forming long term relationships with single women working at embassies or government ministries. These women were unwittingly tapped for top secret information which was then passed on to the East. Both Gabriele Kliem and Margaret Hike had no idea that their lovers were spies until both women were arrested for treason. This film tells the story of the years they spent with their secret agent lovers and explores the feelings they are left with after the most significant relationships of their lives were revealed to be a sham. Content licensed from DRG. Produced by Agenda.
The Internet: Encryption & Public Keys
 
06:40
Mia Epner, who works on security for a US national intelligence agency, explains how cryptography allows for the secure transfer of data online. This educational video explains 256 bit encryption, public and private keys, SSL & TLS and HTTPS. Learn more at http://code.org/ Help us translate into your language: http://code.org/translate/videos Stay in touch with us! • on Twitter https://twitter.com/codeorg • on Facebook https://www.facebook.com/Code.org • on Instagram https://instagram.com/codeorg • on Tumblr https://blog.code.org • on LinkedIn https://www.linkedin.com/company/code... • on Google+ https://google.com/+codeorg Help us caption & translate this video! https://amara.org/v/HGaS/
Views: 224016 Code.org
How Was Hitler's Enigma Machine Cracked?
 
03:06
During WWII, an elite team of British codebreakers, including Alan Turing and Gordon Welchman, were tasked with cracking one of the most complex secret communication systems in existence: Hitler's Enigma. From: THE CODEBREAKER WHO HACKED HITLER http://bit.ly/1X1crM6
Views: 78019 Smithsonian Channel
Symmetric and Asymmetric Key Cryptography
 
03:35
Symmetric and Asymmetric Key Cryptography Watch more Videos at https://www.tutorialspoint.com/videotutorials/index.htm Lecture By: Mr. Arnab Chakraborty, Tutorials Point India Private Limited
The Data Explosion | The History of the Internet, Part 3
 
10:16
Nearly twenty years after the dot-com bubble burst, the internet is an essential piece of the modern world, with the public side mostly commanded by a few powerful companies. SciShow is nominated for a Webby! Vote for us! https://vote.webbyawards.com/PublicVoting#/2017/film-video/video-channels-and-networks/science-education-channels-and-networks Hosted by: Michael Aranda ---------- Support SciShow by becoming a patron on Patreon: https://www.patreon.com/scishow ---------- Dooblydoo thanks go to the following Patreon supporters—we couldn't make SciShow without them! Shout out to Kevin Bealer, Mark Terrio-Cameron, KatieMarie Magnone, Patrick Merrithew, Charles Southerland, Fatima Iqbal, Benny, Tim Curwick, Scott Satovsky Jr, Philippe von Bergen, Bella Nash, Bryce Daifuku, Chris Peters, Patrick D. Ashmore, Charles George, Bader AlGhamdi ---------- Looking for SciShow elsewhere on the internet? Facebook: http://www.facebook.com/scishow Twitter: http://www.twitter.com/scishow Tumblr: http://scishow.tumblr.com Instagram: http://instagram.com/thescishow ---------- Sources: http://www.nytimes.com/1996/09/29/nyregion/l-internet-is-a-supplement-not-a-substitute-533246.html https://www.wired.com/1997/02/fflucas/ https://partners.nytimes.com/library/cyber/sites/082597sites.html http://www.biography.com/people/groups/wild-west http://www.digitalhistory.uh.edu/era.cfm?eraID=9&smtID=2 http://www.digitaltrends.com/web/oldweb-today-web-archives/ http://money.cnn.com/2015/03/10/investing/nasdaq-5000-stocks-market/ http://archive.fortune.com/magazines/fortune/fortune_archive/2000/10/30/290609/index.htm https://worldhistoryproject.org/topics/dot-com-bubble https://www.wired.com/2010/03/0310nasdaq-bust/ https://qz.com/348954/the-nasdaq-is-back-to-its-dot-com-bubble-peak/ http://www.seattletimes.com/business/microsoft/long-antitrust-saga-ends-for-microsoft/ http://www.economist.com/news/business/21605917-napsters-founders-demonstrate-challenges-entrepreneurial-second-acts-hit-me-baby-one-more http://fortune.com/2013/09/05/ashes-to-ashes-peer-to-peer-an-oral-history-of-napster/ http://1stwebdesigner.com/history-of-social-networking/ http://www.whoishostingthis.com/blog/2014/11/20/another-bubble/ http://www.slate.com/articles/technology/technology/2009/10/how_geocities_invented_the_internet.html http://web.archive.org/web/19990209135604/geocities.com/neighborhoods/ https://techcrunch.com/2009/04/23/yahoo-quietly-pulls-the-plug-on-geocities/ http://www.cbsnews.com/pictures/then-and-now-a-history-of-social-networking-sites/4/ https://www.wired.com/2013/02/friendster-autopsy/ http://www.pcmag.com/article2/0,2817,2384588,00.asp http://www.csgnetwork.com/bandwidth.html http://whatis.techtarget.com/reference/Fast-Guide-to-DSL-Digital-Subscriber-Line https://www.wired.com/2016/04/average-webpage-now-size-original-doom/ https://www.nytimes.com/2016/08/27/technology/cloud-computing-brings-sprawling-centers-but-few-jobs-to-small-towns.html http://www.datacenterdynamics.com/content-tracks/power-cooling/kc-mares-the-internets-power-buyer/66315.fullarticle http://www.loudountimes.com/news/article/loudoun_countys_data_center_market_continues_to_surge432 http://www.nytimes.com/2012/09/23/technology/data-centers-waste-vast-amounts-of-energy-belying-industry-image.html https://pdfs.semanticscholar.org/e7d5/3f538f5239739d1f943c81d17e4a167c65c6.pdf http://trouvus.com/how-does-the-youtube-recommendation-system-work/ http://www.slate.com/articles/technology/cover_story/2016/01/how_facebook_s_news_feed_algorithm_works.html http://www.pewinternet.org/2017/02/08/code-dependent-pros-and-cons-of-the-algorithm-age/ http://www.pnas.org/content/111/24/8788.full https://medium.com/message/engineering-the-public-289c91390225 http://www.usatoday.com/story/tech/columnist/komando/2015/10/09/stop-facebook-targeted-ads-and-tracking/73588820/ http://money.cnn.com/2015/01/09/technology/security/super-cookies/ http://www.pewinternet.org/2016/01/14/privacy-and-information-sharing/ https://www.cnet.com/news/facebook-sued-for-15-billion-over-alleged-privacy-infractions/ https://www.technologyreview.com/s/509471/amazon-woos-advertisers-with-what-it-knows-about-consumers/ http://www.pewinternet.org/2015/05/20/americans-attitudes-about-privacy-security-and-surveillance/
Views: 170058 SciShow
Bletchley Park - Code Breaking's Forgotten Genius
 
59:00
This BBC documentary tells the story of Gordon Welchman, one of the key contributors of WW2 and cold war code breaking. The story of Alan Turing has gone public years ago, this documentary explains why Gordon Welchman's achievements were kept a secret for all these years.
Views: 6367 Redlinemeister
World’s Best Kept Secrets
 
10:38
From Mysterious Online Societies; to the existence of above top secret projects and sites; these are 5 of the World’s Best Kept Secrets! HEY YOU ! There are more awesome videos being made every week, like and subscribe to World Unearthed so you don't miss a beat ! 5.Wikileaks THE SECRET - Who are the whistle blowers ? 4.Cicada 3301 THE SECRET - WHO RUNS THIS GROUP Hello. We are looking for highly intelligent individuals. To find them, we have devised a test. There is a message hidden in this image. Find it, and it will lead you on the road to finding us. We look forward to meeting the few that will make it all the through. Good luck. 3301 This cryptic image was first posted on January 4, 2012; and of course it was on found on a 4chan board. Many people assumed it was just someone running a prank; but there was a few people who were intrigued. Over the course of a month; a dedicated group of users solved multiple, increasingly harder puzzles. It was all fun and games until one of the last clues was found; Coordinates. This was no longer an online role playing game, at this point a lot of people got spooked, but some persevered through their fears. Considering there was an active chat channel; and multiple forums trying to crack the code at the same time; you might say that the solving of the puzzles was “crowdsourced”. The last clue to the Cicada 3301 Puzzle lead to a site on the deep web…. But only a select few saw it in its original state. The site had been replaced with a simple message “ We want the best, not the followers.” On January 5th, 2016, the fourth round of recruitment began… 3. Satoshi Nakamoto THE SECRET - Who is the man behind bitcoin ? Okay, many of you are familiar with bitcoin; it is the most popular crypto currency in existence; a digital currency that uses cryptography to control the creation of new coins and transactions of coins; a medium of exchange; a digital asset. So far; so good. Was bitcoin the original cryptocurrency; no. There was many before it; and it can all be traced back to Wei Dai; the creator of B-Money(1998); then there was Nick Szabo and his Bit Gold concept(1998); then a few others tried the concept out. Out of all, Bitcoin is by far the most successful one. The venture began in 2009 and it was created by the secret and mysterious identity only known as Satoshi Nakamoto. There are a few “educated guesses” as to who it might be, but nothing has been proven. It is also believed Nakamoto has a wallet with roughly 1 million bitcoins in it, in US dollars; we are talking 1.9 billion…. In reality, if Nakamoto ever decided to move or sell any of these bitcoins the whole market might collapse. Why? Because there would be widespread panic as to how much of the coins will be dispersed, creating an imbalance in the supply and demand chain. As of right now, one bitcoin trades for 1906 dollars. 2.The ULTRA Secret THE SECRET - The cracking of the Enigma Code 1.Black Projects We can sit here and speculate all we want, but there is no way in hell we will ever find out what the current black projects and sites that the .... is working on are. So instead, lets look at confirmed black projects of the past; Like the SR-71 Blackbird, the fastest plane ever recorded. How FAST? 2193.2 MPH( 3,529.6KM/H) fast. The general protocol for evading surface to air missiles was to just accelerate and outfly. The plane was developed by the Lockheed Corporation at their Skunk Works division.. This haunting picture shows all the pilots of SR-71 Blackbird in the 80’s. There is something about this image that is very surreal. Almost alien like. When I first saw it; I just had to know the history behind it. Considering the plane reached altitudes of 80,000ft (24,000M) they had to wear these special pressurized suits to stay alive. Some other notable declassified Black Projects are the B-2 Spirit Bomber; The F-117 Nighthawk; and the IX-529 | Seashadow. Which one do you think is the coolest ?
Views: 757878 World Unearthed
Cryptography: A Love Story
 
05:22
This video is part of a series of work by High Tech High Media Arts 12th grade students in the curated exhibition, "Illuminated Mathematics." Students were ask to produce a creative digital media piece about math in history, culture and the applied arts to heighten awareness of the beauty of math in our world.
Views: 962 NobleStudentFilms
What is The History of Bitcoin: Super Easy Explanation
 
12:11
What is The History of Bitcoin: Super Easy Explanation - https://blockgeeks.com/ We’ll start at the very beginning by understanding the history of blockchain. The very first blockchain in the world was Bitcoin. An anonymous person or group known as Satoshi Nakamoto published a document in an online cryptography forum in November 2008 and revealed the first details of how it would work, describing it as a “peer-to-peer electronic cash system”. The whitepaper is available today at bitcoin.org/bitcoin.pdf. It allows any 2 people to pseudonymously send money to each other no matter where they are in the world. It is a borderless currency. The main benefit of Bitcoin is that it does not require any centralized authority or institution to operate. This is in contrast to today’s centralized financial systems that depend on the existence of a central bank or government to mint money. If for any reason the central authority were to shutdown, the money would become worthless. In a decentralized system like Bitcoin, there is no central authority and the system can continue to operate as long as there are members in its peer-to-peer network. The goal of the whitepaper was to describe how the different parts of the Bitcoin protocol would operate and be kept secure. A new type of database, called a blockchain, would keep track of a single history of all Bitcoin transactions and it would be maintained by everyone in the network. The database would be publicly available for anyone to view and inspect, and anyone can download a copy of the same database. This provides data redundancy and makes sure the data is never lost, but also provides a way for anyone to verify the transactions in the database themselves. A block in the database just stores a sequence of transactions, and a sequence of blocks is called a blockchain. Each block is identified by an incrementing number and a unique Sha-256 hash. The hash for a block is calculated using the transactions inside it, as well as the previous block’s hash, which forms a chain of hashes. The data in the blocks is secured using a cryptographic algorithm called proof-of-work, which also keeps all members of the network and the database in sync to prevent double-spending. In this context, preventing double-spending means preventing anyone from spending money they dont have. Proof-of-work is used to generate new blocks for the database, also known as mining, and the reward for mining a new block is given to the miner by creating new Bitcoins in the system. This is the only way new Bitcoins can be created. Anyone on the network can be a miner and a new block is mined roughly every 10 minutes, which includes the latest set of verified transactions. The first release for Bitcoin was version 0.1 written in C++ by Satoshi and published on SourceForge in January 2009 under the open-source MIT license. Anyone could download the source code and run it to join the network, also known as becoming a node in the network. This is the original version 0.1 source code written by Satoshi. We can see the hard-coded genesis block, which is the very first block in the chain. The hash for the block can be verified by using any Bitcoin blockchain explorer. Let’s copy and paste this hash into the blockchain explorer available at blockchain.info. We can see that this hash is for block number 0, and that it has only one transaction in it which is the mining reward, and the reward amount of 50 Bitcoin was given to this Bitcoin address. We can also see this 50 Bitcoin reward for the genesis block in the original source code. The genesis block is a special case needed to start the blockchain and is the only block that is hard-coded, whereas every subsequent block is calculated using proof-of-work. Satoshi’s motivation for creating Bitcoin is revealed in the piece of data he included in the genesis block: a newspaper headline from The Times that read ‘Chancellor on brink of second bailout for banks’. The date of the newspaper is proof that the genesis block was created on or after Jan 3 2009. Satoshi developed the source code mostly himself up until mid-2010, when he handed it off to the open-source community. It is now maintained under the project called Bitcoin Core. The software is currently at version 0.15.1 and is available for download at bitcoin.org. This is still the most popular Bitcoin client, and its estimated that there are over 10 thousand nodes running the Bitcoin network today using various clients. Satoshi disappeared from public view in late 2010, his identity still unknown to this day. The only way someone could prove that they are Satoshi is by using the same encryption keys used when posting the original whitepaper in the online cryptography forum. To read more check out https://blockgeeks.com/
Views: 11937 Blockgeeks
Walter Isaacson: The History Of The Future
 
01:22:11
The history of computers is a history of competition and collaboration: Innovators have worked together, but also clashed over the place of computers in society and how they should function. Those clashes—between privacy and openness, businessmen and bohemians—continue to this day. See "The Innovators" author Walter Isaacson, MakerBot CEO Jennifer Lawton, The Muse.com founder Kathryn Minshew and journalist John Hockenberry parse the past, present, and future of our technological revolution in the World Science Festival event Science and Story: The History of the Future. Subscribe to our YouTube Channel for all the latest from WSF. Visit our Website: http://www.worldsciencefestival.com/ Like us on Facebook: https://www.facebook.com/worldsciencefestival Follow us on twitter: https://twitter.com/WorldSciFest Original Program Date: October 22, 2014 Host: John Hockenberry PARTICIPANTS: Walter Isaacson, Jennifer Lawton, Kathryn Minshew John Hockenberry's introduction. 00:08 Early computing and animation. 3:45 The HP 41C computer. 7:50 Welcome Walter Isaacson. 9:10 What was the interest in computing? 11:00 Who was Alan Turing? 15:47 The first electronic circuit board. 21:30 The hardware lead to the development of software. 26:32 The Altair computer from 1975. 30:20 And that's how Apple is born. 33:38 Walter takes on John at Pong. 41:46 The innovation of the internet. 45:29 Those who refuse to lend their computers power. 51:11 Welcome Jennifer Lawton & Kathryn Minshew 54:10 Does MakerBot land on both sides of the open source and IP debate? 56:45 What is Unix? 1:00:00 How much IP is involved in the 3D printing world. 1:03:18 What are the aspirations of 3D printing? 1:07:02 The rise of the startup. 1:13:05 Do morals keep up with technology? 1:17:03
Views: 32511 World Science Festival
The Science of Secrecy from Ancient Egypt to Quantum Cryptography (1999)
 
54:42
Simon Lehna Singh MBE (born 19 September 1964) is a British popular science author whose works largely contain a strong mathematical element. His written works include Fermat's Last Theorem (in the United States titled Fermat's Enigma: The Epic Quest to Solve the World's Greatest Mathematical Problem),[2][3] The Code Book[4] (about cryptography and its history), Big Bang[5] (about the Big Bang theory and the origins of the universe), Trick or Treatment? Alternative Medicine on Trial[6] (about complementary and alternative medicine, co-written by Edzard Ernst) and The Simpsons and Their Mathematical Secrets (about mathematical ideas and theorems hidden in episodes of The Simpsons and Futurama).[7] In 2012 Singh founded the Good Thinking Society.[8] Singh has also produced documentaries and works for television to accompany his books, is a trustee of NESTA, the National Museum of Science and Industry and co-founded the Undergraduate Ambassadors Scheme. Singh's parents emigrated from Punjab, India to Britain in 1950. He is the youngest of three brothers, his eldest brother being Tom Singh, the founder of the UK New Look chain of stores. Singh grew up in Wellington, Somerset, attending Wellington School, and went on to Imperial College London, where he studied physics. He was active in the student union, becoming President of the Royal College of Science Union.[9] Later he completed a PhD degree in particle physics at Emmanuel College, Cambridge and at CERN, Geneva. In 1983, he was part of the UA2 experiment in CERN.[11] In 1987, Singh taught science at The Doon School, the independent all-boys' boarding school in India.[12] In 1990 Singh returned to England and joined the BBC's Science and Features Department, where he was a producer and director working on programmes such as Tomorrow's World and Horizon. Singh was introduced to Richard Wiseman through their collaboration onTomorrow's World. At Wiseman's suggestion, Singh directed a segment about politicians lying in different mediums, and getting the public's opinion on if the person was lying or not. After attending some of Wiseman's lectures, Singh came up with the idea to create a show together, and Theatre of Science was born. It was a way to deliver science to normal people in an entertaining manner. Richard Wiseman has influenced Singh in such a way that Singh states: My writing initially was about pure science but a lot of my research now has been inspired by his desire to debunk things such as the paranormal – we both hate psychics, mediums, pseudoscience in general.[13] Singh directed his BAFTA award-winning documentary about the world's most notorious mathematical problem entitled "Fermat's Last Theorem" in 1996. The film was memorable for its opening shot of a middle-aged mathematician, Andrew Wiles, holding back tears as he recalled the moment when he finally realised how to resolve the fundamental error in his proof of Fermat's Last Theorem. The documentary was originally transmitted in October 1997 as an edition of the BBC Horizon series. It was also aired in America as part of the NOVA series. The Proof, as it was re-titled, was nominated for an Emmy Award. The story of this celebrated mathematical problem was also the subject of Singh's first book, Fermat's last theorem. In 1997, he began working on his second book, The Code Book, a history of codes and codebreaking. As well as explaining the science of codes and describing the impact of cryptography on history, the book also contends that cryptography is more important today than ever before. The Code Book has resulted in a return to television for him. He presented The Science of Secrecy, a five-part series for Channel 4. The stories in the series range from the cipher that sealed the fate of Mary, Queen of Scots, to the coded Zimmermann Telegram that changed the course of the First World War. Other programmes discuss how two great 19th century geniuses raced to decipher Egyptian hieroglyphs and how modern encryption can guarantee privacy on the Internet. https://en.wikipedia.org/wiki/Simon_Singh Image: Sam Hughes [CC BY 2.0 (http://creativecommons.org/licenses/by/2.0)], via Wikimedia Commons
Views: 2548 Way Back
Safe and Sorry – Terrorism & Mass Surveillance
 
06:14
Sources: Terrorist surveillance program: Original press release: http://1.usa.gov/1p0lZXT Assessment of potential effect of surveillance measures if implemented before 9/11: Interview with FBI director Robert Mueller: http://bit.ly/1MvHNpB FBI investigations of immigrants: "NSEERS effect" report: http://bit.ly/1qU8Wcu Quote on aggressive racial profiling: Article "Are we safer?" by David Cole, Professor of Law at Georgetown University Law Center: http://bit.ly/1Sc8tLo Extent of NSA surveillance: NSA power point slides on collecting buddy lists, obtained by Washington Post: http://wapo.st/1cWi0SM NSA slides on prism data collection, obtained by The Guardian: http://bit.ly/1qmj46r NSA results from mass surveillance vs. target surveillance: Report from the Presidents NSA Review group 2013 (recommending to stop mass data mining because of lack of results): http://1.usa.gov/1bK0q7x Article from ProPublica: http://bit.ly/1PAusfR Analysis from the New America Foundation: http://bit.ly/1SSq8ea Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World by Bruce Schneier Surveillance program didn`t stop any major attacks: Full video of court hearing with NSA director Keith B. Alexander on surveillance: http://cs.pn/1Yv1G0N Official report on results of phone surveillance policy: http://1.usa.gov/1bK0q7x Article on debunked claims: http://bit.ly/1p0n2ae Official judge ruling on matter points to no evidence: https://www.propublica.org/documents/item/902454-judge-leon-ruling#document/p62 Report by the legal affairs and human rights committee of the parliamentary assembly of the Council of Europe: http://bit.ly/1qr9aXC Boston marathon bomber was known to FBI: Official press release: http://1.usa.gov/1Vrw4vI FBI asked Apple for help: Official court order: http://bit.ly/24auFf6 Apple`s refusal to crack iPhone: Official public statement: http://apple.co/1Lt7ReW Objections against FBI demands from cryptographers: Brad Smith keynote at the RSA information security conference: http://bit.ly/1Vrwd1Y (especially relevant from minute 7 on) Statement by Information Technology Industry Council: http://bit.ly/1Q9cg7N Amicus briefs supporting Apple: http://apple.co/1OSBypU FBI changing their story about needing Apple`s help: Initial article on Washington Post: http://wapo.st/1KqHIT7 Initial story on Reutersblog: http://reut.rs/1SCl73o Update on Reuters: http://reut.rs/1NdTJae Article on ACLU about possible work-around: http://bit.ly/1OZ2nZL Blogpost on another possible workaround: http://bit.ly/1Vrwv98 NSA can turn on iPhone remotely: BBC interview with Edward Snowden: http://bit.ly/1Nab09Q Article on Wired: http://bit.ly/1hvZMNn Abuse of anti-terrorism laws: Proof of Patriot Act laws used for investigating other crimes, especially drugs: http://bit.ly/1LXBu9X „Sneak and Peak“ report: http://bit.ly/1RVGhgM Enforcement of French anti-terrorism laws: Detailed explanation of new powers given by extended laws: http://bit.ly/1OYBpSl Original law text (in french): http://bit.ly/1qraiKQ Abuse of french anti-terrorism laws: Human rights watch reports cases: http://bit.ly/1SZmwpH Climate change protesters placed under house arrest: http://reut.rs/20DYZfa Censorship in Hungary, Poland and Spain: http://bit.ly/20DZ3eS http://bit.ly/1Qgc7lX http://bit.ly/1WtmIyv http://bit.ly/1MvJ8N7 Jail time for government critics in Turkey: http://bit.ly/1oXBctf Effects of surveillance on our society: List of issues of power abuse since 9/11 by American Civil liberties union: http://bit.ly/1U6Rux4 General overview over the topic: http://bit.ly/1Pyj8uR http://bit.ly/1RVH2GF http://bit.ly/MZe4qY Safe and Sorry– Terrorism & Mass Surveillance Help us caption & translate this video! http://www.youtube.com/timedtext_cs_panel?c=UCsXVk37bltHxD1rDPwtNM8Q&tab=2
Ever wonder how Bitcoin (and other cryptocurrencies) actually work?
 
26:21
Bitcoin explained from the viewpoint of inventing your own cryptocurrency. Videos like these made possible by patreon: https://patreon.com/3blue1brown Protocol Labs: https://protocol.ai/ Interested in contributing? https://protocol.ai/join/ Special thanks to the following patrons: http://3b1b.co/btc-thanks Some people have asked if this channel accepts contributions in cryptocurrency form as an alternative to Patreon. As you might guess, the answer is yes :). Here are the relevant addresses: ETH: 0x88Fd7a2e9e0E616a5610B8BE5d5090DC6Bd55c25 BTC: 1DV4dhXEVhGELmDnRppADyMcyZgGHnCNJ BCH: qrr82t07zzq5uqgek422s8wwf953jj25c53lqctlnw LTC: LNPY2HEWv8igGckwKrYPbh9yD28XH3sm32 Supplement video: https://youtu.be/S9JGmA5_unY Music by Vincent Rubinetti: https://soundcloud.com/vincerubinetti/heartbeat Here are a few other resources I'd recommend: Original Bitcoin paper: https://bitcoin.org/bitcoin.pdf Block explorer: https://blockexplorer.com/ Blog post by Michael Nielsen: https://goo.gl/BW1RV3 (This is particularly good for understanding the details of what transactions look like, which is something this video did not cover) Video by CuriousInventor: https://youtu.be/Lx9zgZCMqXE Video by Anders Brownworth: https://youtu.be/_160oMzblY8 Ethereum white paper: https://goo.gl/XXZddT If you want to contribute translated subtitles or to help review those that have already been made by others and need approval, you can click the gear icon in the video and go to subtitles/cc, then "add subtitles/cc". I really appreciate those who do this, as it helps make the lessons accessible to more people. Music by Vince Rubinetti: https://vincerubinetti.bandcamp.com/album/the-music-of-3blue1brown ------------------ 3blue1brown is a channel about animating math, in all senses of the word animate. And you know the drill with YouTube, if you want to stay posted on new videos, subscribe, and click the bell to receive notifications (if you're into that). If you are new to this channel and want to see more, a good place to start is this playlist: http://3b1b.co/recommended Various social media stuffs: Website: https://www.3blue1brown.com Twitter: https://twitter.com/3Blue1Brown Patreon: https://patreon.com/3blue1brown Facebook: https://www.facebook.com/3blue1brown Reddit: https://www.reddit.com/r/3Blue1Brown
Views: 2467978 3Blue1Brown
The Lava Lamps That Help Keep The Internet Secure
 
03:59
At the headquarters of Cloudflare, in San Francisco, there's a wall of lava lamps: the Entropy Wall. They're used to generate random numbers and keep a good bit of the internet secure: here's how. Thanks to the team at Cloudflare - this is not a sponsored video, they just had interesting lava lamps! There's a technical rundown of the system on their blog here: https://blog.cloudflare.com/lavarand-in-production-the-nitty-gritty-technical-details Edited by Michelle Martin, @mrsmmartin I'm at http://tomscott.com on Twitter at http://twitter.com/tomscott on Facebook at http://facebook.com/tomscott and on Snapchat and Instagram as tomscottgo
Views: 1310387 Tom Scott
From Idea to Impact, the Crypto Story:  What's Next?
 
01:03:19
IACR Distinguished Lecture by Shafi Goldwasser, presented at Crypto 2018.
Views: 1976 TheIACR
174-Cracking the Nazi Code
 
33:50
In 1940, Germany was sending vital telegrams through neutral Sweden using a sophisticated cipher, and it fell to mathematician Arne Beurling to make sense of the secret messages. In this week's episode of the Futility Closet podcast we'll describe the outcome, which has been called "one of the greatest accomplishments in the history of cryptography." We'll also learn about mudlarking and puzzle over a chicken-killing Dane. Intro: In 1836, three boys discovered 17 tiny coffins entombed near Edinburgh. On his 1965 album A Love Supreme, John Coltrane "plays" a poem on the saxophone. Sources for our feature on Arne Beurling: Bengt Beckman, Codebreakers: Arne Beurling and the Swedish Crypto Program During World War II, 1996. David Kahn, The Codebreakers: The Story of Secret Writing, 1967. David Joyner, ed., Coding Theory and Cryptography, 2000. Bengt Beckman and Jonathan Beard, "Codebreakers: Arne Beurling and the Swedish Crypto Program During World War II," Intelligence and National Security 18:4 (January 2004), 206-207. Lars Ulfving, "The Geheimschreiber Secret: Arne Beurling and the Success of Swedish Signals Intelligence," in Bo Hugemark and Probus Förlag, eds., I Orkanens Öga, 1941 -- Osäker neutralitet, 1992. Louis Kruh, "Arne Beurling and Swedish Crypto," Cryptologia 27:3 (July 2003), 231. John Wermer, "Recollections of Arne Beurling," Mathematical Intelligencer 15:3 (January 1993), 32–33. Jurgen Rohwer, "Signal Intelligence and World War II: The Unfolding Story," Journal of Military History 63:4 (October 1999), 939-951. Bo Kjellberg, "Memories of Arne Beurling, February 3, 1905–November 20, 1986," Mathematical Intelligencer 15:3 (January 1993), 28–31. Håkan Hedenmalm, "Codebreakers: Arne Beurling and the Swedish Crypto Program During World War II," Mathematical Intelligencer 28:1 (December 2006), 57–59. Craig Graham McKay, "Swedish Cryptanalysis and the Saga of Arne Beurling: A Book Review," Cryptologia 23:3 (July 1999), 257. Louis Kruh, "Swedish Signal Intelligence History," Cryptologia 27:2 (April 2003), 186-187. "How Sweden Cracked the Nazi Code," Swedish History, Jan. 22, 2017. Lars Ahlfors and Lennart Carleson, "Arne Beurling In Memoriam," Acta Mathematica 161 (1988), 1-9. John Borland, "Looking Back at Sweden's Super-Code-Cracker," Wired, Aug. 11, 2007. "Arne Carl-August Beurling," MacTutor History of Mathematics Archive (accessed Oct. 8, 2017). "Arne Beurling," Mathematics Genealogy Project (accessed Oct. 8, 2017). "Joins Advanced Study School," New York Times, Oct. 10, 1954. "Arne Beurling," Physics Today, February 2015. Listener mail: "Two Types: The Faces of Britain," BBC Four, Aug. 1, 2017. "Who Are the Mudlarks?", Thames Museum (accessed 10/21/2017). Lara Maiklem, "London's History in Mud: The Woman Collecting What the Thames Washes Up," Guardian, Sept. 14, 2016. Military High Command Department for War Maps and Communications, German Invasion Plans for the British Isles, 1940. This week's lateral thinking puzzle was contributed by listener Carsten Hamann, who sent these corroborating links (warning -- these spoil the puzzle). You can listen using the player above, download this episode directly, or subscribe on iTunes or Google Play Music or via the RSS feed at http://feedpress.me/futilitycloset. Please consider becoming a patron of Futility Closet -- on our Patreon page you can pledge any amount per episode, and we've set up some rewards to help thank you for your support. You can also make a one-time donation on the Support Us page of the Futility Closet website. Many thanks to Doug Ross for the music in this episode. If you have any questions or comments you can reach us at [email protected] Thanks for listening!
Views: 353 Futility Closet
Most Mysterious UNCRACKED Codes And Ciphers Nobody Can Solve!
 
10:41
Check out the Most Mysterious UNCRACKED Codes And Ciphers Nobody Can Solve! From unbreakable riddles to unsolved mysteries, this top 10 list of famous codes and ciphers will amaze you! Subscribe to World5List: http://goo.gl/cpJSA6 Check out our "Superpowers You Can Get RIGHT NOW!" video at: https://youtu.be/a6QmVdBTf0g Check out our "6 Places More Mysterious Than The Bermuda Triangle...?" video at: https://youtu.be/v9VarHk6_cY Check out our "8 Bizarre Things People Found in Their Pool" video at: https://youtu.be/gH7ywvBgXkE 9. The Dorabella Cipher Most people would speculate that codes and ciphers are made solely for the purpose of hiding something from someone else, but the Dorabella Cipher is proof that this is not true. Codes and ciphers are something that intrigues the minds of many, such as 18th century composer Edward Elgar. 8. Somerton Man The year was 1948, off the coast of Somerton Beach near Adelaide, Australia. What should have been a normal day turned into a mystery when a rather well dressed man literally washed up onto the shores of the beach. He was dressed for cold weather, even though the weather itself was pretty hot, and just as odd, there was no identification on the man at all, and when they ran his fingerprints and dental records, there were no matches. 7. The Blitz Ciphers During World War II, a bomb went off near a home in East London. When it did, it damaged the cellar of a house in the area. When the family went to investigate the damage, they found a series of manuscripts that appeared to be from a very ancient time. By this, I mean that the way they were written, as well as the paper they were on, was very old and stylized, and the language that was written wasn't understood by the family members. 6. The D'Agapeyeff Cipher There have been many authors who have written about codes and ciphers in their time, but in 1939, Russian/English cryptographer Alexander D’Agapeyeff dabbled in the subject via his book "Codes and Ciphers". But in a fun twist, he decided to push his readers brains to the limit by creating his OWN cipher and putting it at the back of the book to see if they could figure it out. 5. The Voynich Manuscript The Voynich Manuscript is a codex for lack of a better term. And yet, it's not something we can translate or decipher, but not for lack of trying and analysis. The main reason is because the Voynich Manuscript was both handwritten by the author and is hand-drawn. Usually, it would just take time to decipher the handwriting, but the text itself is written in a language that no one on this Earth currently understands. 4. Kryptos The United States has many covert agencies, one of which is the CIA (Central Intelligence Agency), and right outside the building that houses the CIA is a massive cipher that has remained mostly unsolved since its inception: The Kryptos. 3. The Beale Ciphers In 1885, a man named Thomas Jefferson Beale wrote something into a pamphlet called "The Beale Papers". Specifically, he wrote a story about a great treasure that he had found in the American West, transported to Virginia, and then buried. He then would give the people via the pamphlet a trio of ciphers to crack. Each of which gave a clue and context to the treasure that he was alluding to, and where to find it. 2. D-Day Pigeon There were many codes by all sides in World War II, with the intent to try and confuse the enemy and ensure that their messages weren't intercepted. The problem though, was that the easiest way to deliver the messages, a radio, was also the most dangerous, as the enemy could eavesdrop on them. The way around that was through carrier pigeons, but they too had their own issues. 1. Zodiac Cipher The Zodiac Killer is one of the most infamous people in the history of the world, a case that has puzzled many people for nearly half a century. The identity of the Zodiac is still unknown, but what's just as unknown is the context and meaning of a cipher that he sent to the San Francisco Chronicle back in November of 1969.
Views: 5013 World 5 List
[Hindi] What is Cryptography ? | Kya hai cryptography ? | Explained in simple words
 
05:14
Hello Dosto Aaj hum baat karenge cryptography ke bare me ki ye kya hota hai aur iska itemaal kaise aur kaha hota hai. iska sambandh kisi bhi data ya message ko safely pohchane se hota hai aur uski security badhayi jati hai taaki bich me koi an-adhikarik tarike se usko access na kar paye. aasha karta hoo apko ye video pasand ayegi agar aapko ye video achhi lage to isse like kare aur apne dosto ke sath share kare aur abhi tak aapne mera channel subscribe nahi kia hai to jarur is channel ko subscribe kare. Subscribe to my channel for more videos like this and to support my efforts. Thanks and Love #TechnicalSagar LIKE | COMMENT | SHARE | SUBSCRIBE ---------------------------------------------------------------------------------- For all updates : SUBSCRIBE Us on Technical Sagar : www.youtube.com/technicalsagarindia LIKE us on Facebook https://www.facebook.com/technicalsagarindia Follow us on Twitter : http://www.twitter.com/iamasagar
Views: 94299 Technical Sagar
NSA - Codenames, Capabilities and Countermeasures - Bruce Schneier
 
55:02
NSA: Codenames, Capabilities & Countermeasures - Presentation by Bruce Schneier - ShmooCon 2014. Bruce Schneier is an American cryptographer, computer security professional, privacy specialist and writer. He is the author of several books on general security topics, computer security and cryptography. Bruce Schneier is a fellow at the Berkman Center for Internet & Society at Harvard Law School, a program fellow at the New America Foundation's Open Technology Institute. He has been working for IBM since they acquired Resilient Systems where Schneier was CTO. He is also a contributing writer for The Guardian news organization. In 1994, Schneier published Applied Cryptography, which details the design, use, and implementation of cryptographic algorithms. In 2010 he published Cryptography Engineering, which is focused more on how to use cryptography in real systems and less on its internal design. He has also written books on security for a broader audience. In 2000, Schneier published Secrets and Lies: Digital Security in a Networked World; in 2003, Beyond Fear: Thinking Sensibly About Security in an Uncertain World; in 2012, Liars and Outliers: Enabling the Trust that Society Needs to Thrive; and in 2015, Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World. Schneier writes a freely available monthly Internet newsletter on computer and other security issues, Crypto-Gram, as well as a security weblog, Schneier on Security. The blog focuses on the latest threats, and his own thoughts. The weblog started out as a way to publish essays before they appeared in Crypto-Gram, making it possible for others to comment on them while the stories were still current, but over time the newsletter became a monthly email version of the blog, re-edited and re-organized. Schneier is frequently quoted in the press on computer and other security issues, pointing out flaws in security and cryptographic implementations. Subscribe to this channel - http://www.youtube.com/c/ProperGander Proper Gander on Minds.com - http://www.minds.com/Joelsee Join Minds.com today: https://www.minds.com/register;referrer=Joelsee Proper Gander on Facebook - http://www.facebook.com/aProperGander PayPal Donations welcome. Click here: http://goo.gl/FxXWYQ Bruce Schneier wiki - https://en.wikipedia.org/wiki/Bruce_Schneier NSA Codenames - https://cryptome.org/2014/01/nsa-codenames.htm List of government mass surveillance projects - https://en.wikipedia.org/wiki/List_of_government_mass_surveillance_projects NSA Nicknames and Codewords - http://electrospaces.blogspot.ca/p/nicknames-and-codewords.html The NSA’s weird alphabet soup of code names for secret spy programs and hacker tools - http://www.networkworld.com/article/2289018/security/130199-The-NSA-s-weird-alphabet-soup-of-code-names-for-secret-spy-programs-and-hacker-tools.html Schneier on Security - https://www.schneier.com/cgi-bin/mt/mt-search.cgi?tag=NSA The NSA Is Hoarding Vulnerabilities - https://www.schneier.com/blog/archives/2016/08/the_nsa_is_hoar.html Major NSA/Equation Group Leak - https://www.schneier.com/blog/archives/2016/08/major_nsaequati.html NSA surveillance: A guide to staying secure - https://www.theguardian.com/world/2013/sep/05/nsa-how-to-remain-secure-surveillance The NSA, Snowden, and Surveillance - http://crcs.seas.harvard.edu/event/bruce-schneier-crcs-lunch-seminar Congressional Reps Ask Bruce Schneier To Explain To Them What The NSA Is Doing, Because The NSA Won't Tell Them - https://www.techdirt.com/articles/20140116/13152525907/congressional-reps-ask-bruce-schneier-to-explain-to-them-what-nsa-is-doing-because-nsa-wont-tell-them.shtml Schneier on NSA's encryption defeating efforts: Trust no one - http://www.pcworld.com/article/2048268/schneier-on-nsas-encryption-defeating-efforts-trust-no-one.html Edward Snowden and Bruce Schneier discuss encryption and cyberwar - https://edwardsnowden.com/2015/01/26/edward-snowden-and-bruce-schneier-discuss-encryption-and-cyberwar/ "Undermining the Very Fabric of the Internet": Bruce Schneier on NSA's Secret Online Spying - https://www.democracynow.org/2013/9/6/undermining_the_very_fabric_of_the Schneier: The NSA Is Commandeering the Internet - https://news.slashdot.org/story/13/08/12/1850229/schneier-the-nsa-is-commandeering-the-internet National Security Agency - https://www.nsa.gov/ As always, use this info to gather more info.
Views: 1229 Proper Gander
How the Krack Hack Breaks Wi-Fi Security
 
06:26
To support SciShow and learn more about Brilliant, go to https://brilliant.org/Scishow. After 14 years of going unnoticed, a vulnerability in Wi-Fi security was published last week. It's a serious problem, but it's already in the process of being fixed. We're conducting a survey of our viewers! If you have time, please give us feedback: https://www.surveymonkey.com/r/SciShowSurvey2017 Hosted by: Stefan Chin ---------- Support SciShow by becoming a patron on Patreon: https://www.patreon.com/scishow ---------- Dooblydoo thanks go to the following Patreon supporters: Kevin Bealer, Mark Terrio-Cameron, KatieMarie Magnone, Inerri, D.A. Noe, Charles Southerland, Fatima Iqbal, سلطان الخليفي, Nicholas Smith, Tim Curwick, Scott Satovsky Jr, Philippe von Bergen, Bella Nash, Chris Peters, Patrick D. Ashmore, Piya Shedden, Charles George ---------- Looking for SciShow elsewhere on the internet? Facebook: http://www.facebook.com/scishow Twitter: http://www.twitter.com/scishow Tumblr: http://scishow.tumblr.com Instagram: http://instagram.com/thescishow ---------- Sources: https://www.krackattacks.com/?_ga=2.191235242.1088205245.1508159331-752582413.1498767319 https://papers.mathyvanhoef.com/ccs2017.pdf https://www.youtube.com/watch?v=9M8kVYFhMDw https://www.wired.com/story/krack-wi-fi-wpa2-vulnerability/ https://www.lifewire.com/what-is-wpa2-818352 https://www.techopedia.com/definition/27188/four-way-handshake https://www.wired.com/story/krack-wi-fi-iot-security-broken/ http://smallbusiness.chron.com/s-https-stand-for-64240.html
Views: 367892 SciShow
Secret Codebreakers of World War 1
 
22:00
Secret Codebreakers of World War 1
Views: 587 War Documentaries
Cicada 3301 (All Clues and How They Were Solved)
 
15:07
Want to know more about PGP encryption? Here's the video I used https://www.youtube.com/watch?v=3yN4uMMsK8I Songs: 00:40 song {Halsey - Haunting (Official Instrumental) https://www.youtube.com/watch?v=eT6VVntT8lo Piano cover by cragezy https://www.youtube.com/watch?v=4AxBYR11MG8 As not stated, the video is not entirely accurate (i.e notes shown were drawn up for clearity). Please refrain from pointing out the flaws when the majority of the video is correct. Douche Clues Clue 1: 0:00 Clue 2: 1:22 Clue 3: 1:48 Clue 4: 2:00 Clue 5: 5:50 Clue 6: 6:45 Clue 7: 8:22 Clue 8: 10:11 Clue 9: 11:05 Clue 10: 13:08
Views: 3483244 TheBraveZombies
Lesson 1: History of cryptography and its early stages in Europe (intypedia)
 
11:46
Lesson 1: Alice and Bob are presenting the first subject of the encyclopedia: a walkthrough of the History of Cryptography and its early stages in Europe till World War I. Author: Arturo Ribagorda Garnacho, Carlos III University of Madrid. Script, slideshow and exercises: http://www.intypedia.com/?lang=en An intypedia team video
Views: 11245 UPM
Top 10 Unbreakable Ciphers and Codes — TopTenzNet
 
10:49
Top 10 Unbreakable Ciphers and Codes →Subscribe for new videos every day! http://bit.ly/toptenzsubscribe →10 Reasons Bruce Lee was a Superhuman: http://bit.ly/1Hl4mVu Entertaining and educational top 10 lists from TopTenzNet! Brand new videos 7 days a week! Videos are published at 6pm EST every day! Other TopTenz Videos: Top 10 Historical Unsolved Mysteries http://bit.ly/1RAAE95 In an age where we have satellites that can zoom in to watch an ant pee on a leaf, you’d think our society pretty much knows everything. Even with our high-speed, touchscreen, 3-D, Star Wars projectors, there are still a few ciphers and codes keeping cryptologists (trust us, it’s a word) stumped. Some of them come from way back in the 18th century. Even with the addition of advanced technology, ye ol’ pilgrims are proving that the smartest thing about our society might just be our phones. Text version: http://www.toptenz.net/top-10-unbreakable-ciphers-codes.php Coming up: 10. Dorabella Cipher 9. D’Agapeyeff Cipher 8. Indus Script 7. Chinese Gold Bar Ciphers 6. Zodiac Killer 5. Linear A 4. Proto-Elamite 3. Taman Shud 2. McCormick Cipher 1. Bacon Cipher Source/Other reading: http://www.ciphermysteries.com/the-dorabella-cipher http://nautil.us/issue/6/secret-codes/the-artist-of-the-unbreakable-code http://www.ciphermysteries.com/2013/12/23/dagapeyeff-cipher http://itknowledgeexchange.techtarget.com/security-corner/the-unsolved-dagapeyeff-cipher/ http://www.harappa.com/script/indusscript.pdf http://elonka.com/UnsolvedCodes.html http://books.google.com/books?id=G4gCs-RmVZwC&pg=PA46&lpg=PA46&dq=General+Wang+unsolved+gold+bars&source=bl&ots=vrfYkpCHEz&sig=gwWoVvcHk5qecMsXwuLVmZoYKZU&hl=en&sa=X&ei=XU9_U-HGOtelyATduYDYDg&ved=0CHsQ6AEwBQ#v=onepage&q=General%20Wang%20unsolved%20gold%20bars&f=false http://listverse.com/2007/10/01/top-10-uncracked-codes/ http://www.crimelibrary.com/serial_killers/notorious/zodiac/8.html http://www.zodiologists.com/ http://mysteries24.com/n4-21061-Unsolved_coded_messages http://www.cam.ac.uk/research/news/cracking-the-code-the-decipherment-of-linear-b-60-years-on http://www.ancientscripts.com/elamite.html http://www.historytoday.com/mark-ronan/puzzle-proto-elamite http://www.heraldsun.com.au/news/law-order/portrait-may-hold-key-to-somerton-man-beach-mystery/story-fni0ffnk-1226674957043 http://www.ciphermysteries.com/2009/08/08/the-tamam-shud-cipher-mystery http://www.fbi.gov/news/stories/2011/march/cryptanalysis_032911/cryptanalysis_032911 http://www.riverfronttimes.com/2012-06-14/news/ricky-mccormick-code-mysterious-death-st-louis/ http://www.jstor.org/discover/10.2307/751135?uid=3739256&uid=2129&uid=2&uid=70&uid=4&sid=21103794245461 http://www.bibliotecapleyades.net/ciencia/esp_ciencia_manuscrito06.htm
Views: 86349 TopTenz
Public key cryptography - Diffie-Hellman Key Exchange (full version)
 
08:38
The history behind public key cryptography & the Diffie-Hellman key exchange algorithm. We also have a video on RSA here: https://www.youtube.com/watch?v=wXB-V_Keiu8
Views: 627039 Art of the Problem
Cryptography: The Science of Secrets with Brian Veicht
 
02:54
Brian Veitch discusses the science of secrets and techniques used to encrypt and decrypt secret messages. This video production is brought to you by STEM Read, powered by [email protected] Topics discussed include cryptography, the difference between cryptographers and cryptanalysts, cipher disks, frequency analysis, encryption, decryption, the story of Mary, Queen of Scotts, and modern uses of cryptography. This video was created to support learning and activities related to The Maze Runner, a STEM Read book by James Dashner. Play our game and learn more about cryptography.: http://smartspaceniu.net/cryptography-cracking-the-code/
Views: 688 NIU STEAM
Sunken Gold - The  Story of WWI, Espionage, and the Greatest Treasure Salvage in History
 
01:04:51
On January 25, 1917, HMS Laurentic, a British ship laden with forty-four tons of Allied gold was sunk by German mines off the coast of Ireland. Desperate to recover the treasure, the Admiralty sent its best divers to salvage the gold. Their experiences in the tight confines of the sunken wreck drew the attention of Rear Admiral Reginald "Blinker" Hall, the Head of British Naval Intelligence, who organized the group into the legendary "Tin-openers." These divers, operating in live minefields, plumbed into freshly sunk U-boats searching for codes, ciphers, and other intelligence to assist the codebreaking operations of the mysterious Room 40 and helping to win the war. Joseph A. Williams, author of The Sunken Gold: A Story of World War I, Espionage, and the Greatest Treasure Salvage in History will recount, through newly discovered sources, the epic deeds of these covert divers, bringing to light the grit and determination their project demanded. ------------------------------------------------------------------ Facebook: https://www.facebook.com/IntlSpyMuseum Twitter: https://twitter.com/intlspymuseum SpyCast: https://audioboom.com/channel/spycast
Views: 1920 IntlSpyMuseum
Hitler's Enigma Machine : How Was Cracked Greatest Mysteries of World War 2
 
06:54
Sunday Special: This video dedicated to #Enigma Codes breaker Alan Turing & #cryptography Hello Friends, In this video I will explain that what is nazi's enigma cypher machine? how alan turing cracked enigma code? how enigma machine works? #Hitler #german This video is for educational purpose only.Copyright Disclaimer Under Section 107 of the Copyright Act 1976, allowance is made for "fair use" for purposes such as criticism, comment, news reporting, teaching, scholarship, and research. Fair use is a use permitted by copyright statute that might otherwise be infringing. ▀▄▀▄▀▄ [ Follow Me on ] ▄▀▄▀▄▀ twitter: https://twitter.com/techchipnet facebook: https://facebook.com/techchip website: https://techchip.net Youtube: https://youtube.com/techchipnet Instagram: https://www.instagram.com/techchipnet/
Views: 36576 TechChip