Return to Video

Code Makers & Code Breakers, Cryptology (1/3)

  • 0:01 - 0:03
    susan alternatives out there
  • 0:03 - 0:06
    than i think it's happening
  • 0:06 - 0:08
    computers and digital encryption
  • 0:08 - 0:13
    the attempts to make a great the secret
    methods of scrambled
  • 0:13 - 0:17
    course of history
  • 0:17 - 0:24
    on modern marvels
  • 0:31 - 0:35
    the philippines january sixth nineteen
    ninety five
  • 0:35 - 0:38
    when police responded to an apartment
    fire
  • 0:38 - 0:43
    they found it to achieve a laptop amid a
    batch of chemicals and bomb-making
  • 0:43 - 0:45
    materials
  • 0:45 - 0:49
    health and high winds and revealed a
    blender simultaneously on the twelve
  • 0:49 - 0:52
    u_s_ airliners over the pacific
  • 0:52 - 0:55
    potential death toll
  • 0:55 - 0:57
    passengers
  • 0:57 - 1:01
    several other files using fiction
    software will scramble the writings in
  • 1:01 - 1:03
    secret code
  • 1:03 - 1:07
    the philippine police to come to some of
    the files using a special computer
  • 1:07 - 1:08
    program
  • 1:08 - 1:12
    and uncovered a list rodney king resumes
  • 1:12 - 1:17
    all the evidence pointed to the most
    part the terrorist in the world
  • 1:17 - 1:18
    ramzi yusef
  • 1:18 - 1:22
    wanted for his involvement in the world
    trade center bombing
  • 1:22 - 1:24
    youssef spots will start
  • 1:24 - 1:28
    and he was in u_s_ custody within six
    weeks
  • 1:28 - 1:32
    it was a major victory for international
    law enforcement
  • 1:32 - 1:35
    attribute the importance of cryptology
  • 1:35 - 1:39
    the science of making and breaking a
    secret code
  • 1:39 - 1:44
    trace the development of coaches to
    uncover the very fabric of civilization
  • 1:44 - 1:48
    once a culture which is the level of
    sophistication and literacy science of
  • 1:48 - 1:49
    language
  • 1:49 - 1:52
    the demand for secret symbolic
    communication
  • 1:52 - 1:54
    portions
  • 1:54 - 1:55
    i think codes
  • 1:55 - 1:59
    go back uh... probably as far as there
    is language
  • 1:59 - 2:04
    people had something to keep secret they
    need to find some way to scrambling
  • 2:04 - 2:10
    percent raise codes have been controlled
    by governments employed and more
  • 2:10 - 2:14
    applied in diplomacy when he was going
    to be an option
  • 2:14 - 2:16
    but with modern technology
  • 2:16 - 2:21
    the use of codes by individuals has
    exploded enriching cryptology and
  • 2:21 - 2:24
    empowering citizens
  • 2:24 - 2:25
    communications
  • 2:25 - 2:27
    has heightened the meeting
  • 2:27 - 2:31
    roads to keep the information private on
    the internet
  • 2:31 - 2:33
    a_t_m_s
  • 2:33 - 2:37
    medical offices three
  • 2:37 - 2:42
    today's complex codes of the results by
    the historic see-saw battle between coat
  • 2:42 - 2:44
    knickers and code breakers
  • 2:44 - 2:48
    that has pushed the very balconies of
    science
  • 2:48 - 2:52
    the earliest known code was an
    inscription carved into rock by an
  • 2:52 - 2:56
    objection scribe in nineteen hundred
    b_c_
  • 2:56 - 2:59
    it was an attempt to demonstrate wider
    knowledge like dressing up the right
  • 2:59 - 3:02
    thing
  • 3:02 - 3:06
    ordinary hieroglyphics workplace with
    unusual symbols which told the story of
  • 3:06 - 3:11
    the writers master khanum holds up the
    second
  • 3:11 - 3:15
    another early coat was used for secrecy
  • 3:15 - 3:19
    a tiny inside for a tabloid found on the
    banks of the tigris river dating from
  • 3:19 - 3:21
    fifteen hundred b_c_
  • 3:21 - 3:26
    contain the hidden formula for blazing
    pondering
  • 3:26 - 3:30
    and the ancient greeks created their own
    invented coating methods
  • 3:30 - 3:33
    one the supportive
  • 3:33 - 3:35
    of a pression
  • 3:35 - 3:36
    monarch
  • 3:36 - 3:39
    thought that it might be time to revolt
  • 3:39 - 3:41
    and he had a hint in the court
  • 3:41 - 3:42
    of the riots degrade
  • 3:42 - 3:44
    and this agent
  • 3:44 - 3:48
    sent a message to this man saying it's
    now time to a vote
  • 3:48 - 3:51
    he showing the head of what it is slaves
  • 3:51 - 3:53
    and tax code all invented
  • 3:53 - 3:55
    the word revolt
  • 3:55 - 3:58
    and waited for their hair to grow and
    sent the slave
  • 3:58 - 4:01
    down to this man's
  • 4:01 - 4:05
    when the man got this lady shave the
    head saw the word rippled
  • 4:05 - 4:07
    and realize that this was a time
  • 4:07 - 4:08
    any given below
  • 4:08 - 4:11
    successfully
  • 4:11 - 4:12
    let's go to
  • 4:12 - 4:16
    a new instruments recycler messages
    between researchers use
  • 4:16 - 4:19
    it was called history
  • 4:19 - 4:21
    corpse was wrapped around the state
  • 4:21 - 4:23
    and the message written down the side
  • 4:23 - 4:28
    wrapped around the stick the message
    could be read unwrapped it was scramble
  • 4:28 - 4:32
    message was sent from general to general
    unwrapped generals would have a stake
  • 4:32 - 4:37
    through the appropriate length grab the
    cloth around it and read the message
  • 4:37 - 4:42
    like waco trickier secret methods
    scrambling and i'm scrambling messages
  • 4:42 - 4:46
    used by sender and receiver id
  • 4:46 - 4:50
    julius caesar and savored his military
    communications using it either employed
  • 4:50 - 4:52
    an alternative alphabet
  • 4:52 - 4:57
    by moving each letter three spaces to
    the right
  • 4:57 - 5:01
    but with the collapse of the roman
    empire in five hundred eighty
  • 5:01 - 5:03
    european cryptology entered darkness
  • 5:03 - 5:08
    that would last four thousand years ago
  • 5:08 - 5:11
    but another civilization was rising in
    the east
  • 5:11 - 5:15
    line nine hundred eighty eight arab
    society was one of the most literate
  • 5:15 - 5:17
    cultures in the world
  • 5:17 - 5:21
    and the study of crows flourished banana
  • 5:21 - 5:25
    the arabs with the first to record the
    methods of transposition scrambling of
  • 5:25 - 5:26
    letters
  • 5:26 - 5:32
    as well as substitution the replacement
    of letters with numbers and symbols
  • 5:32 - 5:36
    who delivers won't mind specific
    techniques of code breaking that
  • 5:36 - 5:41
    involved mathematical or frequency
    analysis
  • 5:41 - 5:45
    the arabs were very interested in the
    letter
  • 5:45 - 5:46
    studies
  • 5:46 - 5:48
    and they counted the number of times
  • 5:48 - 5:50
    characters such as aleph
  • 5:50 - 5:51
    appeared in the karan
  • 5:51 - 5:54
    and they discovered which letters begin
    words frequently
  • 5:54 - 5:59
    they use this information a statistical
    source
  • 5:59 - 6:04
    to larry how to break codes the most
    frequent coated letter
  • 6:04 - 6:06
    represents the most frequently text
    letter
  • 6:06 - 6:08
    and that's how you begin to solve a cold
  • 6:08 - 6:11
    and they were the first to do this
  • 6:11 - 6:15
    with the renaissance cryptology had a
    rebirth in europe
  • 6:15 - 6:21
    in fourteen sixty six an italian
    architect leow now betting develop the
  • 6:21 - 6:24
    greatest cryptologic convention two
    thousand years at the urging of the
  • 6:24 - 6:27
    vatican
  • 6:27 - 6:30
    it was a system of rotating cipher discs
  • 6:30 - 6:33
    with two rings of letters and several
    numbers
  • 6:33 - 6:36
    by scrambling so many letters randomly
  • 6:36 - 6:39
    it was the first to challenge the arab
    code breaking method of frequency
  • 6:39 - 6:46
    analysis it criticisms just replaced it
    with she only one of the time
  • 6:46 - 6:49
    the albuquerque site for guest
  • 6:49 - 6:54
    used a disk in which these rhetoric
    combinations could be changed from time
  • 6:54 - 6:55
    to time
  • 6:55 - 6:59
    and as a consequence it would be
    represented not only one letter
  • 6:59 - 7:01
    but by many letters
  • 7:01 - 7:03
    this was called
  • 7:03 - 7:05
    polyol today
  • 7:05 - 7:07
    alphabet substitution
  • 7:07 - 7:12
    and it was the basis for many modern
    cipher systems
  • 7:12 - 7:14
    french diplomat
  • 7:14 - 7:18
    blues division there improve the
    operating system and fifteen eighty six
  • 7:18 - 7:24
    by creating a greater of twenty six
    eyebrow blitzing each ship date one over
  • 7:24 - 7:26
    from the last
  • 7:26 - 7:32
    by use of a keyword encoding and
    decoding communications using visionary
  • 7:32 - 7:32
    square
  • 7:32 - 7:35
    could be calculated on a sheet of paper
  • 7:35 - 7:38
    instead of having to carry a desk
  • 7:38 - 7:39
    unfortunately
  • 7:39 - 7:43
    mary queen of scott's did not employ
    this new development
  • 7:43 - 7:47
    beginning in fifteen sixty eight mary
    was imprisoned by her cousin queen
  • 7:47 - 7:50
    elizabeth the first of england
  • 7:50 - 7:51
    in fifteen eighty six
  • 7:51 - 7:56
    a group of catholics sought to rescue
    marriage and put a running goods from
  • 7:56 - 7:59
    after assassinating elizabeth
  • 7:59 - 8:03
    rescuers communicated with mary through
    secret coated letters
  • 8:03 - 8:05
    her great mistake was hidden
  • 8:05 - 8:09
    thinking that her cipher system was
    secure is actually being read by queen
  • 8:09 - 8:15
    elizabeth search code breakers and
    everything about the plot was known and
  • 8:15 - 8:17
    wondered reached a certain critical
    point
  • 8:17 - 8:23
    queen elizabeth cole will hope to attend
    a sentenced mary queen of scott's death
  • 8:23 - 8:25
    by the seventeen hundreds
  • 8:25 - 8:28
    each european power has only black
    chamber
  • 8:28 - 8:33
    dan lasater deciphering messages and
    gathering intelligence
  • 8:33 - 8:35
    whether we were able to make cryptology
  • 8:35 - 8:37
    was just ahead
  • 8:37 - 8:38
    telegraph
  • 8:38 - 8:40
    for the first time
  • 8:40 - 8:45
    made it possible to send messages
    quickly over long distances
  • 8:45 - 8:48
    effect in the united states economy
    powered by increasing its communications
  • 8:48 - 8:50
    power
  • 8:50 - 8:52
    yet also raised the necessity
  • 8:52 - 8:55
    or cryptology
  • 8:55 - 8:57
    in eighteen forty four
  • 8:57 - 8:59
    samuel morse invented morse code
  • 8:59 - 9:05
    a series of electrical dot impressions
    to communicate over the telephone
  • 9:05 - 9:06
    because the code was public
  • 9:06 - 9:09
    and messages could be easily intercepted
  • 9:09 - 9:13
    the need for new secret codes became
    acute
  • 9:13 - 9:18
    but the telegraph paled in comparison to
    the communication industry is next
  • 9:18 - 9:20
    scientific development
  • 9:20 - 9:22
    mourned the revolutionized codes
  • 9:22 - 9:27
    and was used with motorists impact and
    the twentieth century
  • 9:27 - 9:30
    secret bicycles we've used extensively
    on the battlefield
  • 9:30 - 9:34
    the american civil war
  • 9:34 - 9:35
    approach will return
  • 9:35 - 9:38
    on modern marvels
  • 9:38 - 9:40
    dawn of the twentieth century
  • 9:40 - 9:44
    financially in physicists julio more
    marconi
  • 9:44 - 9:47
    change the world of coats forever
  • 9:47 - 9:52
    mark on his invention harness radio x as
    a new method of communication
  • 9:52 - 9:53
    the result
  • 9:53 - 9:58
    wasn't instantaneous transmission of
    messages across long distances
  • 9:58 - 10:02
    the invention of the radios the most
    important single event in the history of
  • 10:02 - 10:03
    collection sites
  • 10:03 - 10:06
    radio had the greatest
  • 10:06 - 10:08
    start taking communications
  • 10:08 - 10:12
    you don't have to lay wire anything like
    that you just go out with a radio
  • 10:12 - 10:13
    posting communicate
  • 10:13 - 10:15
    but it has been great disadvantage
  • 10:15 - 10:18
    of turning over to the enemy
  • 10:18 - 10:20
    and maureen message that you said
  • 10:20 - 10:24
    so this means you'll have to put into
    code
  • 10:24 - 10:25
    every message that you said
  • 10:25 - 10:29
    so it's stimulating norma sleep they're
    great
  • 10:29 - 10:32
    growth approach in sankara's
  • 10:32 - 10:37
    the ramifications of this new ammunition
    were not lost among the generals
  • 10:37 - 10:40
    radio about quick communication with
    people division
  • 10:40 - 10:45
    sanda more rapid mobile form of warfare
  • 10:45 - 10:51
    radio messages were inside for din
    sending morse code across the airwaves
  • 10:51 - 10:56
    radio transmission brookfield every
    cryptogram accommodate
  • 10:56 - 11:03
    furnished a constant in massive stream
    of intercepts to the enemy
  • 11:04 - 11:08
    codes pin code breakers sharply
    escalated
  • 11:08 - 11:12
    global battle a secret communications
    have begun
  • 11:12 - 11:15
    on august fifth nineteen fourteen
  • 11:15 - 11:17
    british divers from the shuttle columbia
  • 11:17 - 11:21
    severed german cable lines in the north
    atlantic
  • 11:21 - 11:25
    it appears their idea was simply to make
    things more difficult for the germans
  • 11:25 - 11:30
    but it had to pay off of forcing a great
    deal of traffic that would have gone by
  • 11:30 - 11:31
    cable
  • 11:31 - 11:33
    uh... onto radio
  • 11:33 - 11:39
    and so it resulted in in really a flood
    of intercepts coming in that otherwise
  • 11:39 - 11:41
    wouldn't have been available
  • 11:41 - 11:43
    warns intercepted
  • 11:43 - 11:46
    messages were sent to room forty script
    analysis section of the british
  • 11:46 - 11:48
    admiralty
  • 11:48 - 11:51
    room forty might be the prototype of
    water
  • 11:51 - 11:52
    prevailing organizations
  • 11:52 - 11:55
    bay recruited
  • 11:55 - 11:56
    mathematicians linguists
  • 11:56 - 11:58
    chess master's
  • 11:58 - 12:01
    anybody who was quoted puzzle solving
  • 12:01 - 12:03
    in september nineteen fourteen
  • 12:03 - 12:08
    britain received one of the greatest
    gifts in the history of cryptology
  • 12:08 - 12:12
    heard allies the russians captured the
    german crews are not covered in the
  • 12:12 - 12:13
    baltic
  • 12:13 - 12:17
    and the book of germany's main maple
    grove
  • 12:17 - 12:20
    they're probably turned the code will go
    over to one forty
  • 12:20 - 12:24
    allowing britain to correct german able
    messages and bottle of germany's
  • 12:24 - 12:28
    battleships for the duration of the war
  • 12:28 - 12:31
    raining transfer
  • 12:31 - 12:32
    be able to
  • 12:32 - 12:39
    new read the german naval signals so
    often no almost instantaneously
  • 12:39 - 12:41
    uh...
  • 12:41 - 12:46
    was something that simply hadn't
    happened before in warfare
  • 12:46 - 12:50
    on the eastern front crypto graffiti or
    lack of it but to one of the most
  • 12:50 - 12:54
    critical battles in world war one
  • 12:54 - 12:56
    in late august nineteen fourteen
  • 12:56 - 12:59
    the russians tend to want him to east
    prussia
  • 12:59 - 13:04
    adventures movement to draft the germans
    near the village of time
  • 13:04 - 13:06
    the germans were of no
  • 13:06 - 13:08
    but had the advantage of listening in on
    russian
  • 13:08 - 13:11
    radio communications
  • 13:11 - 13:15
    due to the russians rudimentary and
    disorganized coding system
  • 13:15 - 13:19
    intercepts told the germans that the
    russians southern army
  • 13:19 - 13:21
    faster than it's more than
  • 13:21 - 13:25
    the germans real and destroy the russian
    southend-on-sea
  • 13:25 - 13:27
    capturing a hundred thousand prisoners
  • 13:27 - 13:32
    with an estimated thirty thousand dead
    or missing
  • 13:32 - 13:34
    this was the first great
  • 13:34 - 13:36
    defeat of the russians in the war
  • 13:36 - 13:42
    and it started then one day long slide
    into ruin and revolution
  • 13:42 - 13:43
    russians
  • 13:43 - 13:45
    did not at world war one
  • 13:45 - 13:50
    had a good site for system and in part
    they lost the war because it
  • 13:50 - 13:54
    some of the greatest code breaking event
    in the history propel a g began on
  • 13:54 - 13:58
    january seventeenth nineteen seventeen
  • 13:58 - 14:02
    new british intercepted telegram that
    was imprinted with the highest german
  • 14:02 - 14:03
    diplomatic however
  • 14:03 - 14:06
    susie rosenthal
  • 14:06 - 14:11
    it was a mind-numbing system up ten
    thousand words and phrases attached to a
  • 14:11 - 14:14
    thousand numerical code
  • 14:14 - 14:19
    the secret message was from the german
    foreign minister archer's zimmerman
  • 14:19 - 14:22
    to is invested in washington
  • 14:22 - 14:24
    johann von benchmark
  • 14:24 - 14:27
    for related germany's ambassador to
    mexico
  • 14:27 - 14:29
    heinrich von eckhart
  • 14:29 - 14:32
    the telegram would be deciphered there
  • 14:32 - 14:36
    and sent to mexico's president luciano
    karun sap
  • 14:36 - 14:38
    it was sent
  • 14:38 - 14:39
    berlin
  • 14:39 - 14:41
    to washington
  • 14:41 - 14:42
    encrypting
  • 14:42 - 14:46
    on the american undersea
  • 14:46 - 14:48
    the british intercepted affair
  • 14:48 - 14:50
    recognizes the point
  • 14:50 - 14:55
    it was into a new diplomatic system
    which the british should not get broken
  • 14:55 - 14:59
    after receiving the message in the new
    zero zero seven five
  • 14:59 - 15:02
    bumpin stores office in washington and
    made a fatal mistake
Title:
Code Makers & Code Breakers, Cryptology (1/3)
Video Language:
English
Duration:
15:06

English subtitles

Incomplete

Revisions