In: Computer Science
1) Cryptography and power of randomness:
This video tries to explain the what cryptography is in layman terms. Encrytion is not actually new. It was used as old as 1 BC, but it was weak. During ceaser cipher it was just a simple transposition. Hence, it was easily breakable. So, the mordern machines have to be stronger and better. The basic concept is it should be easy to create but hard todestroy, just like the prime factorization. If the factors are known, we can easily multipy them to find the product but factorizing the prodiuct is difficult. Though there are random number genrators , they are not actually random, they follow some pattern. We should understand that cryptography is the basic pillar of security and privacy.
2) Science of making and breaking codes:
The important things of interest are the cipher and key. If key is know we can decipher the text. One, should always remember that nothing is practically unbreakable, when given time and resources we can break it. One should understand that there are certain patterns that exist which make the algorithm weak and using which one can crack into it. Generally, it is considered that the longer the cipher is the easier it is to break it because, we get to see more patterns. There, are 2 basic types of classifications, mono alphabetic where each letter is substituted by exactly only one letter and poly alphabetic where it can be replaced by many letter, though better than mono it's still not fail proof. The enigma machine is a classic exampe of this. So, there is better alterantive known as the one time pad encryption where key is destroyed after the first use, but practically it is difficult to do this always. It should also be noted that when billions of operations can be performed in seconds. Even Brute force becomes a likely possibilty.
3) CIA'S Unsolved Secret Code:
The two basic concepts of cryptogrphy are covered here, namely transposition and substitution. Though these are very basic and adding and mutiplying one with other creates enough complexity to the given problem. It should be noted that the difficulty is only for the person who is not intended to listen to it. The intended parties can always easily understand it because they have already agreed upon a mutual key. In english it should be noted that in almost any text there are certain pattterns on the frequencies of the letters. So, anything can be broken if complete information is available to us in the plain sight. So, here another important concept explained is the concept of concealment, even if very tiny part of the entire information is concealed the problem becomes exponentially difficult.