Substitution and transposition techniques | Monoalphabetic and polyalphabetic substitution ciphers
HTML-код
- Опубликовано: 22 ноя 2024
- Hello friends! Welcome to my channel.
My name is Abhishek Sharma. In this video, i have explained various classical encryption techniques i.e. Substitution and transposition techniques | monoalphabetic and polyalphabetic substitution ciphers in cryptography.
#abhics789 #AbhishekDit
Courses on my Website (Huge discounts going on)
www.abhisheksh...
If you learned something new do like and share this video with your friends and don't forget to subscribe to my channel :)
There are lectures related to different subjects on this channel.Do check them out, guys.
Link is given below:
computer graphics:
• Computer Graphics
engineering economics:
• Engineering Economics
Cryptography :
• Playfair Cipher Algorithm
.Net C# :
• .NET C#
Pointers in C :
• Pointers in C Introduc...
Linked List for Interviews :
• Introduction to Linked...
Java Tricky videos/programs for interviews :
• Java Labelled For Loop...
File Handling in C :
• Reading the contents o...
pointers playlist:
• Pointers in C
C Programming tips and tricks:
• C tricky programs/videos
Abhishek VLOGS :
• #VLOG-1 Riding through...
Concerts :
• Khushboo Grewal concer...
I loved that in every video one second is not wasted , Thank you so much for explaining this so easily 🤩🤩🤩
insem exams hai kya??
aap bahot sundar ho
Without wasting time ,before watching video I just like the video.
Excellent stuff, Abhishek has deep knowledge and excellent explanation skills, a valued lecture, spending time watching his lecture is worthy.
Best channel for cryptography
Bro you are life saver for end time revision ❤️
2024, Still taking notes from this. Thanks Sir.
01:27 Substitution techniques involve replacing letters of a plain text with other letters or symbols.
02:54 Substitution and transposition techniques involve replacing or rearranging characters in a message.
04:21 Permutations and transpositions for creating encryption codes
05:48 Types of transposition ciphers and substitution ciphers
07:15 Monoalphabetic substitution ciphers use a single cipher alphabet for each plain text alphabet.
08:42 Substitution ciphers have a 1 to 1 relationship between plain text and cipher text.
10:09 Polyalphabetic substitution ciphers use multiple substitutions for each character.
11:30 In substitution techniques, one character can be denoted by different letters, allowing for multiple substitutions.
Hum logo ko bhi information security abishek sir hi para tha ha . Jrsu ma . Jharkhand raksha shakti University. Ranch . Forensic scirnce deperment
Awosome great knowledge thank you soo much brother ❤️❤️
So helpful to pass in last day of day
Today is my insem tysm bade bhai❤
brilliant teaching you are brother...🤩🤩
u are lifesaving mannnn....amazing....keep it up...GOD BLESS YOU.....
can i get your insta id
@@Blackdog2511 dai parama padi da
very well explained good very good
one of the most amazing teaching sir.... thanku so much
Thanks a lot Bhaiya
Superb explanation with real life examples.. 👍🏼
Thank you Bhaiya
Thank you so much Sir 😍😋
explained perfectly sir ..Ty
kaafi sahi
Bhai bohat badiya yaar 👌👌👌😊
Marvelous bhai 🔥🔥
It would be great helpful if tutors like you offer your notes PDF 😄
bhai mile to btana
Sir , can i get the note cryptography .........? please sir ,give your note also.....Excellent teaching sir 👌👍
Your teaching technique is nice sir
I like it.
Thanks for clearing my concept in cryptography.
Bht vadia c thnkuu sir
Bohot badhiya hai 👍 keep it up 😀
thank you sir 😍😇
explained so well!
Execellent👏👏👏
Wow bro even our gtu book is copied frm ur content...
Beautiful .. Thoroughly explained with all details mate. Will keep checking this whole series. Keep up the great work mate.
you are the hero
Brother this video is very helpful for me
Ek no
thank you so much. your videos helped alot.
very nice explanation............loved it
Abhisekh sir please suggest a book for Cryptography. Please suggest me. You can explain it very clearly. Please suggest one book for cryptography.
Cryptography and Network Security by behrouz a forouzan
Cryptography and network security by William Stalling
Nicely explained
Well explained.
Amazing Sir .thanks
excellent
GREAT tutorial....
Name the book of which you were giving an example in molnoalphabetic substitution cipher
Cryptography and network security by Behrouz A Forouzan and debdeep mukhopadhay
Cryptography and network security by william Stallings
Very Good Sir G
Thank you sir pass karwadiya apne ^_^
Abhishek Bhai bolthey🔥
Nice explanation 👍😊
Hiii
Where are you
Abishek Can you please tell me the name of a Reference book for more reading to ciphers
What is this book name please tell me.
Thank u, it's so useful
Bro I m a good fan of u… Can you tell me the name of the book you used?
thank you
Which book did you use for example?
VERY GOOD
Is it possible to get the notes shown in this video?
do we have to learn that table?
Well teaching sir❤️🙏
THanks
Apne is video konsi book use ki hai??
Please reply asap
awesome
Great work bro
iske notes mil sakte hein cryptography ke
Sir apke notes best h kya notes mil skte. Please provide me. 😘😘
Sir please share your notes as well.
Bro we can called this also classical cryptography or not ?tell me because it is in my syllabus
Yes!! It is a type of Classical Encryption Technique
Brother cryptography ke apne notes upload krde please sbki bht help hojayegi🙏🏻
bro mujhe bhi chahiye notes!!! tere paas ye notes hai toh bhej sakta hai pls🙏🙏🙏🙏
@@adityapatole9691 I also want notes
@@sabashehzad9989 I asked him in insta DM but he has not made any pdf of it. So we have to take screenshots of the video itself😐
Please add English Subtitles Sir...
super
plz show your video setup
11:00 Revision
thanks
sir notes v description me provide kar dijiye ho paye toh
sir aapne to mono alphabetic ko using a keyword walla example nahi karwaya
Sir Yeh kis author ki book h
8:29 Space ko kese Show krenge ?
Can you please share the book?
Can you please share the notes ??
But what should we do if the conversion table is not given so how can we convert those letters
Can you send the PDF of this notes?
Sir, can you please suggest me some books about cryptography and network security
Cryptography and network security by Behrouz A Forouzan and debdeep mukhopadhay
Cryptography and network security by william Stallings
Notes nice.... But i can't understand explanation
Bhaiya inke pdf mil skte h kya
Sir, can you please share the note?
Bro can you provide pdf of your notes ?
Like and subscribe is done.... sir i have a question kindly zara detail mn answer dejeye ga.
Substitution cipher mn jo text substitute keya jata hy means jo cioher text huta hy wo hum hamesha alag baanaty hn aur agr hamesha wo alag huty hn tau receiver ko kesy btaty hn ki this is the cipher text or ap ko esi set ko ly kr msg ko dcrypt krna hy.
We'll send key used for encryption along with the cipher text. So simply, if there's a key, apply to the received msg and that'll be decrypted ;-)
book kon si hai
Sir can you share with me notes pdf
Hello bro can u provide notes alsoo
bhai tumhare paas tumhare notes ka pdf ho toh vo bhi de do. bhaut help ho jayegi usse
Aapko mile kya notes?
Yes bro
@@gulamsarwar609 please share
Hello can u plz share the notes
Please share notes
bhai notes bhi dal de yai wale plz
Plz apny notes k pdf ka link dy dain hmain
can someone provides his hand written notes
Sir can you please share your notes?
Can you please share your notes
MONO-ALPHABETIC SUBSTITUTION is totally wrong as it misses " R" during substitution of "" , since it is completely wrong.
Bro ur teaching is awesome but y ur telling fast fast 🙄😭plzz teach slow yaar plzz
U can play the video on 0.75x speed !
search this cryptography research language