i saw somebody commented on vir das' video, that "i have liked the video before even starting to watch".. I did the same for your video, before even starting to watch; because to me you make contents that's absolutely great and honestly nobody has even presented to me in such a way for the network security category
Sir you have helped me a lot sir during my exams time. Your explonation is very goood and clear. Keep maintian that sir. You are one of the best teacher in my study career. I was scared about this subject and i found you on youtube. Now i learned lot of subject. Thank you very much sir.
hi vasantha raj soon i will try to upload them . thanks for your interest towards our channel and share my sessions with your friends and subscribe to our channel.Keep following our channel.
hi mohammed thanks for your interest towards our channel and share my sessions with your friends and subscribe to our channel.Keep following our channel.
hi ramyasri soon i will try to upload them . thanks for your interest towards our channel and share my sessions with your friends and subscribe to our channel.Keep following our channel.
hi Mayur sure and i will try to upload it soon. thanks for your interest towards our channel and share my sessions with your friends and subscribe to our channel.Keep following our channel.
hi poornima thanks for your interest towards our channel and share my sessions with your friends and subscribe to our channel.Keep following our channel.
hi rishabh based on the plain text message we are supposed to take the matrix.if the matrix was not complete then fill with some dummy letters. and key should be numerical.
hi now i am uploading videos on python programming so after that i will try to upload them soon. thanks for your interest towards our channel and share my sessions with your friends and subscribe to our channel.Keep following our channel.
hi Shashank May be due to security problems the decryption process for any algorithm was not explained in any material and they will give in a single line as the decryption process is reverse to encryption process. so we don't know exactly how the decryption process will be implemented.
Split cipher into two halves, write characters alternately from each half. M E M A T E O A A T (one half) E T E T H T G P R Y Recovered text is "meetmeatthetogaparty" While decrypting, if there are odd number of characters in the cipher text, write greater half as first line and smaller half as second line.
Thanks for the reply sir.. But I have then another question that, how they are going to decide where to put space during decryption? because we are transmitting stream that is without space?
hi Sanket Due to security issues there is no explanation regarding decryption process and i think there will be some other procedure for decryption. thanks for your interest towards our channel and share my sessions with your friends and subscribe to our channel.Keep following our channel.
you can choose any of the order making sure to fill the whole rectangle with dummy characters also sir has explained it wrong so better refer to other source
hi kumar you are correct in rail fence we have consider the key and based on key we need to do the transposition. i just forget to say that in the video. thanks for your observation and correction.
Sir the key should be given i think I am a makaut student in a message 'happy birthday to you"they construct it in solvation they take 2 line ..I can't understood why they take 2 lines
hi thanks for your interest towards our channel and share my sessions with your friends and subscribe to our channel.Keep following our channel. you can contact me through email : askme.selflearning@gmail.com whatsApp : 9515140494
I LOVE THE WAY SUNDEEP TEACHES.
i saw somebody commented on vir das' video, that "i have liked the video before even starting to watch".. I did the same for your video, before even starting to watch; because to me you make contents that's absolutely great and honestly nobody has even presented to me in such a way for the network security category
beautiful handwriting sir
Thankyou tommrww is my exam but it explanation is really awesome thankyouu❤
Sala kitna hard lagraha tha.. Par kitna easy nikla.. Thanks a lot Sir ji 🙏
Sir you have helped me a lot sir during my exams time. Your explonation is very goood and clear. Keep maintian that sir. You are one of the best teacher in my study career. I was scared about this subject and i found you on youtube. Now i learned lot of subject. Thank you very much sir.
really helpfull to understand the concept
NICE SUPER EXCELLENT MOTIVATED
Awesome explonation and good hand writing... reallly reallly good🔥🔥
another great explanation..thank you sooooooo much
Awesome teaching ..... No doubt about it......,👌👌👌👌👌
sir u are amazing sir u have helped me alot in automata subject because of u i have passed the exam thankyou so much
Fabulous explanation saradhi garu
Nice sir... Aapki video bhot helpful hoti h and aap purr doughts clear krte h. Thanks a lot
hi suraj
thanks for supporting our channel.and watching my sessions.
Super explanation sir.
Really super explanation sirrr..... Tq
Thank you so much sir..your videos are very helpful.you explain very well.
Good presentation
Sir, ur video was very easy to understand ..can you please also mention decryption process
Very grateful sir
Nice teaching
Dear Sandeep sir, superb explanation, very lucid. Thanks a lot
hi vasantha raj
soon i will try to upload them .
thanks for your interest towards our channel and share my sessions with your friends and subscribe to our channel.Keep following our channel.
Tq so much sir.very clear explanation nd helped for my xam sir 😀😀😀😀
Thank you so much. Awesome lecture.
Sir...it is very useful video thank you...i like your explaination you are awesome...
hi mohammed
thanks for your interest towards our channel and share my sessions with
your friends and subscribe to our channel.Keep following our channel.
Nicely explained
Sir ... your lecrures helps me lot in my teaching. Keep on posting videos which covers Network security all concepts if possible. Tq
I like ur videos sir
Super
Thank you sir...
👏👏👏
Super sir I understood
Sir kindly explain how to decrypt the cipertext using row transposition
can u plz explain all the transpostion techniques?
cypher text : omahaseeyawaameyaala
Why are you not explaining decryption process in the substitution and transposition method?
Thank you ❤
Thank you sir🙏🏻
Pls simple columnar, vernam, book cipher
please sir decryption method bhi bata diya kro
What is the significance of key value in raw transposition.. result is same for any 5 digit key. 32541 or 12345 make no difference ?
Thanks Sir
Why you didn't consider the blank space in rail fence cipher?
Sir, You are awesome!
Thanks a lot sir😊🙏
Sir can u plz explain polyalphabetic cipher&one time padding
Can u explain monoalphabetic technique?
Tq sir
Plzz do a video on security mechanisms sir i need it it is helpful for me
hi ramyasri
soon i will try to upload them .
thanks for your interest towards our channel and share my sessions with your friends and subscribe to our channel.Keep following our channel.
Thank you sir
nice sir
hi
thanks for your interest towards our channel and share my sessions with your friends and subscribe to our channel.Keep following our channel.
Why don't u explain cryptanalysis of all these techniques
Sir, can you please explain "One Time Pad Cipher"?
hi Mayur
sure and i will try to upload it soon.
thanks for your interest towards our channel and share my sessions with your friends and subscribe to our channel.Keep following our channel.
Pleased with your teaching sir, pls make videos on RDBMS and Data Mining
Sir you used here 5*4 metric but you are saying for 5*5 ..kindly clear this doubt ?
Sir how to convert cipher Text to plain text in rail fence ciphers and row transposition cipher
Wouldn,t the spaces between the words considered as a bit while converting from PT to CT?
How to decrypt row transposition cipher?
Ty sir
Hi Sundeep, I assume that blank spaces should be added also to both of your examples?
Thnx sir😍😍
Pls provide the mcq in this concept i.e network security sir
This is columnar transposition..nt row
hi Nijjar
you are correct and i agree with you thanks for your observation and correction.
How we can do Row transposition with the help of two key?please explain.
I think it is columnar cipher... Not row cipher
What a out key in rail fence copher
Thank you. I have cns exam tomorrow. I am from bangalore University. Which all should you study and go?
hi poornima
thanks for your interest towards our channel and share my sessions with your friends and subscribe to our channel.Keep following our channel.
here key used is 2........................................................
sir if the plain text exceed the row no. i.e if it gets greater than the no. of digits in the key. then what should we do
Sir... in playfair...table.. can we take any other letters like pq or lm ... instead of I/J in a cell????
Only i j
Sir plz ak video compiler me b bnaeye.
sure suraj definitely i will try to upload.
Thnku sir
IN row transposition
If we create a 4*4 matrix and p.T is welcome to my session , then
While filling the table , all the letter how i fill?
hi rishabh
based on the plain text message we are supposed to take the matrix.if the matrix was not complete then fill with some dummy letters. and key should be numerical.
Okay
I got it
can u upload video of iot(internet of think )ty computer science
hi
now i am uploading videos on python programming so after that i will try to upload them soon.
thanks for your interest towards our channel and share my sessions with your friends and subscribe to our channel.Keep following our channel.
Sir how to revert thease msg?i mean ct to pt from these two methods?
then how to decrypt the cipher text?
sir in rail fence cipher how to get back plain text from cipher text
hi Shashank
May be due to security problems the decryption process for any algorithm was not explained in any material and they will give in a single line as the decryption process is reverse to encryption process. so we don't know exactly how the decryption process will be implemented.
Split cipher into two halves, write characters alternately from each half.
M E M A T E O A A T (one half)
E T E T H T G P R Y Recovered text is "meetmeatthetogaparty"
While decrypting, if there are odd number of characters in the cipher text, write greater half as first line and smaller half as second line.
how to decrypt this methods ?
Dear sir, Why you are not considering space character in plain text during encryption?
hi sanket
as this is transposition technique we should not consider the space as a character.
Thanks for the reply sir.. But I have then another question that, how they are going to decide where to put space during decryption? because we are transmitting stream that is without space?
hi Sanket
Due to security issues there is no explanation regarding decryption process and i think there will be some other procedure for decryption.
thanks for your interest towards our channel and share my sessions with
your friends and subscribe to our channel.Keep following our channel.
thanks sir. Will definitely share your videos.
Sir why did you choose key only 32451? Is it rule?
you can choose any of the order making sure to fill the whole rectangle with dummy characters
also sir has explained it wrong so better refer to other source
sir,in rail fence cipher no of lines depend upon the key value but sir you do not mesane any key and you can draw one line why?
hi kumar
you are correct in rail fence we have consider the key and based on key we need to do the transposition. i just forget to say that in the video.
thanks for your observation and correction.
Sir the key should be given i think I am a makaut student in a message 'happy birthday to you"they construct it in solvation they take 2 line ..I can't understood why they take 2 lines
how to do decryption in row transposition cipher??
thanks a lot becouse i got great knw from your video
Hi Bro,
Hope you find my comment in good mood!
How to get in touch with you for resolving the doubts?
hi thanks for your interest towards our channel and share my sessions with your friends and subscribe to our channel.Keep following our channel.
you can contact me through
email : askme.selflearning@gmail.com
whatsApp : 9515140494
Nice sir