1 00:00:00,000 --> 00:00:02,000 [Powered by Google Translate] [Vigenère Cipher] 2 00:00:02,000 --> 00:00:04,000 [Nate Hardison - Chuo Kikuu cha Harvard] 3 00:00:04,000 --> 00:00:07,000 [Hii ni CS50. - CS50.TV] 4 00:00:07,000 --> 00:00:09,000 Kutana Alice. 5 00:00:09,000 --> 00:00:11,260 Alice ana kuponda juu Bob. 6 00:00:11,260 --> 00:00:15,030 Bahati nzuri kwa Alice, Bob pia ana macho kwa ajili yake. 7 00:00:15,030 --> 00:00:17,700 Bahati mbaya kwa mpenzi yao budding, 8 00:00:17,700 --> 00:00:20,580 si tu kufanya Alice wazazi onya Bob, 9 00:00:20,580 --> 00:00:23,820 lakini Alice bora rafiki, Evelyn, ina kuponda siri juu ya Bob 10 00:00:23,820 --> 00:00:27,290 na ubinafsi anataka kuweka peke yao kwa gharama zote. 11 00:00:27,290 --> 00:00:31,280 Ili kutuma ujumbe wa siri na kila mmoja kuwa Alice wazazi hawawezi kuelewa, 12 00:00:31,280 --> 00:00:34,140 >> Alice na Bob wamekuwa wakitumia cipher Kaisari, 13 00:00:34,140 --> 00:00:37,410 ambayo hufanya kazi kwa shifting alfabeti na idadi fulani ya barua 14 00:00:37,410 --> 00:00:39,800 kama njia ya kuzalisha alfabeti mpya. 15 00:00:39,800 --> 00:00:44,130 Kila barua katika alfabeti ya awali ni kisha kubadilishwa kwa barua yake sambamba 16 00:00:44,130 --> 00:00:46,920 katika alfabeti mpya kubadilishwa. 17 00:00:46,920 --> 00:00:50,240 Alice namba favorite ni 3, ambayo Bob anajua, 18 00:00:50,240 --> 00:00:52,450 hivyo yeye anatumia 3 kama ufunguo wake. 19 00:00:52,450 --> 00:00:55,430 Wakati yeye mabadiliko alfabeti ya Kiingereza na herufi 3, 20 00:00:55,430 --> 00:01:00,680 inakuwa D, B inakuwa E, C inakuwa F, 21 00:01:00,680 --> 00:01:02,670 na kadhalika. 22 00:01:02,670 --> 00:01:07,460 >> Wakati yeye anapata hadi mwisho wa alfabeti - kwa barua X, Y, na Z - 23 00:01:07,460 --> 00:01:09,970 yeye tu Wraps kuzunguka nyuma mwanzo wa alfabeti 24 00:01:09,970 --> 00:01:14,850 na substitutes X Y, na B, na Z na C. 25 00:01:14,850 --> 00:01:18,550 Hivyo wakati Alice huenda encrypt ujumbe wake siri na Bob, 26 00:01:18,550 --> 00:01:21,520 yaani "Meet yangu katika Hifadhi ya saa kumi na moja var kl," 27 00:01:21,520 --> 00:01:23,790 yeye tu hufanya substitutions mwafaka. 28 00:01:23,790 --> 00:01:30,900 M inakuwa P, E inakuwa H, na kadhalika mpaka wake kimaandishi Nakala wazi ujumbe 29 00:01:30,900 --> 00:01:34,350 yamegeuka Nakala encrypted cipher: 30 00:01:34,350 --> 00:01:37,280 "Phhw ph DW wkh sdun DW hohyhq DP" 31 00:01:37,280 --> 00:01:39,370 ni dhahiri si sounding kimapenzi zaidi, 32 00:01:39,370 --> 00:01:41,650 lakini Alice kuamini kwamba itabidi kufanya. 33 00:01:41,650 --> 00:01:45,140 >> Alice anatoa ujumbe kwa Evelyn wa kutoa na nyumba Bob. 34 00:01:45,140 --> 00:01:50,030 Lakini Evelyn badala inachukua nyuma kwa nafasi yake na inajaribu ufa code. 35 00:01:50,030 --> 00:01:55,470 Moja ya mambo ya kwanza Evelyn matangazo ni kwamba H barua hutokea mara 7 katika ujumbe, 36 00:01:55,470 --> 00:01:58,930 wengi zaidi kuliko nyakati barua nyingine yoyote. 37 00:01:58,930 --> 00:02:01,960 Kujua kwamba E barua ni ya kawaida katika lugha ya Kiingereza, 38 00:02:01,960 --> 00:02:05,390 zinazotokea karibu 13% ya muda, 39 00:02:05,390 --> 00:02:09,910 Evelyn guesses kwamba H imekuwa kubadilishwa kwa E ili kufanya ujumbe siri 40 00:02:09,910 --> 00:02:14,030 na anajaribu kutumia ufunguo wa 3 ili kuisimbua. 41 00:02:14,030 --> 00:02:19,700 >> Ndani ya dakika, Evelyn takwimu nje mipango Alice na evilly wito wazazi Alice ya. 42 00:02:19,700 --> 00:02:22,700 Lau Alice na Bob kuchukuliwa CS50, wangeli inayojulikana ya hii 43 00:02:22,700 --> 00:02:25,750 frequency-uchambuzi mashambulizi cipher Kaisari, 44 00:02:25,750 --> 00:02:28,310 ambayo inaruhusu kuwa ni kuvunjwa kabisa haraka. 45 00:02:28,310 --> 00:02:32,590 Wao pia tunajua kwamba cipher ni urahisi chini ya mashambulizi brute-nguvu, 46 00:02:32,590 --> 00:02:35,940 ambapo Evelyn inaweza wamejaribu yote ya funguo iwezekanavyo 25, 47 00:02:35,940 --> 00:02:38,440 au mabadiliko ya alfabeti ya Kiingereza, 48 00:02:38,440 --> 00:02:40,490 ili decipher ujumbe. 49 00:02:40,490 --> 00:02:43,710 Kwa nini 25 funguo na si 26? 50 00:02:43,710 --> 00:02:49,010 >> Naam, jaribu shifting barua yoyote kwa nafasi 26, na utaona nini. 51 00:02:49,010 --> 00:02:52,280 Anyway, mashambulizi brute-nguvu kuyang Evelyn kidogo tena 52 00:02:52,280 --> 00:02:56,070 lakini si muda mrefu wa kutosha kutunza yake kutoka thwarting Alice na mipango Bob, 53 00:02:56,070 --> 00:02:58,660 hasa kama Evelyn ana misaada ya kompyuta 54 00:02:58,660 --> 00:03:02,640 ambayo inaweza mpasuko kupitia kesi zote 25 katika papo. 55 00:03:02,640 --> 00:03:06,170 Hivyo, tatizo hili pia wanakumbana wengine ambao kutumika cipher Kaisari, 56 00:03:06,170 --> 00:03:10,300 na kwa hiyo watu walianza majaribio na ciphers ngumu zaidi badala 57 00:03:10,300 --> 00:03:14,190 kwamba matumizi ya maadili kuhama nyingi badala ya moja tu. 58 00:03:14,190 --> 00:03:18,080 Moja ya wengi anajulikana ya hizi inaitwa Vigenère cipher. 59 00:03:18,080 --> 00:03:19,980 Jinsi gani sisi kupata maadili kuhama nyingi? 60 00:03:19,980 --> 00:03:24,630 Naam, badala ya kutumia idadi kama ufunguo, sisi kutumia neno kwa ajili ya muhimu. 61 00:03:24,630 --> 00:03:27,940 Tutaweza kutumia kila barua katika ufunguo wa kuzalisha idadi, 62 00:03:27,940 --> 00:03:33,670 na athari ni kwamba tutaweza kuwa na nyingi Kaisari funguo cipher-style kwa shifting barua. 63 00:03:33,670 --> 00:03:36,620 >> Hebu angalia jinsi hii matendo na encrypting ujumbe Alice kwa Bob: 64 00:03:36,620 --> 00:03:39,010 Kukutana na mimi katika Hifadhi ya saa 11:00 65 00:03:39,010 --> 00:03:42,610 Mimi, binafsi, nadhani Bacon ni ladha, 66 00:03:42,610 --> 00:03:44,480 hivyo hebu kutumia kama muhimu. 67 00:03:44,480 --> 00:03:48,220 Kama sisi kuchukua ujumbe katika muundo wake kimaandishi, wazi-maandishi, 68 00:03:48,220 --> 00:03:51,020 tunaona kwamba ni 25 barua kwa muda mrefu. 69 00:03:51,020 --> 00:03:55,020 Bacon ina barua tu 5, hivyo tunahitaji kurudia mara 5 70 00:03:55,020 --> 00:03:57,200 kufanya hivyo mechi ya urefu wa Nakala wazi. 71 00:03:57,200 --> 00:03:59,880 >> Bacon Bacon Bacon Bacon Bacon. 72 00:03:59,880 --> 00:04:02,300 Kama kifupi kando, ikiwa idadi ya herufi katika Nakala wazi 73 00:04:02,300 --> 00:04:05,780 hawakuwa kugawanya cleanly na idadi ya herufi katika muhimu, 74 00:04:05,780 --> 00:04:08,260 sisi tu kumaliza marudio ya mwisho ya ufunguo yetu mapema, 75 00:04:08,260 --> 00:04:11,800 kutumia tu barua sisi zinahitajika ili kufanya kila kitu match up. 76 00:04:11,800 --> 00:04:14,590 Sasa sisi kwenda juu ya kutafuta maadili kuhama. 77 00:04:14,590 --> 00:04:19,100 >> Sisi wanaenda kufanya hivyo kwa kutumia nafasi ya kila barua ya ufunguo yetu - Bacon - 78 00:04:19,100 --> 00:04:21,560 katika A kwa alfabeti Z. 79 00:04:21,560 --> 00:04:26,060 Tangu sisi ni kompyuta wanasayansi, sisi kama kuanza kuhesabu saa sifuri badala ya 1, 80 00:04:26,060 --> 00:04:30,230 hivyo sisi ni kwenda kusema kwamba msimamo wa barua ya kwanza ya Bacon - B - 81 00:04:30,230 --> 00:04:33,840 ni katika nafasi ya 1 katika sifuri-indexed kwa alfabeti Z, 82 00:04:33,840 --> 00:04:38,300 si 2, na msimamo wa ni sifuri, si 1. 83 00:04:38,300 --> 00:04:42,450 Kutumia algorithm hii, tunaweza kupata maadili kuhama kwa kila herufi. 84 00:04:42,450 --> 00:04:45,330 >> Encrypt Nakala wazi na kuzalisha cipher maandishi, 85 00:04:45,330 --> 00:04:49,070 sisi tu kuhama kila barua katika Nakala wazi kwa kiasi fulani, 86 00:04:49,070 --> 00:04:54,140 tu kama sisi kufanya na cipher Kaisari, wrapping kutoka Z nyuma kama ni lazima. 87 00:04:54,140 --> 00:04:57,880 M anapata kubadilishwa na mahali 1 kuwa N. 88 00:04:57,880 --> 00:05:02,350 Barua ya kwanza haina kuhama wakati wote, lakini sisi kuhama E pili na maeneo 2 kwa G 89 00:05:02,350 --> 00:05:06,200 na T na maeneo 14 H. 90 00:05:06,200 --> 00:05:08,610 Kama sisi kazi kwa njia ya maandishi wazi, sisi kuishia na, 91 00:05:08,610 --> 00:05:12,580 "Negh ZF Av HUF pcfx bt gzrwep oz." 92 00:05:12,580 --> 00:05:16,620 Tena, si sana kimapenzi-sounding lakini dhahiri cryptic. 93 00:05:16,620 --> 00:05:19,750 Kama Alice na Bob angejua kuhusu Vigenère cipher, 94 00:05:19,750 --> 00:05:23,330 ingekuwa wamekuwa salama kutoka macho Evelyn wa prying? 95 00:05:23,330 --> 00:05:24,870 Unafikiri? 96 00:05:24,870 --> 00:05:27,450 Je, unataka kuingia katika akaunti yako ya benki kama benki yako aliamua kutumia 97 00:05:27,450 --> 00:05:32,720 >> Vigenère cipher encrypt mawasiliano yako kwa kutumia nywila yako kama ufunguo wako? 98 00:05:32,720 --> 00:05:34,810 Kama ningekuwa wewe, napenda. 99 00:05:34,810 --> 00:05:38,720 Na wakati Evelyn inaweza kuwekwa busy muda wa kutosha kwa Alice na Bob kuwa wao kukutana-up, 100 00:05:38,720 --> 00:05:41,600 siyo thamani yake kwa Alice na Bob kwa nafasi yake. 101 00:05:41,600 --> 00:05:45,780 Vigenère cipher ni rahisi kuvunja kama unajua urefu wa muhimu 102 00:05:45,780 --> 00:05:48,490 kwa sababu kisha unaweza kutibu encrypted cipher Nakala 103 00:05:48,490 --> 00:05:52,840 kama bidhaa ya ciphers chache interwoven Kaisari. 104 00:05:52,840 --> 00:05:55,950 >> Kupata urefu wa muhimu si sana ngumu, aidha. 105 00:05:55,950 --> 00:06:00,520 Kama awali wazi-ujumbe wa maandishi ni muda wa kutosha kwamba baadhi ya maneno kutokea mara nyingi, 106 00:06:00,520 --> 00:06:04,420 hatimaye utaona marudio mseto juu katika maandishi encrypted cipher, 107 00:06:04,420 --> 00:06:10,010 kama katika mfano huu, ambapo unaona MONCY itaonekana mara mbili. 108 00:06:10,010 --> 00:06:13,800 Zaidi ya hayo, unaweza kufanya mashambulizi brute-nguvu juu ya cipher. 109 00:06:13,800 --> 00:06:17,220 Hii haina kuchukua kiasi kikubwa zaidi ya mashambulizi brute-nguvu juu ya cipher Kaisari, 110 00:06:17,220 --> 00:06:20,670 ambayo inaweza kufanyika karibu mara kwa kompyuta 111 00:06:20,670 --> 00:06:27,130 tangu badala ya 25 kesi ya kuangalia nimepata 26 ⁿ - 1 uwezekano, 112 00:06:27,130 --> 00:06:29,580 ambapo n ni urefu wa ufunguo haijulikani. 113 00:06:29,580 --> 00:06:34,040 >> Hii ni kwa sababu kila barua katika muhimu inaweza kuwa yoyote ya barua 26, 114 00:06:34,040 --> 00:06:38,280 kupitia Z, na mtu smart ingekuwa kujaribu kutumia ufunguo kwamba hawezi kupatikana katika kamusi, 115 00:06:38,280 --> 00:06:44,280 ambayo ina maana kwamba wewe d na kupima yote ya mchanganyiko weird barua, kama ZXXXFF, 116 00:06:44,280 --> 00:06:47,690 na si tu wanandoa laki maneno katika kamusi. 117 00:06:47,690 --> 00:06:53,200 bala 1 anakuja katika math kwa sababu wewe si unataka kutumia ufunguo na tu ndiyo, 118 00:06:53,200 --> 00:06:56,200 tangu kwa alfabeti yetu sifuri-indexed kwamba bila kutoa athari sawa 119 00:06:56,200 --> 00:06:59,620 kama kutumia cipher Kaisari na muhimu ya sifuri. 120 00:06:59,620 --> 00:07:04,120 Anyway, 26 ⁿ - 1 haina kupata kubwa badala haraka, 121 00:07:04,120 --> 00:07:08,080 lakini wakati wewe dhahiri si unataka kujaribu kuvunja cipher kwa mkono kwa njia hii, 122 00:07:08,080 --> 00:07:11,080 hii ni dhahiri doable na kompyuta. 123 00:07:11,080 --> 00:07:14,030 Bahati nzuri kwa Alice na Bob, na kwa online benki, 124 00:07:14,030 --> 00:07:17,890 cryptographers kuwa na maendeleo ya njia salama zaidi kwa encrypt ujumbe siri 125 00:07:17,890 --> 00:07:19,690 kutoka macho prying. 126 00:07:19,690 --> 00:07:22,400 >> Hata hivyo, hiyo ni mada kwa wakati mwingine. 127 00:07:22,400 --> 00:07:26,210 Jina langu ni Nate Hardison. Hii ni CS50.