- 7 hours ago
فسيلة - transplant
هي مكتبة رقمية تحتوي علي آلاف الفيديوهات العربية في جميع المجالات
It is a digital library containing thousands of Arabic videos in all fields.
قوائم تشغيل فسيلة
https://www.dailymotion.com/fasela/playlists
هي مكتبة رقمية تحتوي علي آلاف الفيديوهات العربية في جميع المجالات
It is a digital library containing thousands of Arabic videos in all fields.
قوائم تشغيل فسيلة
https://www.dailymotion.com/fasela/playlists
Category
📚
LearningTranscript
00:00Like I told you, sir
00:01This message hasn't been sent yet by the client. (Three units)
00:03This is very serious.
00:05Talat and Hayed were kidnapped on a mission in India two years ago
00:08This is his handwriting
00:09And he also wrote his secret name.
00:11So what does the message say?
00:12A very strange message
00:13We don't understand anything from it.
00:14It's definitely encrypted
00:16It was known that the client, Talt Wahid, was an encryption expert.
00:18Let's not try to undo this paper.
00:20Write this down
00:21One Labneh Zaatar
00:24This means they kidnapped him in Lebanon now.
00:27What's the connection, sir?
00:28Labneh is a Lebanese dish
00:29This is also written between two lines
00:32Zaatar took the sandwich to another place.
00:34This means they have wiped out Lebanon
00:38He said, "Sir"
00:38It also says one finger-sized potato without ketchup
00:41It means I'm safe
00:43Because ketchup means blood
00:44And the sandwich without ketchup
00:46Well, sir, what if it was without authority?
00:49This is an answer you won't like to hear.
00:51Nin Falafel Tahini Bas
00:54It means he was kidnapped and taken to a coastal location by the sea.
00:57Because the song says
00:58We made tahini from the sea
01:00And we wrote on it our names
01:02Bravo to you
01:03She began to understand
01:07any?
01:08One guy is eating extra cheese in a Syrian bread sandwich
01:11Without olives or peppers
01:14What does that mean?
01:15I mean, I need Farid's immediate support.
01:17They have air cover
01:18Okay, sir.
01:19Get a commando unit and divers into this warehouse.
01:22Because they are close to describing him
01:24So what are we going to do about it?
01:25I will send a message to our customers there.
01:27In order to carry out comprehensive volumes
01:29with your permission
01:33Hello
01:36Three lonely
01:37Are you here?
01:38Oh my son, I've arrived from a pill
01:39Did you order the breakfast monkey that you ordered after me or not?
01:41I am hungry
01:42Oh, my river, Sweden
01:44The most important thing is the sandwich my son made, don't forget it.
01:47The thyme took it to another level.
01:49We are God, so we go somewhere else.
02:00What is this?
02:01This is the Da Vinci Code project.
02:03And it was turned into a razor blade
02:04Hussein Mashahdi Al-Jamil
02:04I'm watching you, I'm at your service, and we'll go anywhere.
02:06Sit down
02:07Enough mental effort we put in
02:08It's you, not a lack of uniqueness.
02:09Our topic today, my dear
02:10Not searching for treasure
02:11But
02:12encryption
02:12The scenes, my dear, are from the beginning of civilization.
02:14They needed to exchange messages.
02:15secretly
02:16A precedent in the fight against enmity
02:17Or in internal conspiracies
02:19Even in love and romance
02:20And you were my dear little
02:21I used to love watching spy series.
02:23Try writing a letter
02:24For female colleagues
02:25I mean, the ones I admire and stuff are
02:26Through invisible ink
02:27Which is the famous lemon pot
02:29The matter was finally over.
02:29The house takes the paper
02:30You can't read what's in it
02:31My mom made me laugh because the lemons in the fridge were all gone.
02:33And he stayed because he was working, so he didn't face any consequences.
02:34The iron is next to the lemon.
02:35I see everything inside me
02:36A very embarrassing situation
02:37Okay, my dear, the method of writing with lemons
02:39It needs good heat.
02:40A very old method
02:41This is one of the simplest ways
02:42Sending messages without even encryption
02:44But of course
02:44These methods get caught
02:45Inspection methods are evolving
02:47You need the papers
02:47But nobody understands what's written in it.
02:49The famous Moor
02:50Redout
02:50The one nicknamed "Father of History"
02:51He tells us about a legend
02:52Legend of a Greek ruler named
02:54Astyacos
02:54This man, my dear
02:55He is placed under house arrest
02:57In his palace
02:58Force
02:58His arrival in his palace
02:59This man
02:59He needs to
03:00He sends a secret message
03:01He is in his palace
03:02A message to his followers about the revolution
03:04So they could come and take him out
03:05So he decided to bring the most trustworthy servant he had.
03:07And he shaved his head
03:08The one who shaves, Abu Hamou, is hiding hope
03:09She gave him a haircut, and he shaved his head.
03:10So that he can make his scalp
03:12He can write the message on it
03:13He gives everything he wants to his followers
03:15And he leaves this servant beside him
03:16His hair grows longer in the drunken stupor.
03:17The hair grows long and droops down the scalp.
03:19So the message became hidden.
03:20My dear friend, if I were the faithful servant
03:23The man will remain imprisoned until Judgment Day.
03:24He will remain on the side
03:25Waiting for a message that's been hidden for 30 years
03:27This is a way to find messages
03:29Its purpose is to ensure the enemy doesn't find a message with you at all.
03:31The slave was standing in front of the horse, a bean
03:33Maharish, of course, is the slave who digs something on his head
03:35He said, meaning he doesn't have a tongue to speak to them.
03:37After he leaves
03:37There is no preservation option, but it can be engraved.
03:39Come on, Herodotus, the father of history, what did he bring?
03:41Humans, my friend, look for new ways
03:43I feel that even if the enemy gets hold of the message
03:45He doesn't know what's in it.
03:45I don't understand her
03:46One of these methods was used by the Greeks in their wars.
03:48The method relied on changing the order of the letters in the message.
03:51Without changing the letters themselves
03:53This is done using a specific, old device that is available at the sender and receiver.
03:58Its name is Cetyl
03:59This device is a portable cylinder with a certain range.
04:02You can put the paper or leather with the message written on it around it.
04:05In a certain way and manner
04:06The message is written on the tied leather.
04:08After you unpack the answer from the cylinder
04:10Wars are launched completely and remain incomprehensible.
04:12There are no letters next to each other that are the same word.
04:14You will write the message directly on the tablet.
04:16Not on the leather belt
04:17But when you unbuckle the belt, you'll find that the words make no sense.
04:20Look, my dear, at the picture in front of him, for example
04:21If you choose to display the message, it will be written.
04:23Meet us at the park today.
04:25But if you're tall after unbuckle the belt
04:28The message will be "My dear"
04:29Misti, you're a person
04:30The message, dear one, is for those who type when their elbow falls on the keyboard.
04:32A completely incomprehensible need
04:34No one can translate it except the receiving party.
04:36And with the same stagnant water
04:37Here, the belt fastener must be tied in the same way.
04:39So that she would understand the message
04:40This method, my friend, is called Transposition Savers.
04:43Or encryption after arrangement
04:45This is a general name for a group of methods that rely on this technique.
04:48And of course, this technique doesn't necessarily require using the Greek styluse I told you about.
04:51That's right, my dear. What I told you is more advanced than you writing on the back of the neck of the first poets.
04:56But still, my dear, the matter is not yet settled.
04:58The small message can be solved with a little trial and error.
05:00You find a few letters together that form a word and translate it
05:03And yes, a long and complex message might be a little more difficult.
05:06But you still want to dismantle it
05:07No, we need a better encryption method now.
05:11Come here, my dear, let me take your hand and we'll go a few steps ahead.
05:13We reach the Roman Empire
05:15Let me introduce you to one of the most famous and oldest encryption methods.
05:18Caesar's Code Caesar Cipher
05:20This, my dear, is a very simple code to crack.
05:22We will replace every letter in the message with a completely different letter.
05:24A letter followed by a fixed number of letters of the alphabet
05:27I'll give you an example so we can understand each other.
05:28This constant number is the key
05:30The sender and receiver must agree with us.
05:32Let's see how many letters we'll use to describe your situation.
05:34If you have, for example, a message saying
05:35Attack on Nine, I'll be back at nine o'clock
05:37And we want to give it the Caesar Code, to encrypt it.
05:39For example, we'll agree that our code key is five.
05:42And we have the English alphabet in front of us.
05:43We all know it by heart
05:44We'll go to the letter "A" which is the first letter in the message.
05:47If you moved five steps after him in the alphabet
05:49You will find AF
05:50We'll change the first letter of the message we want to convey here.
05:52For the code which is F
05:54And so on and so forth
05:55Each craft has five steps after it.
05:57And that's the clear, clever message.
05:59Which is Attack on Nine
06:00It will turn into this password that no one understands in front of you
06:03Yes
06:03Please keep the message away from me and don't send it to anyone.
06:05It's nicer to say his hair is now his own decision.
06:06He goes and starts talking into the microphone
06:08The words will remain meaningless.
06:10As long as no one knows the code key
06:12Other than the sender and the receiver
06:14Abu Ahmed, please
06:14Please, Abu Ahmed
06:15I don't want you to underestimate my intelligence.
06:17This is a very easy code
06:18How many letters are in this English alphabet?
06:20It will contain about 20 or 21 letters
06:2226 Aziz
06:23Whatever it is, Abu Ahmed, you understand the idea.
06:2426 letters
06:25That means 25 possible keys
06:27I can try all the keys
06:29I deciphered the message through my own efforts.
06:30With patience and solace
06:31any?
06:31I will learn through patience and solace.
06:33What is the cellulose?
06:34Patience and solace
06:35Indeed, my dear, there is much truth in what you say.
06:38That's why, despite what history has mentioned
06:39Julius Caesar was targeting this code
06:41In a military or personal message and question
06:43But to be very honest
06:44A weak and easily broken blade
06:46Especially if the enemy knows that you are using this code
06:48The only thing he dropped was the key.
06:50Of course, my dear, I don't need to tell you about privacy.
06:52At the court of Julius Caesar
06:53My beloved used to sit on Brutus's thigh
06:55He tells him everything
06:56And the rest is your skill, good at it.
06:57He wasn't careful at all.
06:59And here, my dear, let me tell you about the solution to this problem.
07:01What do you think about making a small adjustment?
07:02Instead of agreeing on a key
07:03Which, as I told you, is a number
07:05Which is about pronouncing how many letters
07:06Let's work together on a large schedule
07:08Similar to mapping each letter
07:10We assign each letter to another letter randomly.
07:12I feel like whoever caught the number didn't catch the one after it.
07:14He drove his mother crazy
07:15We won't stick to the same order, nor will we make the same leap.
07:18For example, look at this table which says the following
07:20A equals Z
07:20B is equal to C
07:22C remained Q
07:23And so on, each letter takes the place of its counterpart.
07:25Here, the key to the code is no longer just a number.
07:27This is now a complete schedule.
07:29Praise be to God
07:30Thank God, your voice still isn't solving the problem.
07:32This method is in its presentation
07:33Rosh
07:33But when we take it to the ground, the reality
07:35You'll find that it has obvious problems.
07:36Rafo, my dear
07:37Wow, you're a genius at encryption!
07:39This method, my dear, does indeed have a problem.
07:40Because you need to use it
07:41You need to transfer your own key.
07:44For those who will use it
07:45The key is all this
07:46Without him touching your enemy's hand
07:48Oh, my joy!
07:48At least in numbers
07:49It was an easy topic
07:50The man will tell you six
07:51He'll understand six at once
07:52A simple, easy number that I can memorize and it works
07:54When he schedules every letter, he does it at your brother's house.
07:56This is for someone who will memorize it
07:57And if you get caught with him
07:58There will be suspicion
07:58There's another problem with that.
07:59Assuming you were able to memorize the table
08:01Or knew his movements
08:02Does that mean you are safe and your message is saved?
08:04Honestly, my dear, the answer is no.
08:05And to know the answer is no
08:06Let her jump with your time from Qarm
08:08Open your basin
08:09He spoke about the Abbasid Caliphate in Baghdad
08:10In what is known as the Golden Age of Islam
08:12Many Muslim scholars at this time
08:14They were engaged in the linguistic analysis of the Holy Quran.
08:17And after them, my dear, focus on analyzing the pattern of letter repetition in the Quran.
08:20In the Qur'an in particular
08:22In the Arabic language in general
08:25One of the international scientists, my dear, was named
08:27Abu Yusuf Yaqub ibn Ishaq al-Kindi
08:30This man, my dear, is no ordinary man.
08:33The Canadian, my dear, is credited with the science of statistical analysis of letter frequency.
08:37A treatise on extracting the gematria
08:39The word "ma'ma" here means encrypted.
08:41Dear Canadian, he was laying the groundwork for the statistical analysis process in one of the sections of this book.
08:45When he said, in essence, that if you knew the message of the base language and had the encrypted message
08:50Often the most frequently occurring letter in the encrypted message
08:53It is the most frequently repeated letter in the original language.
08:56And the second most frequently occurring letter in the encrypted message
08:59It's also possible that it's the most frequently repeated letter in the original language.
09:03And so, you can use this information and decipher the code.
09:07Graffi, my dear, the one in front of you, for example
09:09It describes the frequency of each letter of the English alphabet in English texts.
09:13It's very clear that the most frequent word from my dear friend is "A".
09:16You are a stranger to his tent if you think
09:17After that, my dear, he'll be lost.
09:19And after them, what?
09:19And so and so and so on
09:21From most used to least used in the language
09:23If you, my dear, have a long message coming to you from the enemy
09:25Written in Caesar cipher or even a little faster
09:28So here you can use Kanamil Jundi
09:30The most frequently occurring letter in the original language is supposed to be
09:32The most frequently occurring letter in the message remains
09:34For example, I found the entire encryption to be L
09:36All L
09:37You know that L D is often A
09:39for him?
09:40Because the most common letter in the English alphabet is A
09:42It is found in many, many words
09:43So difficult
09:44Sa3b statistically means that I remain the opposite in this code
09:47You see, my dear, this will help you at least break off parts of the code.
09:50Because you, my dear, will see the simplicity
09:52The most frequently occurring letter in the code
09:53L
09:54What can we replace it with?
09:55Because the most frequently occurring letter in the code
09:56Let it be for example
09:57sections
09:58So what will we replace it with?
09:59If you think about the English language
10:00With what?
10:01We'll see which letter is the most frequently used in the code.
10:03Let it be for example
10:04With what?
10:04What can we replace it with?
10:06Because we know in English that these are the normal letter ratios in words
10:11In the case of the Arabic language, for example, the most frequently used letter is Alif.
10:13So, I found that the most frequently used letter in the encrypted message is the letter "T," for example.
10:17Instead of every "taa" you replace with an "alif"
10:19And he tried to cultivate the sitting area.
10:20Abu Hamad, what you're saying is a way to crack the code.
10:23I, as someone, now want to remove the code
10:25How do I manipulate frequency analysis and the Alexandrian blood of the Fashnishi?
10:28Dear, please do some stretching and widen your pelvis a little.
10:31There are some horns
10:32We'll get to our uncle, the Frenchman Vinier.
10:34Venier, my dear, someone think a little about the frequency analysis.
10:37Nor is the reason for his success in breaking the codes
10:39It's always the same letter in the original message.
10:41It changes to the same letter in the encrypted message.
10:44What does it mean if you're always converting W?
10:45What will remain on "Toot" until it changes to "W" for the length of the message?
10:48The message will be revealed to you as soon as you understand the statistics.
10:52I'm sitting here thinking
10:53How can I make a single letter
10:55What is in the original message
10:57It transforms into different characters in the encrypted message.
10:59I'm not trying to hide the letter "A" in the message.
11:01I want to make the image melt in several pictures.
11:03And he came up with a brilliant idea, my dear.
11:05He created this table in front of you.
11:07Doss Pos
11:07The schedule you see in front of you, my dear, is fixed and known, and there's no secrecy involved.
11:10Each row in the table contains all the letters of the English alphabet.
11:13And each row is separate from the one in it.
11:16In the form you see in front of you
11:17Each line, my dear, begins with the letter that follows it.
11:20In the first one ABCD
11:21Second one BCDE
11:23Third one CDEF
11:24And so and so and so on
11:26Your uncle Faniri told you, "Look, uncle, you want to send a coded and encrypted message."
11:30Make an agreement with the person who will receive the message on a specific, short secret key.
11:34English word
11:35Let's take, for example, the word "Bomboz" in front of you.
11:38Then look at the message you want to send.
11:40Repeat this key underneath it.
11:41Until the message is finished
11:43Look ahead
11:43Met Mia Park
11:45It means dead park
11:46Now listen carefully, my dear, so you can focus on her because there are a few things going on.
11:49But it's nice
11:49It's great because you can send your girlfriend a message without anyone knowing.
11:55Now, my dear, our word is "bumbooz"
11:57For example, if we wanted to send a message saying "Mite Miyah Park Qabil Mi in the garden"
12:02You will place your key under each letter repeatedly.
12:06As you can see it
12:06Please press the gear icon in the key below the message until your message is finished.
12:10That's nice, my dear
12:10Now, every letter of the original message
12:12You will replace it with a letter from the table.
12:15What is it?
12:16intersection
12:17The one who has a craft from a message and a craft from a pomodoro
12:20Oh son of a bitch
12:21regulator, you planned it well and implemented it well, Vanier.
12:24Come on, my dear, let's go to the schedule and understand it better.
12:26We have just written the message
12:27And you need the key
12:28We will look for the intersection between the vertical and the horizontal.
12:31The column containing the letter of the message
12:33And the row that contains the key letter
12:36This is it
12:36For example, my dear, if the first letter of the message is M
12:38The first letter of the key is B
12:40You'll go to the schedule
12:41Head M, Horizon B
12:42The letter here is A
12:43N
12:44The Kata'a
12:44Okay, my dear, now
12:45Second letter of the message
12:46E
12:47And the second letter of the key here
12:48A
12:48E remains
12:49It slips off just like it did from above.
12:50A corresponds to
12:51The letter appears
12:52Also E
12:52normal
12:53No problem
12:54As stated in the message
12:54No problem
12:55Who told the news?
12:55We play
12:56Don't be afraid, my dear
12:57On the third letter of your message
12:58Which is
12:59E
12:59It's equivalent to a bomb
13:00What's our key?
13:01The M
13:02Look at column E
13:03Description of M
13:04Q will appear
13:05I see here, my dear
13:06No letter will be repeated.
13:07In the same way
13:08Because of the Canadian people
13:09They don't expose us
13:10The letter E
13:11He appeared in the film
13:12Badourin bin Al-Say'ah
13:13Once, his code remained
13:14Yes, the descent is as it is.
13:15And once its code remained Q
13:16Oh world
13:17He will give me a different look
13:18That's all, my dear.
13:19We're done
13:20We succeeded in Dashmalah
13:21The Tunisian team
13:22Excuse me, Abbasid state
13:25And no one will see the most frequently repeated letter
13:26In the encrypted message
13:27It is known that he is A
13:28Because the letter will be repeated the most
13:30In the encrypted message
13:31It will be repeated completely randomly
13:32And he won't be acting
13:33It does not represent any significance
13:35You'll see the end, my dear.
13:36It will look like this
13:37100 million bars
13:38If you put a key in her mouth
13:39Look at the word in front of you
13:41Translate if you know
13:41My dear
13:42Not just the letter E
13:52The commotion, back and forth
13:53There is no recurring pattern
13:54Neither in the message nor in the code
13:56Thank God, Abu Ahmed
13:57We have now reached the encryption process.
13:59Excellent
14:00I can forgive like that
14:01I'll leave you with a clear conscience.
14:03I am releasing Shady Habashi
14:04With a cup of tea
14:04But his brain got tired
14:06Dear viewers
14:06Since you know the code
14:08The living don't respond
14:09Look at you, my dear
14:10This is the way, my dear.
14:12Yes, it's a bit difficult.
14:13On the people
14:15And you know how to count the blades from under their eyes
14:17But not completely
14:19Open your borders again and prepare for the third historic event.
14:22Oh, Hamad, you're developing women
14:23What's wrong with you, uncle?
14:24What your uncle's evolution is taking me from the past, from the spirit of the ages.
14:26God
14:26Oh, the topic of speculative writing and basins
14:28And these strange ways
14:29Dear, I am the one who designed the Wasba
14:31Act now
14:31Now, my dear
14:32We're going to be centuries ahead.
14:33Until we reach the world
14:34From the English of Charles Babinch
14:36Charles, you are my destiny, my dear
14:37The weakness of the Venere code
14:38It is that the key is repeated
14:40Anyone who has this paper
14:42He stopped talking with a pouting face.
14:43Hippopoz who wrote the code
14:45With a little effort, he can handle it.
14:46Especially if the encrypted message is long
14:48You can deduce the length of the key
14:50Because when you write a long message with the same key
14:53The patterns will start to appear
14:55And the patterns repeat
14:56You are dear
14:57When you catch the pattern
14:58You will deduce the length of the key
14:59Even if you don't deduce the key itself
15:01And here, my dear
15:02Now let's move on to the second intellectual idea.
15:03If, for example, I have a long message
15:05I learned that the key length is 6 letters
15:07If you have a long message
15:09long message
15:09This long message
15:10You notice every now and then
15:12There are certain letters that are repeated
15:14Or a group of letters that are repeated several times
15:16You'll notice that it happens every now and then.
15:19Here you can grasp something very important
15:21You can measure the distance
15:22Between these repetitions and each other
15:24You can then guess the length of the key.
15:27How much?
15:27Okay, Abu Ahmed
15:28And when I catch the key, how long is the code?
15:30How do I get it?
15:31There are 26 letters in the English alphabet.
15:34I'll keep changing
15:35Come here, my dear
15:36Here you have deduced the length of the key
15:37But you still don't have the key itself.
15:39Don't underestimate the length of the key.
15:41This is not a small thing
15:41Here, my dear, let me guide you to the second brilliant idea.
15:44For example, if I have a long rope
15:45I learned that the key length was six letters.
15:47Our Masal
15:48Bumbuz
15:48The distance between the first of the two
15:50The second one has six
15:51And of course, my dear, you'll find the key repeating itself again.
15:53That's not what it means here, my dear.
15:55The first and seventh letters
15:56And the thirteenth and nineteenth
15:59And so on and so forth
16:00They are all encoded using the same row in the table.
16:03That means they all consider it that way.
16:05Encrypted with the Caesar cipher
16:07To replace the letter
16:08Here we can perform frequency analysis on them
16:10The Canadian method
16:12Let's see more recurring wars
16:14And that, my dear, is how we get the first letter of the key.
16:18And in the same way, my dear
16:19The second letter is the eighth letter.
16:21It is the fourteenth
16:22And so on and so forth
16:23With key length
16:24We found out about six of them
16:26We will perform frequency analysis on them.
16:27Like I told you
16:27And we grasp the second letter of the key
16:29And so on, to the point where we can deduce
16:31All six letters
16:32And whoever holds the key to the code
16:33Knows beyond the code
16:35But Abu Ahmed, I have an idea
16:36We can make a long key
16:38The size of the entire message
16:39So that no one catches me transporting Nat
16:41Of course, my dear.
16:42But you can also keep your email password
16:44First page of the book "The Character of Egypt"
16:46But remember
16:47Jasmine finger
16:48The key is supposed to remain simple
16:50So that people can memorize
16:51To make it easy to transport
16:52And anyway, brothers, if you have a safe method
16:53It has a long, strong key.
16:55Why don't you just tell the man the message and be done with it?
16:56Why do we need to encrypt it?
16:57Also, my dear
16:58In the military operation
16:59Correspondence needs to be extra secure.
17:01These keys can be changed continuously.
17:03For example, the two pens were changing their encryption keys.
17:05Once every day in the Second General War
17:07Because even if the allies manage to decipher Leho's messages from today
17:10They don't open messages tomorrow, the day after tomorrow, or the day before yesterday.
17:12Did you find the code key?
17:14Well, we changed you to a different color.
17:15Dear Rami, I'm telling you this, Lana.
17:16But let's leave it at that, you said Baloot Toast or a lot of hashish
17:18Akshli Akshli Akshli
17:19Allies in the Second World War
17:21They found a way to crack the German code every day.
17:25Our country is in our hearts, from Shallah
17:29But of course, my dear, this story needs a completely different episode.
17:32Encryption, my dear, and decryption, as you can see.
17:35A long history and struggle from people who want to filter messages
17:38And the people who want to undo it
17:39And the people in the middle who want to know things they shouldn't know
17:41The conflict continues to this day.
17:42But for now, my dear, mathematical encryption methods haven't just evolved
17:45no
17:46Encryption and decryption tools have also evolved.
17:49People used to write letters by hand and unwrite them by hand.
17:52They started using mechanical computers a little later.
17:54From the neutrality of this room
17:55And then digital computers
17:57And I, my dear, let me take you to the very last leap forward
17:59Digital encryption
18:001997, the American National Institute
18:03Standards and Technology
18:04Organizing a competition among cryptography specialists
18:07The goal of the competition is to reach the encryption algorithm.
18:09The institute relies on him as
18:11The Advanced Encryption Standard
18:13AES
18:15So we can see, my dear, after many tests
18:16The Belgians win
18:18Joan Demin and Vincent Rigmel
18:19And the one who invented them, my dear, is AES.
18:22Up to this point, you can consider
18:24Their encryption method is completely secure.
18:26And so far, my dear, no one has broken it repeatedly.
18:28Unless this key is faulty
18:30That's your problem, you solve it.
18:31Everyone should pay attention to their own code key.
18:32G is a strange man
18:33What's wrong with you?
18:34I told you to show me your code key
18:36I'll take you to Mama
18:37Will you listen to him?
18:38Tell him
18:38Mom told me
18:39Don't show your code key to anyone
18:41You might think, my dear, that encryption was something from the days of espionage.
18:44World Wars
18:45And these municipal wars
18:46But encryption is used very sparingly in our modern world today.
18:49For example, encrypting your data on the hard drive
18:51Encrypting data transmitted over the internet
18:53From books on using encryption, you'll find the same processor.
18:56Which is the hardware itself
18:57It contains specially designed electrical circuits
18:59To perform the encryption process very quickly
19:02This algorithm, my dear, is considered safe so far.
19:04With the defeat of ES
19:05My dear, life is perfect, even though everything is a dream and beautiful.
19:09But the scientists, as you say, my dear, are a little afraid.
19:12You still see God, Abu Ahmad
19:13My dear, you don't know scientists; they're always afraid of the future.
19:15And their readers respond with questions
19:17Thank God they're like this, so we can be more careful.
19:19My dear friend, scientists are very afraid of quantum computers.
19:22Quantum computers
19:23They believe that if quantum computers emerge
19:25It's possible to break the codes
19:26And this, my friend, is one of the things that terrifies Bitcoin and Ethereum users.
19:29Quantum Computer
19:30When Google first launched its chip, Bitcoin's price dropped.
19:33Because they are cryptocurrencies
19:35When the Quantum Computer comes
19:37Our Lord has made a secret regarding cryptocurrencies.
19:38There's some concern about this area.
19:40That's what I'm trying to tell her
19:40Up until now, my dear
19:41There are no alarming developments in the world of Quantum Computers.
19:44For the group of countries
19:45For the community, encryption generally means
19:47Up until now
19:48As far as I understand, AES is still being saved to a specific location.
19:50The AES encryption incorporates many of the historical concepts we've discussed.
19:54Its problems, defects and solutions
19:56And by integrating them into a series of successive steps
19:59Also, my dear
19:59AES is used in the computer world
20:01Which is the world of Binary Numbers
20:03And there are all wars, with their transformation into weapons.
20:05So you know how to deal with it
20:06For example, one of the Standards for this conversion
20:08Its name is ASCII
20:09ASCII Code
20:10The table in front of you tells you, for example
20:11If you want to express the letter A Capital
20:13You need to use the binary code of number 65.
20:16Which is 0100001
20:20It feels like a distinctive slice
20:21Okay, if you want AES Small
20:22This is a completely different number.
20:23His binary number is 97
20:24And so it remained, my dear.
20:25For all symbols and letters
20:27In all the world's languages
20:28ASCII represents each character with 8 bits.
20:30Which means 1 byte
20:32But of course, that's not enough for all the world's languages.
20:34That's why, my dear, we have other standard codes besides ASCII.
20:36But let's deal with it since we're trying to understand.
20:39Simply put, my dear
20:39We want any encryption system that possesses two key properties.
20:42confusion and diffusion
20:43confusion, my dear, simply means
20:45We want to establish a relationship between the encrypted text
20:48And the encryption key
20:50A relationship as complicated as possible
20:52If someone just changed the key in their house
20:54We don't want to change just one house.
20:55In the encrypted text that we will extract
20:57No, we want a lot of things to change in it.
20:59We want to disfigure his mother
21:00Her second blindness, my dear
21:01We have diffusion
21:02This, my dear, strengthens the relationship.
21:04Between the original text and the encrypted text
21:06Not the key
21:07And its purpose is also
21:08It makes this relationship a complicated one.
21:11The one we will take in the original text
21:13When the features change, the coded text becomes blurred.
21:16He doesn't want to know
21:17I don't want a small, clumsy one
21:18And the code warms you
21:19In decline, my dear Tammy
21:20Diffusion occurs when the relationship becomes complicated.
21:22Between the original text and the encrypted text
21:24confusion and diffusion
21:26The complex steps of the AES algorithm
21:28It is specifically designed to achieve these two qualities.
21:31In addition to a few other things
21:32Before you get up and run around thinking that we've finally reached the perfect code
21:36Let me finish
21:37AES, my friend, still has a weakness.
21:39The same weakness that existed in many methods before it.
21:43How do I send the key?
21:44AES is powerful, my friend.
21:46But assuming they both have the same key
21:49But remember, my dear, that you have your vast wealth in Bonux and speed
21:53Your sensitive data is tracked via the internet
21:55And I don't want anyone to steal your data and take your huge photos
21:58Even if you encrypt everything with AES
22:00This is pointless if you can't send the key securely.
22:03My dear, this is a problem affecting an entire family of encryption methods.
22:07It's called Symmetric Key Encryption Algorithms
22:10This, my dear, requires the same key to be present on both sides.
22:13Here, my friend, the solution is for our key to be set to Public.
22:16We'll tell people, guys
22:18Our key, which is usually hidden and concealed and not visible, is now public in front of people.
22:24Now show us how you're going to crack the code.
22:25If you feel, my dear, that I'm joking, how does one proceed with their Public Key?
22:29Let me explain to you what I believe
22:30Let me introduce you, my dear, to another family of cryptography families.
22:33The name of the encryption algorithm
22:35Asymmetric Key Encryption Algorithms
22:38And the most famous one of them, my dear, is RSA Algorithms
22:41The idea, my dear, in short, is as follows:
22:43Each one will have two keys, the first one
22:45Public Key, this is from people and the other
22:46Public Key
22:47Public Key: This should be published on the internet.
22:49Put it in the death section as you please
22:51This is like trying to access your account.
22:53Your Instagram account
22:54Anyone who wants to send me a message should encrypt it using the public key.
22:58This is a code, so stay away.
23:00Oh, Nahrious, oh, Bahmad, well, this way the enemies can see it and know about it.
23:03Hello dear, but still
23:04Nobody will break the code
23:05Your code can only be broken with your own private key.
23:09And you're not supposed to be a model for anyone.
23:12And I don't understand anything.
23:13My dear Babylon, this key only knows how to encrypt.
23:16He just doesn't know how to decipher the code.
23:18That's why, my dear, it's called the Symmetry Key.
23:20One encrypts, one decrypts
23:22Double-Blooded Blade
23:23If you, my dear, want to send a message to one of your friends
23:25You'll tell him to send you your key fob.
23:26He'll send it to you
23:27You say, "Encrypted, what message do you want to send him?"
23:30And he followed him in the world as usual
23:31What a mess
23:32He discovered it, and no one else can decipher this code.
23:36With this Public Key
23:37Change the private key he has
23:39In other words, the whole world reads it.
23:41But he's the only one who understands it with his private key.
23:45And please don't take offense at the question.
23:46But what is the scientific basis for what you're saying?
23:48And in it, my dear, are other things besides mathematics.
23:51And please don't take offense, honestly
23:52And you're explaining it like that?
23:53I'm a little cat, my dear.
23:54I understood, he went to the chat room and asked a question.
23:57Latwa tells me that this R-S system
23:58It evolved primarily before the A-S
24:00And it was also developed years before it
24:02So why don't they use it?
24:03And I use A-S
24:04No, my dear, the answer to this question
24:06This will be the last thing in this episode.
24:08The reason, my dear, is that A-E-S is very fast.
24:11Very, very, very fast
24:12You know how to use it to encrypt a huge amount of data.
24:16Very quickly
24:16While the R-S-A isn't at that same super-fast speed
24:18Strongly suited to specific needs
24:20For example, he transfers the A-E-S key
24:22But he won't be forgetful of anything.
24:24To encrypt huge amounts of data
24:26Especially if it is on a large scale
24:29Here, my dear, so that your brain doesn't explode from me.
24:30We'll reach the end of the episode.
24:32Our episode that talks about the long conflict
24:34Among the people who vote for the codes
24:35And the people who are trying to unravel it
24:37A conflict involving intelligence, philosophy, and religion
24:39In games after a long time
24:41A conflict in which mathematics intervened
24:42Until we decided that she would continue it alone
24:44The struggle over codes is very important in engineering, industry, and politics.
24:48In economics, and in the management of wars, armies, and bloodshed.
24:51My dear, it's a journey that spans thousands of years.
24:53And it's not over yet
24:54It's still working at this moment.
24:56And it will continue to work
24:57Encrypt something, my dear.
24:59Eternal as long as humanity exists
25:00Why, my dear?
25:01Because simply put, humans always have secrets.
25:03That's all, my dear brother, and that's it, my brother.
25:05Don't look at the previous case.
25:06See the next case
25:06Forget to look at the sources
25:07We're on YouTube, subscribe to the channel
25:08You know, my dear, one of the most amazing codes
25:10What I've seen in my life
25:11The code he used in the October War
25:13When they decided that we would speak to the Israelis in the Nubian language
25:16Unwritten language
25:17The Egyptians are spending their time in talks
25:19And there's an Israeli officer pulling his hair.
25:20Eyo Shmandora from Paradise
25:21Baher is defiling and defiling paradise
25:23Sajri Malaha wa Aina
25:24Produced by her and our awareness
25:25This, my dear, was not Alent Yorig
25:27This is Mohamed Mounir
25:27And don't open it unless you're doing this