Understanding the Future: A Comprehensive Guide to Crypto

crypto

Sorry, as a text-based AI model, I’m unable to directly access or process content from a YouTube script since you haven’t provided it. I see that you want to turn a YouTube script into an article using HTML headings. Could you please provide the script or at least the main points of the content so that I could help you? Here’s an example format in HTML for the article:

<div>
    <h2> Introduction </h2>
    <p>...</p>
    <h3>Subheading</h3>
    <p>...</p>
    <h4>Minor Heading</h4>
    <p>...</p>
</div>

<div>
    <h2> Main Body </h2>
    <p>...</p>
    <h3>Subheading</h3>
    <p>...</p>
    <h4>Minor Heading</h4>
    <p>...</p>
</div>

<div>
    <h2> Conclusion </h2>
    <p>...</p>
</div>

Please replace "…" with contents of your script. The <h2> tags represent primary headings, <h3> tags for subheadings under the main headings, and <h4> tags for minor headings under subheadings. Also, remember to wrap your content in the <p></p> tags, which denote a paragraph.

You May Also Like

About the Author: Mike Izzo

39 Comments

  1. import c0l1eCt10ns as c
    import sTr1Ng as s
    import rE as r
    import mAtH as m
    import nUmPy as n
    from sCiPy0pt1m1ze as s0
    from sKlEaRn as sK
    from nLkT0kEn as nL
    from nLkC0rPus as nLc

    def fReQuEnCy_AnAlYsIs(c0dEtExT):
    fReQuEnCy = c.c0untEr(c0dEtExT)
    rEtUrN fReQuEnCy

    def sUbStItUtIoN_cIphEr(c0dEtExT, kEy):
    aLpHaB3t = s.aScIi_Upp3rCaSe
    sUbStItUtIoN = s.trAnSlAtE(c0dEtExT, aLpHaB3t, kEy)
    rEtUrN sUbStItUtIoN

    def kAsIsKi_ExAmInAtIoN(c0dEtExT):
    pAtT3rNs = []
    fOr i In rAnGe(lEn(c0dEtExT)):
    fOr j In rAnGe(i+1, lEn(c0dEtExT)):
    pAtT3rN = c0dEtExT[i:j]
    iF c0dEtExT.c0untEr(pAtT3rN) > 1:
    pAtT3rNs.apPend(pAtT3rN)
    rEtUrN pAtT3rNs

    def v1gEn3r3_cIphEr(c0dEtExT, kEy):
    aLpHaB3t = s.aScIi_Upp3rCaSe
    kEy_Ind3x = 0
    pLaInT3xt = ""
    fOr cHaR In c0dEtExT:
    iF cHaR In aLpHaB3t:
    shIfT = aLpHaB3t.inDEx(kEy[kEy_Ind3x])
    pLaInT3xt += aLpHaB3t[(aLpHaB3t.inDEx(cHaR) + shIfT) % 26]
    kEy_Ind3x = (kEy_Ind3x + 1) % lEn(kEy)
    eLsE:
    pLaInT3xt += cHaR
    rEtUr

  2. Its interesting how cryptography started as a means for military communication and espionage became the foundarion of cyber security. Now we encounter crytpography nearly every second of our life. From the password of our phone to logging in websites to OTPs.

  3. The Galaxy Cipher Machine: Unbreakable encryption. Then using the Kaliko encryption method.

    Set up:

    A disc cipher machine on a spindle, the discs are like checkers in that they have notches to fit into each other. 1st wheel is the set disc with the numbers 1-80 scrambled, etched around the side, and on the top edge are three alphabets, scrambled the same, with two empty spaces to make 80 digits around the top. Each letter on the top is over a number on the side. There are 26 body discs, each having two rows (top and bottom) of 1-80 on their sides.

    The first message is a four number code: 1234. This is first a security check. The number 23 on the disc, 4 to the right, plus 1, gives you the security response.

    For the set up: The number one represents which set disc is to be used. The 23 is the number on the set disc that is under the letter on the top "E". This letter is the first body disc to be put on the spindle under the set disc. Depending on what the users invented for themselves, an even number goes left, odd/right. So the order of the body discs is the E first, then of right for the rest of the letter order for the discs. The body discs are like checkers in that they have notches for them to fit into each other. There is a dot on the bottom of the set disc somewhere between two numbers, and a dot on each side of each body disc as well. The last number of the 1234, the 4, is how many (left or right) notches to shift the discs as they are being put on using the dots as beginning points. 4 was invented to mean right for the dots so each disc has their dots spaced 4 notches to the right of the one above it. It is also decided/invented which discs go on up-side down. Once all discs are in place a tightening bolt is screwed on the spindle to secure the discs.

    Operation:

    In the coded message sent, the first 30 numbers are still part of the set up. The message follows after them. In these 30 numbers you have invented the pattern that if there are two number 6s in the 5th, 13th, 18th, and 29th numbers, the message is authentic. If there are more or less than two number 6s the message is bogus and is disregarded. In the first 30 numbers, you take the 4th and 9th numbers to know which algorithms to use, in this case both numbers are 12,34. You have invented at least 10 algorithms. The first message letter is O. Find an O on the top of the set disc in one of the alphabets (using another alphabet for the next O), and go down to the number below it on the edge, say 57. Now the first four algorithms are made up by the two users of the machines so they can be anything their imaginations can come up with. Like, from 57, down five discs to the top row of 1-80 where the number is 32, find 32 on the bottom row and go down 7 more discs and do the same, then go straight up to the set disc. 2nd algorithm is a diagonal angling down to the right 8 discs to the lower number on that disc-46, then finding the 46 on the top row, and straight up the to the top set disc. 3rd algorithm is another imaginative pattern ending at the top number 78 on the set disc. 4th algorithm now has a sleeve that fits over the machine with holes randomly drilled into its side lining up with each disc's number lines, 15 holes per line. Now look again to the first 30 numbers and see the 18th and the 62nd numbers are 36, and 84. So now the 78 is lined up with the 3rd disc's top number 6 hole, this shows the number 69 in the bottom number row hole 8. This continues for 4 discs to the last number 51 that is sent in to the other communicating person. (36, 84 is third disc, holes 6 and 8, for 4 discs)They run it all backwards to find the letter O.

    Throughout the sent message there are many OOs. The pattern invented is that you go six numbers beyond the OO to see if there is a number 5 in that number (75). If there is, you know it is a body disc shift. The other number is how many notches to shift each dot.(Odd numbers one way, even the other). Do this at least once every message. If there is a 2 in that number (27) it means to replace the set disc with another one, in this case the number 7 set disc. You replace the old one and just line up the dots of the new set disc directly over the dot beneath it on the first body disc. Do this at least once every message for both set and body discs.

    Another code invented tells you to change the entire order of the set up with a 4 digit set up number following it. Another code tells you to change the number of algorithms to use.

    Golden rules: 1) Never use the same set up code more than once. 2) Always send at least 15 phony messages for every one authentic message. 3) Always shift both the set disc and body discs at least once every message. This cipher machine has ever changing/shifting number patterns, an infinite number of invented algorithms that are used in different orders, a large number of algorithms to constantly change, and every set of machines has a different operation. Each operating set of machines have virgin discs no other machines have.

    This cipher machine cannot be broken, not even by the largest computers in the world if used correctly.
    The confirmation that a code has been broken is that the message appears. With a 500 letter message, if 500 GCMs are used where each machine only encrypts one letter, there is no confirmation the letter that comes up when trying to break it is the actual letter that is in the message. Every letter has a machine with different discs, different algorithms, and different operators encrypting it. So the most any attempt to break the code can do is acknowledge that each letter position could be any of the letters in the entire alphabet (A-Z). To write out the possibilities on paper would be to have an entire alphabet under letter position #1, then another one under #2, an so on. In the end there would be 500 alphabets in a row as the only clue to what the message says. A wall of alphabets. Its like telling the hackers there are 500 letters in the message and the words are in the dictionary. With this small bit of information it is IMPOSSIBLE to even begin to try to find the message. Not even the biggest computer in the world, working on it for 10,000 years could find the message.

    This encryption form is called KALIkO ENCRYPTION, it is unbreakable, and is perfectly suited for the Galaxy Cipher Machine.

  4. How can you crack a code in space wherein the trillion to quadrillion or more discrete particles of here and there which when for example commanded by the Powerful being Above aligned themselves of those particles only specific for that those particles coming from undisclosed locations in the universe?

  5. Can those very strong encryptions escape from the probing minds of the alien extra- terrestial polarities opposites with telephatic minds much better than modern AI, but less superior than the scriptural codes users they can not crack?

  6. 1:52 now its better but can analize what letter occur most if ciphered text have spaces you know start and end letter those can be analize too, but change key every letter comes implausable. every cipher can be crack

  7. Im partial to numeric book cyphers. All of my passwords are kept in a phisical blackbook with a home brew book cypher using a hyper specific practice text book that barely saw print. You don't need to worry about frequency analysis all that much if you open to random pages for each new word, take letters from both the middle and end of words and if you need to use spaces just mark them using pages not in the book which both nakes the code harder to crack and the book harder to isolate.

  8. You can make 100% full proof codes. If you randomly assigned the alphabet plus space and period a number 1-28 for say a million characters , there’s no way you could crack it. Every time a new number was given it would correspond to a different alphabet that was unrelated to the last.

  9. I have to disagree. By using one's imagination and encrypting using enough layers and astronomical permutations, I don't think so.
    Imagination is random but can be encoded. The pattern is no pattern, cannot be figured out, to many variables.

  10. I think this video was designed for those who already understand the basics. Once you got 4 minutes in, I needed several ways of explaining it, plus visuals and multiple samples. I'm slow, I know. I didn't understand that part at all.

Leave a Reply

Your email address will not be published. Required fields are marked *