Home

Cryptography Quotes

There are 622 quotes

"Alan Turing basically won us the war. People really understate how effective he was... He basically just broke open all Nazi communication."
"Rational points on elliptic curves, as well as having intrinsic properties of mathematical interest, are also useful for cryptography."
"If quantum computers live up to their promise of revolutionizing cryptography, then they will also revolutionize quantum gravity."
"Recognize that this is a dancing man cipher. The dancing man cipher is from Sherlock Holmes."
"Bitcoin is the largest cryptographic deployment in the world, the largest public key infrastructure in the world, the largest security honeypot in the world and it is not secure because it doesn't get attacked. It is secure because it generates immunity by being attacked all the time."
"Some of history's greatest codebreakers and cryptologists have all failed to provide any legitimate translations."
"Everything in Bitcoin, everything in Ethereum has key pairs, public key and private key, a digital signature."
"Bitcoin is a system that is made out of a network protocol, some core cryptographic functions, and a set of game theoretical equilibrium systems that dynamically adjust."
"Cracking the Enigma code was one of the top projects of World War II; it took years to do it, but in the end, it did save millions of lives."
"Privacy is when you combine relatively small quantum computers with techniques borrowed from quantum cryptography."
"A zero knowledge proof is a way for an approver to convince a verifier that some statement is true, and yet reveal no additional information beyond the fact that the statement is true."
"One great example is like in elections, if you could prove that an election was correctly conducted, that every vote was counted and it all added up to one person winning with a particular total in zero knowledge, then you don't have to give up the actual votes of any person and yet everyone could see that hey, yeah, it was done correctly."
"For nearly 600 years, the Voynich manuscript has lain undeciphered."
"A man is crazy who writes a secret in any other way than one which will conceal it from the vulgar."
"The one-time pad is one of the most secure ways to encrypt a message because mathematically the one-time pad is impossible to break."
"Now this led uh in 1585 to the only code that's ever been invented that is unbreakable and it's called a strange label it's called the one-time pad."
"The really clever thing about Bitcoin is that they use cryptography to solve the problem of trust."
"Cryptography keeps all that safe, private, and secure."
"So what they came up with was this thing called public key cryptography."
"Cryptography can bring fairness to elections."
"The only person in the room that really knows who Satoshi Nakamoto is isn't going to tell us."
"99% of you got that and had some comments in there like nah man people who are legit used crypto keys and like duh."
"Cryptographers are the first line of defense in an ongoing war that's been raging for centuries: a war between code makers and code breakers."
"The government can come in and confiscate gold, but they can never confiscate a code in your head."
"Bitcoin uses mathematics to secure the distribution of money."
"Sombra's reveal was an extremely popular set of cryptic codes and messages."
"But this is an example of a substitution cipher, or a rotational cipher where everything's kind of rotating-- A's becoming B, B's becoming C. Or you can kind of rotate it even further than that."
"There are no collisions in this function, so we can be sure if we're presented with x, that this was the x that was committed to yesterday."
"Privacy will prevail in the crypto wars. It's an ongoing struggle."
"You can use the power of cryptography to give people back their voice, their property rights, and their sovereignty."
"Monero is based on a very well established cryptography; the code base has been battle tested."
"Thanks to their valiant sacrifice, British codebreakers were able to decipher Enigma messages once again and thousands of allied lives were saved."
"The irony is, by the end of the war, virtually every Enigma code was being read as fast as the Germans themselves."
"Thanks to Turing, more than a million enemy transmissions are intercepted, laying bare the position of Germany's Wolf Packs, around which over 1.2 million tons of shipping are rerouted."
"The mystery of the Beale Ciphers remains unsolved, leaving treasure hunters and cryptographers alike scratching their heads."
"What can you do when you've deciphered someone's cipher? You have the ability for 30 days to get an insane bonus to your Army, Navy, and Air Force."
"Web3 provides a cryptographic guarantee and allows you to create definitive truth."
"Cryptographic guarantees are where the world's going."
"Proof-of-work is the first workable solution to the double spending problem at scale."
"Alan Turing is one of the figures of the century."
"Station X's greatest achievement will lie not in broken ciphers but in the hundreds of thousands, perhaps millions of lives saved."
"Naive view that if we create slightly different cryptography, we'll take over."
"Bitcoin relies on very complicated cryptographic mathematics, but the principles behind it are actually fairly simple."
"Despite the amazing stroke of cryptographic genius required to crack the first three sections, the fourth and final sections of Kryptos remain unsolved as of 2022."
"The practice of coding numbers into words again there's the song out there by the band Slipknot gematria the killing name."
"This is a story of cryptography, ciphers, MIT grad students, computer algorithms, math equations that look like this. Don't worry, I don't understand it either."
"Colossus automatically decrypted the communications exchanged at the highest level of the German general staff."
"Several times he went into print saying that he thought Ultra shortened the war by two years."
"Breaking codes is an activity that requires great intelligence when human beings do it, and here was a machine that was doing the work that human code breakers did."
"You have two keys: a public key and a private key."
"A lot of thought goes into generating random primes."
"It's a really neat way of just using symmetric encryption to gain actually some pretty good security."
"Secret codes are, you know, secrets. They're meant to hide sensitive information and be broken only by intended recipients who know what method was used and have a cipher key that cannot be easily obtained or guessed."
"Even the Prime Minister knew Turing and his team were the ones who were going to save Britain."
"AES is quite complicated, but all that ChaCha does is add, rotate, and XOR."
"This mind-blowing medieval book has been bamboozling cryptologists for over 600 years."
"If that code had not been cracked the United States might have well lost the battle of the Pacific."
"This machine, a kind of prototype computer known as the bombe, exploits weaknesses in the German Enigma encoder."
"Universal a Denali seduce male know you do reverse the find out C sharp Rwanda."
"Maybe the real Markovian parallax denigrate were the friends we made along the way."
"The next cipher called z340 stumped everyone for 51 years. It was finally solved in December 2020 by a team of citizen sleuths."
"Before they revealed his identity, two of the ciphers were already solved."
"They've got some smarts there, the Komodo development team, and as I was saying earlier the sha-256 is bugging us down for no net gain so I'm in favor of this approach."
"For me the finance and economic side of it it's very simple very straightforward I get it but learn about cryptography and what each different crypto does."
"There's a special function called a hash function that takes an input of arbitrary length and returns a number of fixed length."
"Enigma was a spectacularly high-tech and impressive encryption system used by the Germans during World War II."
"The seed phrase is a human-readable list of words around 12 to 24 words."
"If you can factor large numbers rapidly, you can break the RSA cryptosystem."
"Years of failed attempts by cryptographers left the resistant cipher unsolved until the combination of linguists and computer scientists' efforts."
"Edgar Allan Poe had introduced readers to the world of deciphering messages and there are many more waiting to be solved."
"Zero knowledge proof enables one to prove knowledge of a fact without revealing the fact itself."
"Symmetric cryptography is going to be faster since we have that shared key; asymmetric is going to be stronger."
"Building systems that are decentralized, that are based on cryptography, that are game theoretically sound is a really good start."
"The Enigma machine was a famous encryption machine used by the Germans to transmit coded messages during World War II."
"Cracking Enigma was the Allied power's most important victory during World War II."
"Cryptography relies on randomization; predictability is the enemy of cryptography."
"Public key cryptography is the basis for all of these things."
"Mathematics was applied in this manner, to crack codes. It was eye-opening."
"Germany never found out that the Enigma was cracked; all our techniques of deception were effective."
"This pairing between the intercepted message and the guest message is also called as a crib."
"The pool of all possible hashes... starting from the smallest at 0000 and then going all the way up."
"The whole point is that that's when the block is accepted by the blockchain, only when the hash is below the target."
"The avalanche effect... by changing the nonce a tiny little bit, the hash changes completely."
"The way we get access to the smartest thing... is to contribute our data in a way that gives us transparency and sovereignty using cryptographic technology."
"There will be a point in history where people say there was before cryptographic truth and it was after, and before cryptographic truth, the world was a mess."
"Public Key Infrastructure uses two cryptographic keys: public and private."
"The main and the prime objectives of modern cryptography are: confidentiality, non-repudiation, authenticity, and integrity."
"The Enigma was solved immediately upon the American's first words."
"It's kind of like cryptography. You start off from this key that's pretty simple and then you run it, and you can get this complicated random mess."
"Every key you create has a matching key pair, a public and a private key."
"Cryptography relies on randomization that can't be easily predicted."
"Cryptography relies on randomization so random number generation that can't be easily predicted is crucial."
"Cryptography is the most powerful safeguard that has ever been developed in protection of data through communication lines and also as might be stored in computer media."
"Sigaba remained unbreakable - the most secure cryptographic machine of the War."
"Step five: calling all these four steps into a container, like a crypto map."
"Alan Turing was obsessed with puzzles codes games they were so fundamental to his life and so the whole movie would be a puzzle a code a game."
"You're going to be able to do computations on the equivalent of blockchains using homomorphic encryption and zero knowledge proofs."
"A cryptographically guaranteed society is a global market for everything."
"Cryptographically guaranteed relationships are the new minimum for how we interact with each other."
"To just put it simply, zero knowledge proof enables one to prove knowledge of a fact without revealing the fact itself."
"Symmetric cryptography uses a single key that has to be given to all parties who are privy to the information or the data."
"Factoring is special in a whole bunch of ways and, you know, its specialness on the one hand is what makes it so useful for cryptography. You use the structure of factoring to do all the beautiful things that enable modern cryptography."
"... if you know what symmetric encryption is and what algorithms are part of symmetric encryption you know that you're looking for a symmetric key inside of this application."
"I think what Zuko and the whole Zcash team did in terms of advancing that whole field of cryptography is incredible."
"While it doesn't give us who the Zodiac is, just recently his most famous 340 Cipher was solved after 51 years."
"A hash is effectively a digital fingerprint, and if I have a hash, I can now take a password, hash it, and then compare those two hashes to see if they're identical. That's how we're able to store passwords without actually storing the password."
"If we did not have this public private key cryptography, how would the internet even work?"
"Any aspiring treasure hunters out there? Perhaps you'll be interested in the Beale ciphers."
"Secret writing today or invisible ink, these techniques were known from antiquity."
"Diffy Helman groups must match between the peers."
"Entropy is used in a lot of cryptography and information theory, it's really important."
"The heart of ZK snarks lies in succinctly committing vast amounts of information into compact, tamper-resistant proofs."
"The essence of zero knowledge proofs lies in proving a valid result without disclosing any information about the solution."
"Zero knowledge proofs enable proving statements about private data without actually revealing the data itself."
"Polynomial commitments, a key component of snarks, succinctly commit large amounts of information into a small number of encrypted values."
"Polynomial commitments allow for small proofs that are quick to verify and resistant to tampering or information extraction."
"ZK snarks enable proving knowledge of a solution without revealing any details about the solution itself."
"The essence of ZK snarks lies in proving knowledge of a solution without disclosing any information about the solution itself."
"Codes are not deciphered by lone individuals, but by collectives exchanging insights and observations."
"The potential of zero knowledge proofs is astounding for many applications, allowing proof of statements about private data without revealing the data itself."
"So why does this become important in this book that was written by Sir Francis Bacon that the founding fathers were all devotees of founding fathers believed that they were establishing America and they encrypted the Declaration of Independence."
"Breaking the German naval enigma... within a few weeks the British had sunk every one of the submarine supply boats."
"Banning self-custody means banning things like numbers, math, letters, and words."
"Zero knowledge proofs allow one party to prove to another that they know something without revealing any information about it."
"Cryptographic guarantees are how you get out of a world where you have to rely on people's word."
"Cryptographic guarantees are the future of how systems in our industry work."
"...instead of relying on a kind of what I call paper guarantees or just trust us promises you're now relying on physics-based cryptography-based code that can't function in any other way than the way that you expect it to."
"Output Feedback uses an incrementing counter instead of a seed, with no chaining, so errors don't propagate."
"A cryptosystem should be secure even if everything about the system except the key is public knowledge."
"The power of ZK is that I can prove a full-blown computation. I will just give you a proof, and you are 100% sure that everything was executed correctly."
"In the end, Alan Turing and his team of codebreakers cracked Germany's Enigma code."
"The ZK proof is the key technology breakthrough."
"Yeah, there is a problem, absolutely. Like, all of this stuff that we're talking about relies on crypto being correct, or sort of being s to break."
"Digital private keys enable digital private property. We finally have private property on the internet."
"The really coolest thing about crypto is not the blockchains or the layer ones is the self-custody cryptography piece."
"...these are a few examples of problems from a number theory book I spent a few months going through after gaining an interest in the math behind cryptography..."
"The hash functions in cryptography, they have an important characteristic: you can't get the input of an output."
"Symmetric key cryptosystems have a key generation function, encrypt, and decrypt."
"Given the ciphertext you can't figure out the plaintext without the key."
"That's kind of the point of this thing like if I didn't need my key to decrypt then this wouldn't be a very good crypto system."
"So if I was uploading something to Dropbox and I really want it to stay secret I think like a 64-bit passphrase really a passphrase with 64 bits of entropy it would be more than enough in that scenario."
"Without the private key it's hard to produce a signature for any message such that you can give the message in the signature and the public key to the verify function to get it to return true."
"If you generate a BIP 85 seed phrase that is 24 words, you can then generate 10,000 more BIP 85 seed phrases from that BIP 85 seed phrase."
"There's one very recent one called taproot where it's like one line you're like oh yeah that works and it's just these sort of elliptic curve operations it's like yeah that works that's really useful how did it know one thing is that like it's one line like wow"
"Transactions are secure as they are cryptographically signed."
"So you give someone some extra data which they can throw into a hash function, use this sort of as an own private key, and you add it to your private key so no one just knowing this data can spend from it."
"Use Diffie-Hellman because this is called-- well, what you should Google for if you're building a protocol like this is this Diffie-Hellman key exchange protocol."
"All that cryptography is just to make the database structure nearly immutable"
"Here's what we'll do: for shift value in range of 26, let's just print these all out and see what we get."
"The thing that really glues all this stuff together is the cryptography."
"A cryptographic commitment functions like an envelope."
"It's kind of an amazing idea that you can have secret code, secret state, and you can have updated secret states, and even though nothing is public, everything is hidden, you can provide a zero knowledge proof that the code was applied correctly to the state."
"Fusing ideas of Galt's Gulch and cyberspace to secure free markets from outside interference using cryptography."
"Perhaps the most simple form of steganography in an image is 'least significant bit steganography'."
"Cryptography is a way we can really protect our data and we can also get some assurance that the data is initiating from where it's supposed to be coming from."
"An extremely useful tool that asymmetric cryptography enables are Digital Certificates which allow us to verify the owner of a public key"
"Want to know if the update you just download for your iPhone actually came from Apple and that it wasn't modified in transit: cryptography"
"Are you a criminal and you want to hide your communications from law enforcement: cryptography has you covered"
"Secure electronic voting, digitally signing documents, defensible data destruction in the cloud, cryptocurrencies, all of them you guessed it, rely on cryptography."
"The redditors all teamed together in order to discover what the cipher was about."
"In the long term, zk roll-ups are going to win."
"Machine Cipher was thought to be absolutely secure unbreakable."
"Remtol is an anagram of Tolrem merlot and Magnac is the same for Armagnac brandy."
"We're using Trevor Perrin's Noise Protocol Framework for solid crypto."
"...it's really important to keep the cryptographic core minimal so that you can really look at it and understand what it's doing."
"we're using traditional well tested time-tested cryptographic things to keep everything safe"
"When it comes to encryption, you have symmetric cryptography, asymmetric cryptography, file encryption, disk encryption, full disk encryption, and even steganography."
"So, let's have a little look. So, a contributor to Zig named Mark Thomas went ahead and implemented some crypto functions."
"Cryptography and security May reach New Heights."
"It's the word for the number and then moved that amount through the alphabet."
"Cryptography supporting confidentiality. Remember confidentiality, it's secret to man secrets. You know, only authorized people are the ones that are accessing that thing."
"How does cryptography support integrity? Well, this is through hashes."
"Basically what this is, whenever we had something we're doing cryptography, because we can prove nobody has tampered with this thing. It's original."
"Other limitation is based on entropy. Entropy, just think about this as the randomness."
"The Diffie-Hellman algorithm is a method for securely exchanging cryptography keys over insecure channels without compromising security and integrity."
"This is how the one-way functions work and the keys can be exchanged over insecure channels without compromising on the privacy."
"Cryptography is the science of encrypting or decrypting information to prevent unauthorized access."
"The key that is being used to scramble the data is known as the encryption key."
"There are two different keys at play here, a private key and a public key."
"Cryptography has become the backbone of modern internet security."
"Asymmetric key cryptography can be used as proof of authenticity."
"I can create a pseudo-random number generator that you cannot distinguish from randomness."
"Cryptography scrambles data into non-readable format (cipher text); decryption reverses encryption back to readable format (clear text)."
"A trapdoor function basically means it’s easy to compute in one way but hard in the other."
"The result is another hash value. Then we just compare the 2 hash values, If they’re the same then the signature is valid."
"This book has stumped the greatest cryptographers, linguists, and historians for over 600 years."
"Electronic Code Book or ECB. Nice as that looks, it's not at all secure."
"The Vigenère cipher is a method of encrypting alphabetic text."
"My greatest claim to fame is that my father was Donald Michie who was the youngest codebreaker at Bletchley Park."
"I'm going to begin as I always do by showing you a picture of Alan Turing at the Enigma machine."
"We spent 25 minutes on a Vigenère cipher challenge, and we shouldn't have."
"Alice and Bob have managed to share a number, 9, without ever transmitting it publicly."
"He actually by pure mathematical analysis reverse-engineered the German military Enigma machine in 1932."
"Multi-sig, how it works and how we're going to set it up here versus how you may set it up differently at home."
"There is an initiative to create new encryption standards in a world after quantum computers become a thing: Post-Quantum Cryptography."
"Elliptic curve cryptography uses complicated maths."
"So the heart of the difficulty lies, but if you want to do crypto, all you have to know is that there exists a way to sample this with this."
"And then even more exciting to the at least the theoretical community is that lattices have given us solutions to what are known as like Holy Grail problems in cryptography such as fully homomorphic encryption is probably the most well known of these problems."
"The security of RSA lies in the difficulty of factoring semi-prime numbers."
"This young Einstein was an exceptional cryptographer, first in a field of geniuses."