< Return to Video

The Caesar cipher | Journey into cryptography | Computer Science | Khan Academy

  • 0:04 - 0:08
    Prvu poznatu šifru, šifru zamenjivanja,
  • 0:08 - 0:12
    koristio je Julije Cezar oko
    58. god. pre nove ere.
  • 0:12 - 0:15
    Danas je poznata pod
    imenom "Cezarova šifra."
  • 0:15 - 0:18
    Cezar je pomerao svako
    slovo svojih vojnih komandi
  • 0:18 - 0:20
    kako bi one bile nerazumljive
  • 0:20 - 0:22
    ako bi ih protivnik presreo.
  • 0:22 - 0:25
    Zamislite da Alisa i Bob
    odluče da komuniciraju
  • 0:25 - 0:27
    koristeći Cezarovu šifru.
  • 0:27 - 0:29
    Prvo, moraju unapred da se dogovore
  • 0:29 - 0:32
    koji će pomak koristiti, recimo 3.
  • 0:32 - 0:33
    Da bi šifrovala svoju poruku,
  • 0:33 - 0:36
    Alisa bi morala da pomeri za 3
  • 0:36 - 0:38
    svako slovo svoje originalne poruke,
  • 0:38 - 0:41
    tako da A postane D, B postane E,
  • 0:41 - 0:43
    C postane F, i tako dalje.
  • 0:43 - 0:46
    Ova nečitka, to jest šifrovana, poruka
  • 0:46 - 0:49
    se javno šalje Bobu.
  • 0:51 - 0:55
    Zatim Bob jednostavno pomera za
    tri slova unazad svako slovo poruke
  • 0:55 - 0:58
    da bi pročitao originalnu poruku.
  • 0:58 - 1:02
    Zvuči neverovatno, ali ovakva jednostavna
    šifra je korištena od strane
  • 1:02 - 1:04
    vojnih predvodnika stotinama
    godina nakon Cezara.
  • 1:04 - 1:07
    FILMSKI PRIKAZ CEZARA:
    "Borio sam se i pobedio.
  • 1:07 - 1:10
    Ali nisam osvojio ljudski duh,
  • 1:10 - 1:13
    on je nesavladiv."
  • 1:13 - 1:17
    Ipak, katanac je jak onoliko koliko je
    jaka njegova najslabija tačka.
  • 1:17 - 1:19
    Obijač katanca bi mogao da traži
    mehaničke nedostatke,
  • 1:19 - 1:21
    ili ako to ne uspe, da izvuče informacije,
  • 1:21 - 1:25
    kako bi suzio broj mogućih kombinacija.
  • 1:25 - 1:27
    Procesi obijanja katanca
  • 1:27 - 1:29
    i dešifrovanja koda su veoma slični.
  • 1:29 - 1:31
    Slaba tačka Cezarove šifre
  • 1:31 - 1:33
    je objavljena 800 godina kasnije
  • 1:33 - 1:36
    od strane arapskog matematičara
    po imenu Al-Kindi.
  • 1:36 - 1:39
    On je razbio Cezarov kod koristeći
  • 1:39 - 1:40
    jednu važnu karakteristiku jezika
  • 1:40 - 1:43
    na kojem je poruka napisana.
  • 1:43 - 1:45
    Ako pogledate tekst bilo koje knjige,
  • 1:45 - 1:47
    i izračunate učestalost
    svakog slova,
  • 1:47 - 1:50
    naići ćete na dosledan obrazac.
  • 1:50 - 1:54
    Na primer, ovo su učestalosti slova
    u engleskom jeziku.
  • 1:54 - 1:57
    Moglo bi se reći da je to otisak
    engleskog jezika.
  • 1:57 - 1:59
    Ostavljamo ovaj otisak kada komuniciramo,
  • 1:59 - 2:01
    ne primećujući ga.
  • 2:01 - 2:03
    Ova smernica je jedno od
    najdragocenijih oružja
  • 2:03 - 2:05
    za razbijače kodova.
  • 2:05 - 2:08
    Da bi razbili kod, oni broje učestalost
  • 2:08 - 2:11
    svakog slova u šifrovanom tekstu,
  • 2:11 - 2:14
    i proveravaju koliko daleko
    se pomerio otisak.
  • 2:14 - 2:17
    Na primer, ako je H najbrojnije slovo
  • 2:17 - 2:19
    u šifrovanoj poruci, umesto E,
  • 2:19 - 2:22
    onda je pomak najverovatnije 3.
  • 2:22 - 2:24
    Tako pomeraju slova
  • 2:24 - 2:26
    da bi otkrili originalnu poruku.
  • 2:26 - 2:28
    Ovo se nazive "analiza učestalosti".
  • 2:28 - 2:31
    I to je bio kraj sigurnosti
    Cezarove šifre.
Title:
The Caesar cipher | Journey into cryptography | Computer Science | Khan Academy
Description:

Brit explains the Caesar cipher, the first popular substitution cipher, and shows how it was broken with "frequency analysis"

Watch the next lesson: https://www.khanacademy.org/computing/computer-science/cryptography/crypt/v/polyalphabetic-cipher?utm_source=YT&utm_medium=Desc&utm_campaign=computerscience

Missed the previous lesson? https://www.khanacademy.org/computing/computer-science/cryptography/crypt/v/intro-to-cryptography?utm_source=YT&utm_medium=Desc&utm_campaign=computerscience

Computer Science on Khan Academy: Learn select topics from computer science - algorithms (how we solve common problems in computer science and measure the efficiency of our solutions), cryptography (how we protect secret information), and information theory (how we encode and compress information).

About Khan Academy: Khan Academy is a nonprofit with a mission to provide a free, world-class education for anyone, anywhere. We believe learners of all ages should have unlimited access to free educational content they can master at their own pace. We use intelligent software, deep data analytics and intuitive user interfaces to help students and teachers around the world. Our resources cover preschool through early college education, including math, biology, chemistry, physics, economics, finance, history, grammar and more. We offer free personalized SAT test prep in partnership with the test developer, the College Board. Khan Academy has been translated into dozens of languages, and 100 million people use our platform worldwide every year. For more information, visit www.khanacademy.org, join us on Facebook or follow us on Twitter at @khanacademy. And remember, you can learn anything.

For free. For everyone. Forever. #YouCanLearnAnything

Subscribe to Khan Academy’s Computer Science channel: https://www.youtube.com/channel/UC8uHgAVBOy5h1fDsjQghWCw?sub_confirmation=1
Subscribe to Khan Academy: https://www.youtube.com/subscription_center?add_user=khanacademy

more » « less
Video Language:
English
Team:
Khan Academy
Duration:
02:36

Serbian subtitles

Incomplete

Revisions Compare revisions