Sorry, as input doesn’t provide any Youtube script, I’m unable to start generating an article. Please provide the script and I’d be happy to assist further.

Sorry, as input doesn’t provide any Youtube script, I’m unable to start generating an article. Please provide the script and I’d be happy to assist further.

Hey guys, there’s been a ton of news the past week about a vulnerability in the WPA2 protocol that protects our Wi-Fi networks, and since we say that AES is secure in this video, we thought it would be helpful to explain how it all relates. In October of 2017, researchers released a viable hack against WPA2, known as KRACK Attack, which uses AES to ensure secure communication between computers and network routers. The problem isn't with AES, which is provably secure, but with the communication protocol between router and computer. In order to set up secure communication, the computer and router have to agree through what's called a "handshake". If this handshake is interrupted in just the right way, an attacker can cause the handshake to fault to an insecure state and reveal critical information which makes the connection insecure. As is often the case with these situations, the problem is with an implementation, not the secure algorithm itself. Our friends over at Computerphile have a great video on the topic: https://www.youtube.com/watch?v=mYtvjijATa4

I'm taking a software engineering technical interview and wanted to brush up quickly on this stuff, thanks Crash Course 👍

Ima get use to this even if I'm the one that earns just like others are

What is ‘errp mrb vrg kihw srczxwjwp jkw fltyj jwuj jr bw pwslzkwtwp vrg sid dra crhw rd jr jkw dwuj slzkwt’ deciphered? can someone please help

3:20, nueral network 😅

I bit tough logic

I'm pretty bad at math and could understand this , well done. Although it does beg the question of why people consider math a requirement when the principles have more to do with logic than mathematics.

ive watched a GAZILLION videos on cryptography… and i always had the sensation that some part was missing, that it didnt make total sense.. i thought i was just dumb, but FINALLY someone explained it completely and clearly! best explanation EVER. all other videos forget to tell the public key is used in conjunction to the private to create something new. thats key! (pun intended)

awesome job! this crash course is truly a masterpiece

I did a course on Cryptography and Information Security in my degree. I remember we touched upon DES and AES, and other advanced topics such as elliptic curves.

This was such an amazing explanation. Perfectly paced, great graphics, fun analogies, easy to understand, and very well spoken. Thank you so much for this!

i've been cracking my head open to understand how keys function for the past few weeks since uni started and you just explained it all very clearly with some paint…..insane and amazing, i thank you ALSO finally understanding the math that's behind these encryption techniques thank you so much

I tried the modular explanation with some example values, and the keys are never the same. It doesn't work

This video is very jfuhusootfj.

I love this!

Hands down the best video on cryptography on YouTube. 12 minutes for expert level 😀

I really have to reduce the speed of this video to understand 10% of what Carrie is saying.

So well explained ! Thanks a lot !

I love simple explanations of complicated things, awesome video

.- .– . … — — .

"For a 128-bit keys, you'd need trillions of years to try every combination, even if you used every single computer on the planet today. So you better get started" XD

You provide great information, high-quality videos, and awesome graphics team. you should’ve brought a better tutor!

….what

I loved cryptography as a kid so much that I actually used to entertain myself with frequency analysis. I had a lot of books on cryptography, and I used to try to crack the examples before the book explained them, the way people try to solve mystery books before they reach the end. Now I'm falling in love with cryptography again, but with a more modern, computerized version. Thanks Crash Course!

Anyone notice the minecraft creeper in the background?

Fantastic

thank numbertheory

search this cryptography research language

I just love the way you explain everything!! Amazing course.

How many "key" have been said in this whole video?

I love money but I hate number.

Oh, money and number are two different things (no body ask) 🤣

Hi

Alan Turing blinking on the bug of engima was hilarious

Thank you for this leacture, but please try in the next time to talk slower, so the non-English speakers can understand you better.

Wow, this was actually the exact right speed to follow, awesome graphics and amazing good comparisons. I'm actually a little happier now!

First time I had to slow down the video to 0.75 to get something from speedy here..but other than that good video!

Maybe it would be good for YT to have a codebook. At least I would spend less time on the internet… And more time studying!

Why is she so gorgeous?.

I like how Hank is the bad guy here 😂

Your accent is cryptographically complex

That's by far the best explanation of asymmetric encryption (in particular, Diffie–Hellman key exchange) I've come across.

it was already complex topic and then you gave it to a woman to present that, God bless i could not get it at all.

0:14 "There will always be bugs" and shows jquery LOL

Speak a lil bit slowly, This video is futile if information isn't conveyed.

4 minutes in and my head already hurts, this ain't for me

hey carrie (or anyone else if you would like to help) , I wanted to understand that private key sharing( at 10:00) , so i thought of making myself a simple practical example out of it, but my calculations say your equation from 10:00 is not correct . can you please have a look?

So If i have to transmit character '"P' (ascii 80 )from Boy A to B:

>> I assumed x=2 would be private key of A and y=3 would be private key of B)

>> I assumed my public key function as cipher(x,y)= (3^x % 7)^y

Thus:

– A would first Transfer cipher_a = 3^2%7 = 2 to B

– B would first Transfer cipher_ a= 3^3%7 = 6 to A

>> I assumed my publically available encryptor function as encrypted_text = cipher(B) ^x

+ ascii(character)

– Thus, A would transfer the encrypted character 'P' to be as e_t = (6)^2+80 = 106

>> I assumed my publically available decryptor function as ascii(character) = encrypted_text – cipher(A) ^y

– Thus, B would recieve the value as val = 106- (2)^3 = 97 , which is not equal to our original value of 80

Thus (B^y mod M)^x != (B^x mod M)^y != (B^xy mod M)

But rather

(B^yx mod M^x) == (B^xy mod M^y) but != B^xy %M

Is this right?

Why is Hank the bad guy?!!

should be ((B^xy)modM)modM not ((B^xy)modM)

4:33 LETS GET IT CARIE ANNE IS A GD shout out to the folks rip JOJO

here thinking how can I relate all that she said with bitcoin

Thanks cryptography!