Polyalphabetic cipher | Journey into cryptography | Computer Science | Khan Academy
-
0:05 - 0:09A strong cipher is one which
disguises your fingerprint. -
0:09 - 0:12To make a lighter
fingerprint is to flatten -
0:12 - 0:13this distribution of
letter frequencies. -
0:17 - 0:19By the mid-15th
century, we had advanced -
0:19 - 0:23to polyalphabetic ciphers
to accomplish this. -
0:23 - 0:28Imagine Alice and Bob
shared a secret shift word. -
0:28 - 0:31First, Alice converts
the word into numbers -
0:31 - 0:33according to the letter
position in the alphabet. -
0:33 - 0:37Next, this sequence of numbers
is repeated along the message. -
0:39 - 0:41Then each letter
in the message is -
0:41 - 0:45encrypted by shifting according
to the number below it. -
0:45 - 0:49Now she is using multiple
shifts instead of a single shift -
0:49 - 0:51across the message, as
Caesar had done before. -
0:54 - 0:58Then the encrypted message
is sent openly to Bob. -
0:58 - 1:01Bob decrypts the message
by subtracting the shifts -
1:01 - 1:06according to the secret
word he also has a copy of. -
1:06 - 1:10Now imagine a code breaker, Eve,
intercepts a series of messages -
1:10 - 1:14and calculates the
letter frequencies. -
1:14 - 1:17She will find a flatter
distribution, or a lighter -
1:17 - 1:18fingerprint.
-
1:18 - 1:22So how could she break this?
-
1:22 - 1:26Remember, code breakers
look for information leak, -
1:26 - 1:29the same as finding a
partial fingerprint. -
1:29 - 1:32Any time there is a differential
in letter frequencies, -
1:32 - 1:33a leak of information occurs.
-
1:36 - 1:38This difference is
caused by repetition -
1:38 - 1:39in the encrypted message.
-
1:42 - 1:47In this case, Alice's cipher
contains a repeating code word. -
1:47 - 1:50To break the encryption,
Even would first -
1:50 - 1:52need to determine the
length of this shift -
1:52 - 1:56word used, not the word itself.
-
1:56 - 1:58She will need to go through
and check the frequency -
1:58 - 2:01distribution of
different intervals. -
2:01 - 2:02When she checks the
frequency distribution -
2:02 - 2:07of every fifth letter, the
fingerprint will reveal itself. -
2:07 - 2:10The problem now is to
break five Cesar Ciphers -
2:10 - 2:13in a repeating sequence.
-
2:13 - 2:17Individually this is a trivial
task, as we have seen before. -
2:17 - 2:19The added strength
of this cipher -
2:19 - 2:21is the time taken to determine
the length of the shift -
2:21 - 2:23word used.
-
2:23 - 2:26The longer the shift word,
the stronger the cipher.
- Title:
- Polyalphabetic cipher | Journey into cryptography | Computer Science | Khan Academy
- Description:
-
Brit introduces the polyalphabetic cipher, which creates a lighter fingerprint than the Caesar cipher.
Watch the next lesson: https://www.khanacademy.org/computing/computer-science/cryptography/crypt/v/one-time-pad?utm_source=YT&utm_medium=Desc&utm_campaign=computerscience
Missed the previous lesson? https://www.khanacademy.org/computing/computer-science/cryptography/crypt/v/caesar-cipher?utm_source=YT&utm_medium=Desc&utm_campaign=computerscience
Computer Science on Khan Academy: Learn select topics from computer science - algorithms (how we solve common problems in computer science and measure the efficiency of our solutions), cryptography (how we protect secret information), and information theory (how we encode and compress information).
About Khan Academy: Khan Academy is a nonprofit with a mission to provide a free, world-class education for anyone, anywhere. We believe learners of all ages should have unlimited access to free educational content they can master at their own pace. We use intelligent software, deep data analytics and intuitive user interfaces to help students and teachers around the world. Our resources cover preschool through early college education, including math, biology, chemistry, physics, economics, finance, history, grammar and more. We offer free personalized SAT test prep in partnership with the test developer, the College Board. Khan Academy has been translated into dozens of languages, and 100 million people use our platform worldwide every year. For more information, visit www.khanacademy.org, join us on Facebook or follow us on Twitter at @khanacademy. And remember, you can learn anything.
For free. For everyone. Forever. #YouCanLearnAnything
Subscribe to Khan Academy’s Computer Science channel: https://www.youtube.com/channel/UC8uHgAVBOy5h1fDsjQghWCw?sub_confirmation=1
Subscribe to Khan Academy: https://www.youtube.com/subscription_center?add_user=khanacademy - Video Language:
- English
- Team:
Khan Academy
- Duration:
- 02:27
![]() |
Fran Ontanaya edited English subtitles for Polyalphabetic cipher | Journey into cryptography | Computer Science | Khan Academy | |
![]() |
Fran Ontanaya edited English subtitles for Polyalphabetic cipher | Journey into cryptography | Computer Science | Khan Academy |