TRANSPOSITION TECHNIQUES IN NETWORK SECURITY || RAIL FENCE CIPHER || ROW TRANSPOSITION CIPHER

Поделиться
HTML-код
  • Опубликовано: 22 окт 2024

Комментарии • 111

  • @aninda1988
    @aninda1988 4 года назад +1

    i saw somebody commented on vir das' video, that "i have liked the video before even starting to watch".. I did the same for your video, before even starting to watch; because to me you make contents that's absolutely great and honestly nobody has even presented to me in such a way for the network security category

  • @maheshb3756
    @maheshb3756 3 года назад

    Sir you have helped me a lot sir during my exams time. Your explonation is very goood and clear. Keep maintian that sir. You are one of the best teacher in my study career. I was scared about this subject and i found you on youtube. Now i learned lot of subject. Thank you very much sir.

  • @estudantedavida3659
    @estudantedavida3659 2 года назад +1

    I LOVE THE WAY SUNDEEP TEACHES.

  • @GauravSingh-yd3tw
    @GauravSingh-yd3tw 6 лет назад +5

    beautiful handwriting sir

  • @homelyknowledge4643
    @homelyknowledge4643 6 дней назад

    Thankyou tommrww is my exam but it explanation is really awesome thankyouu❤

  • @ganeshjaggineni4097
    @ganeshjaggineni4097 Год назад

    NICE SUPER EXCELLENT MOTIVATED

  • @luttaappii640
    @luttaappii640 4 года назад

    really helpfull to understand the concept

  • @akramrayri7538
    @akramrayri7538 4 года назад +1

    another great explanation..thank you sooooooo much

  • @goutamkrishna7535
    @goutamkrishna7535 6 лет назад +1

    Sir, ur video was very easy to understand ..can you please also mention decryption process

  • @bittuap1630
    @bittuap1630 5 лет назад +1

    Sala kitna hard lagraha tha.. Par kitna easy nikla.. Thanks a lot Sir ji 🙏

  • @maheshb3756
    @maheshb3756 3 года назад

    Awesome explonation and good hand writing... reallly reallly good🔥🔥

  • @rakeshbr790
    @rakeshbr790 5 лет назад

    Awesome teaching ..... No doubt about it......,👌👌👌👌👌

  • @pavant8761
    @pavant8761 5 лет назад

    Fabulous explanation saradhi garu

  • @AnjaliKumari-ie2uw
    @AnjaliKumari-ie2uw 4 года назад

    Thank you so much sir..your videos are very helpful.you explain very well.

  • @NageshNagesh-zv7oi
    @NageshNagesh-zv7oi 3 года назад

    Really super explanation sirrr..... Tq

  • @bettyyakass8918
    @bettyyakass8918 Год назад

    Very grateful sir

  • @vaskaran1
    @vaskaran1 6 лет назад +1

    Dear Sandeep sir, superb explanation, very lucid. Thanks a lot

    • @sundeepsaradhi
      @sundeepsaradhi  6 лет назад

      hi vasantha raj
      soon i will try to upload them .
      thanks for your interest towards our channel and share my sessions with your friends and subscribe to our channel.Keep following our channel.

  • @33story.T
    @33story.T 2 года назад

    Thank you so much. Awesome lecture.

  • @surajnegi8022
    @surajnegi8022 6 лет назад +1

    Nice sir... Aapki video bhot helpful hoti h and aap purr doughts clear krte h. Thanks a lot

    • @sundeepsaradhi
      @sundeepsaradhi  6 лет назад +1

      hi suraj
      thanks for supporting our channel.and watching my sessions.

  • @johnsonp8284
    @johnsonp8284 4 года назад

    Good presentation

  • @pavant8761
    @pavant8761 5 лет назад

    Sir ... your lecrures helps me lot in my teaching. Keep on posting videos which covers Network security all concepts if possible. Tq

  • @haribabu6363
    @haribabu6363 2 года назад

    Nice teaching

  • @dhachanamurthydhachanamurt8447
    @dhachanamurthydhachanamurt8447 4 года назад

    Tq so much sir.very clear explanation nd helped for my xam sir 😀😀😀😀

  • @ramaponnusamy1843
    @ramaponnusamy1843 4 года назад

    Super explanation sir.

  • @mohammedazmath7543
    @mohammedazmath7543 6 лет назад +1

    Sir...it is very useful video thank you...i like your explaination you are awesome...

    • @sundeepsaradhi
      @sundeepsaradhi  6 лет назад

      hi mohammed
      thanks for your interest towards our channel and share my sessions with
      your friends and subscribe to our channel.Keep following our channel.

  • @ddd-pq9fk
    @ddd-pq9fk 2 года назад

    sir u are amazing sir u have helped me alot in automata subject because of u i have passed the exam thankyou so much

  • @jasmeengill5932
    @jasmeengill5932 5 лет назад +2

    Sir you used here 5*4 metric but you are saying for 5*5 ..kindly clear this doubt ?

  • @ivangonzalezsaenz
    @ivangonzalezsaenz 6 лет назад

    Hi Sundeep, I assume that blank spaces should be added also to both of your examples?

  • @sadaffatima2076
    @sadaffatima2076 5 лет назад

    Nicely explained

  • @_Meghana_
    @_Meghana_ 3 года назад

    I like ur videos sir

  • @SD-lc9zy
    @SD-lc9zy 3 года назад

    Thank you sir...

  • @yaswanthyash2647
    @yaswanthyash2647 3 года назад

    Nice sir

  • @sajincv
    @sajincv 5 лет назад

    What is the significance of key value in raw transposition.. result is same for any 5 digit key. 32541 or 12345 make no difference ?

  • @deepakvarmank4642
    @deepakvarmank4642 Год назад

    Super

  • @muhammedyaseen1850
    @muhammedyaseen1850 9 месяцев назад

    Thank you ❤

  • @tufelahmedlokhandwala668
    @tufelahmedlokhandwala668 6 лет назад

    Why are you not explaining decryption process in the substitution and transposition method?

  • @navyamadhuribhuwaneswaram88
    @navyamadhuribhuwaneswaram88 6 лет назад +1

    can u plz explain all the transpostion techniques?

  • @prageedsadhieesh7160
    @prageedsadhieesh7160 4 года назад

    Why you didn't consider the blank space in rail fence cipher?

  • @anupriya5861
    @anupriya5861 2 года назад

    Sir kindly explain how to decrypt the cipertext using row transposition

  • @prateekpathak7135
    @prateekpathak7135 6 лет назад

    Wouldn,t the spaces between the words considered as a bit while converting from PT to CT?

  • @visvanathanv4354
    @visvanathanv4354 5 лет назад

    Super sir I understood

  • @poornimabelli1852
    @poornimabelli1852 6 лет назад +1

    Thank you. I have cns exam tomorrow. I am from bangalore University. Which all should you study and go?

    • @sundeepsaradhi
      @sundeepsaradhi  6 лет назад +1

      hi poornima
      thanks for your interest towards our channel and share my sessions with your friends and subscribe to our channel.Keep following our channel.

  • @pjvarma
    @pjvarma 3 года назад

    Thank you sir🙏🏻

  • @AmanKumar-fq4jk
    @AmanKumar-fq4jk 5 лет назад +2

    Why don't u explain cryptanalysis of all these techniques

  • @swagplayzyt
    @swagplayzyt 6 лет назад +2

    IN row transposition
    If we create a 4*4 matrix and p.T is welcome to my session , then
    While filling the table , all the letter how i fill?

    • @sundeepsaradhi
      @sundeepsaradhi  6 лет назад

      hi rishabh
      based on the plain text message we are supposed to take the matrix.if the matrix was not complete then fill with some dummy letters. and key should be numerical.

    • @swagplayzyt
      @swagplayzyt 6 лет назад

      Okay
      I got it

  • @malavikasanil2187
    @malavikasanil2187 2 года назад

    👏👏👏

  • @daisonraj9577
    @daisonraj9577 5 лет назад

    Thanks Sir

  • @momeesaikia423
    @momeesaikia423 6 лет назад

    sir if the plain text exceed the row no. i.e if it gets greater than the no. of digits in the key. then what should we do

  • @divyaperdeshi10
    @divyaperdeshi10 5 лет назад

    Thanks a lot sir😊🙏

  • @mayurpatel481
    @mayurpatel481 6 лет назад +3

    Sir, can you please explain "One Time Pad Cipher"?

    • @sundeepsaradhi
      @sundeepsaradhi  6 лет назад +2

      hi Mayur
      sure and i will try to upload it soon.
      thanks for your interest towards our channel and share my sessions with your friends and subscribe to our channel.Keep following our channel.

  • @VeeraBabu-dv2qm
    @VeeraBabu-dv2qm 4 года назад

    Sir how to convert cipher Text to plain text in rail fence ciphers and row transposition cipher

  • @sanjivmadhavan5705
    @sanjivmadhavan5705 5 лет назад +6

    cypher text : omahaseeyawaameyaala

  • @NehaSingh-jo3ct
    @NehaSingh-jo3ct 5 лет назад

    Ty sir

  • @thrivenireddy8277
    @thrivenireddy8277 3 года назад

    Tq sir

  • @deepankarkumar9596
    @deepankarkumar9596 6 лет назад +2

    sir,in rail fence cipher no of lines depend upon the key value but sir you do not mesane any key and you can draw one line why?

    • @sundeepsaradhi
      @sundeepsaradhi  6 лет назад +1

      hi kumar
      you are correct in rail fence we have consider the key and based on key we need to do the transposition. i just forget to say that in the video.
      thanks for your observation and correction.

    • @chandana3836
      @chandana3836 6 лет назад

      Sir the key should be given i think I am a makaut student in a message 'happy birthday to you"they construct it in solvation they take 2 line ..I can't understood why they take 2 lines

  • @VishalVerma-dt5ic
    @VishalVerma-dt5ic 5 лет назад

    How we can do Row transposition with the help of two key?please explain.

  • @priyankamadharaju5388
    @priyankamadharaju5388 5 лет назад

    Can u explain monoalphabetic technique?

  • @nishanthkr2838
    @nishanthkr2838 5 лет назад

    Sir, You are awesome!

  • @bhanuj6376
    @bhanuj6376 6 лет назад

    Sir can u plz explain polyalphabetic cipher&one time padding

  • @prashantyadav5277
    @prashantyadav5277 5 лет назад

    Thank you sir

  • @ramyasrikumpatla
    @ramyasrikumpatla 6 лет назад +1

    Plzz do a video on security mechanisms sir i need it it is helpful for me

    • @sundeepsaradhi
      @sundeepsaradhi  6 лет назад

      hi ramyasri
      soon i will try to upload them .
      thanks for your interest towards our channel and share my sessions with your friends and subscribe to our channel.Keep following our channel.

  • @GyaniBaba_Jagat_knowledge
    @GyaniBaba_Jagat_knowledge 6 лет назад

    please sir decryption method bhi bata diya kro

  • @tamilstudent1
    @tamilstudent1 5 лет назад

    How to decrypt row transposition cipher?

  • @karpagamp3681
    @karpagamp3681 2 года назад

    Pls simple columnar, vernam, book cipher

  • @shannmuka5354
    @shannmuka5354 6 лет назад

    Pleased with your teaching sir, pls make videos on RDBMS and Data Mining

  • @sanketbhamre101
    @sanketbhamre101 6 лет назад +1

    Dear sir, Why you are not considering space character in plain text during encryption?

    • @sundeepsaradhi
      @sundeepsaradhi  6 лет назад +1

      hi sanket
      as this is transposition technique we should not consider the space as a character.

    • @sanketbhamre101
      @sanketbhamre101 6 лет назад +2

      Thanks for the reply sir.. But I have then another question that, how they are going to decide where to put space during decryption? because we are transmitting stream that is without space?

    • @sundeepsaradhi
      @sundeepsaradhi  6 лет назад +2

      hi Sanket
      Due to security issues there is no explanation regarding decryption process and i think there will be some other procedure for decryption.
      thanks for your interest towards our channel and share my sessions with
      your friends and subscribe to our channel.Keep following our channel.

    • @sanketbhamre101
      @sanketbhamre101 6 лет назад

      thanks sir. Will definitely share your videos.

  • @pavant8761
    @pavant8761 5 лет назад

    Sir... in playfair...table.. can we take any other letters like pq or lm ... instead of I/J in a cell????

  • @bhalsodnirva104
    @bhalsodnirva104 6 лет назад

    Sir how to revert thease msg?i mean ct to pt from these two methods?

  • @AKHILDS-j3v
    @AKHILDS-j3v 5 лет назад

    Thnx sir😍😍

  • @shashanksnk2694
    @shashanksnk2694 6 лет назад +2

    sir in rail fence cipher how to get back plain text from cipher text

    • @sundeepsaradhi
      @sundeepsaradhi  6 лет назад +2

      hi Shashank
      May be due to security problems the decryption process for any algorithm was not explained in any material and they will give in a single line as the decryption process is reverse to encryption process. so we don't know exactly how the decryption process will be implemented.

    • @sahilprasantachoudhury911
      @sahilprasantachoudhury911 4 года назад +1

      Split cipher into two halves, write characters alternately from each half.
      M E M A T E O A A T (one half)
      E T E T H T G P R Y Recovered text is "meetmeatthetogaparty"
      While decrypting, if there are odd number of characters in the cipher text, write greater half as first line and smaller half as second line.

  • @manvirnijjar1200
    @manvirnijjar1200 6 лет назад +8

    This is columnar transposition..nt row

    • @sundeepsaradhi
      @sundeepsaradhi  6 лет назад +8

      hi Nijjar
      you are correct and i agree with you thanks for your observation and correction.

  • @anupamadev7914
    @anupamadev7914 5 лет назад

    then how to decrypt the cipher text?

  • @RkMusicEventsSurat
    @RkMusicEventsSurat 5 лет назад

    Sir why did you choose key only 32451? Is it rule?

    • @piyushgupta514
      @piyushgupta514 5 лет назад

      you can choose any of the order making sure to fill the whole rectangle with dummy characters
      also sir has explained it wrong so better refer to other source

  • @surajnegi8022
    @surajnegi8022 6 лет назад +1

    Sir plz ak video compiler me b bnaeye.

  • @chinnan7124
    @chinnan7124 4 года назад

    Pls provide the mcq in this concept i.e network security sir

  • @Vasantkhirbire
    @Vasantkhirbire 6 лет назад +1

    can u upload video of iot(internet of think )ty computer science

    • @sundeepsaradhi
      @sundeepsaradhi  6 лет назад +1

      hi
      now i am uploading videos on python programming so after that i will try to upload them soon.
      thanks for your interest towards our channel and share my sessions with your friends and subscribe to our channel.Keep following our channel.

  • @sengottuvell965
    @sengottuvell965 4 года назад

    how to decrypt this methods ?

  • @shaiknadimkhan4558
    @shaiknadimkhan4558 6 лет назад +1

    Hi Bro,
    Hope you find my comment in good mood!
    How to get in touch with you for resolving the doubts?

    • @sundeepsaradhi
      @sundeepsaradhi  6 лет назад

      hi thanks for your interest towards our channel and share my sessions with your friends and subscribe to our channel.Keep following our channel.
      you can contact me through
      email : askme.selflearning@gmail.com
      whatsApp : 9515140494

  • @dipanshusomeshwar
    @dipanshusomeshwar 6 лет назад

    how to do decryption in row transposition cipher??

    • @adanemulatu8521
      @adanemulatu8521 4 года назад

      thanks a lot becouse i got great knw from your video

  • @traveldude4760
    @traveldude4760 5 лет назад

    What a out key in rail fence copher

  • @gireeshkumarkancharla4176
    @gireeshkumarkancharla4176 3 года назад

    I think it is columnar cipher... Not row cipher

  • @yaswanthsatyavarapu3800
    @yaswanthsatyavarapu3800 5 лет назад

    here key used is 2........................................................

  • @Vasantkhirbire
    @Vasantkhirbire 6 лет назад +1

    nice sir

    • @sundeepsaradhi
      @sundeepsaradhi  6 лет назад

      hi
      thanks for your interest towards our channel and share my sessions with your friends and subscribe to our channel.Keep following our channel.