3C12A46B7UK10C, a = 1, b=2, ... z=26 shifted numbers and letters like 1 = A, 2 = B... used to map text to cipher and back to the text. Teachers in school never figured it out lol. Worked for more than 5 years
K=%Random Amount of letters replaced% (line one figure 1 numbers 1-9) %Random Line and figure positions for equivalents string% (line 1 figure’s 2-3 numbers 1-9) %random letter string% %random letter string% (first letters are equivalent to second letters makes equivalents string) this cypher is perfect for long paragraph and can be made a little harder , the decoder determines every variable based on the first 3 numbers but these numbers can be put anywhere in the code, the code can also be made more complex by using number letter and symbols as the generated letters strings equivalents making the 3 number nearly impossible to find in the file finally these 3 numbers can be put in a place given a range so the decrypted has to search multiple places to find the correct one meaning hackers can’t use the decrypted code to easily determine the first part of the keys position this would be a pretty good cypher technique for programming and ensure safety from something around 85% if hackers at a guess those left capable would be unlikely to try , the best thing about this is it can be programmed in a simple batch fine and with an exe converted vertion of the encrypted and decrypted it would be really hard to decode the programs
This is a Caesar Cypher. The A-Z alphabet is shifted by a certain number (the key). The caesar cypher is very easy to break, apps exist that can break a caesar cypher instantly. Secure networks do not use this method. What is used in cyber security is way more advanced.
Probally useless now but the bottem is a shift of the key above it like if you have key 1 and key 2, key 2 would be a shift of key 1 by the number of key 2, or just add all the keys and it's basically the same.
Excellent video. However, I do think you should be more explicit in identifying the "right-shifting" as "right-rotation", because that's what it really is, and also because I often see students oblivious to the difference. People often say "right-shift" when they mean "right-rotate", and it helps to make students explicitly aware of this "from the jump". Also, to clear up confusion, a block cipher CAN use Caesar shifting (as in this video). A block cipher, however, unlike Caesar ciphers generally, must operate on fixed-length "blocks" (sets of bits) of data. Keep in mind that block does not mean anything relating to squares or cubes as implied by another comment on this video. Blocks are just sets of bits of fixed length. A block cipher, therefore, simply needs to operate on such a "family" of blocks. (A family is a well-defined set of sets, so a message can be seen as a family of sets of bits.)
Can someone help ke decipher this please Cipher Codes 1) From many,one. First cipher: the number of orders 2) From many,one. Second cipher: the creators of the world 3) From many,one. Third cipher: the number of years 4) from many,one, Cipher: 23-8-19-15-4-1 5) from many,one. Cipher: Night Guest In Sorrow 6) from many,one. Cipher: .htlqxubtpkxqpcb
Ryan, Why did you stop man? You are skilled at this, I think you should continue making these videos and organize them into your playlists.
😭❤️ he's saving my semester. But content is limited here
Very nicely done! Thank you for a good, simple and comprehensive video about this!
This was exactly what I was looking for, thanks!
great idea to organize them. It makes it easier. Great suggestion!!
Pretty cool. I want more. Your voice works well with the content
Hi, this is fantastic. Thank you.
wish you had more of these, this is very very useful for my studies
thank you!
short and sweet...thanks for this information.
Great explanation!! thank you for posting this
Best cypher I can come up with, just bored to was something to do
amazing video.............thanx guys for this videos..........thnk u so much
Is for me 👉👈
Is IV used in both Stream and Block cipher, because it is used in CBC as well. Also does hash provide non-repudiation? Thanks!
Can you please let me know what software you used to make this video? I'd appreciate it. Thanks.
It's a Caesar Cipher with different Shifts
3C12A46B7UK10C, a = 1, b=2, ... z=26 shifted numbers and letters like 1 = A, 2 = B... used to map text to cipher and back to the text. Teachers in school never figured it out lol. Worked for more than 5 years
I have successfully learned the term "block cipher" exists.
nice video thank u
Nice Video
Quick and full of knowledge @Ryan Kral
I have homework to do but
why am I here again
Yes sir
thank you, this is the best explanation of block ciphers on the internet!
isnt this ceaser cipher?
yes
@8R4ND0N 3LL1077 CRU23L1 or L337 ;)
doing this is really cool
Yeahhs
I have spent all of my time decoding messages I haven't encoded but only one, is beer cold?
Unique encodes were "given" to me. Expect some pies.
K=%Random Amount of letters replaced% (line one figure 1 numbers 1-9) %Random Line and figure positions for equivalents string% (line 1 figure’s 2-3 numbers 1-9) %random letter string% %random letter string% (first letters are equivalent to second letters makes equivalents string) this cypher is perfect for long paragraph and can be made a little harder , the decoder determines every variable based on the first 3 numbers but these numbers can be put anywhere in the code, the code can also be made more complex by using number letter and symbols as the generated letters strings equivalents making the 3 number nearly impossible to find in the file finally these 3 numbers can be put in a place given a range so the decrypted has to search multiple places to find the correct one meaning hackers can’t use the decrypted code to easily determine the first part of the keys position this would be a pretty good cypher technique for programming and ensure safety from something around 85% if hackers at a guess those left capable would be unlikely to try , the best thing about this is it can be programmed in a simple batch fine and with an exe converted vertion of the encrypted and decrypted it would be really hard to decode the programs
Thank youuuuuuuuuu
thaks allot
How did you get the word face
Nice
Goos but lets say you have the key's as 1 and 4 wouldn't it just be a shift cipher of 5?
Is not this also called Caesar cypher? Can anyone explain? Kind of new to this stuff.
Can someone please explain to me what the difference between a Pseudorandom Permutation and Pseudorandom Function is?
OK!!! I lose my brain cells
I can't even understand
This is what Julius Caesar used to encrypt his message but he shift it to the right 3 times.
This is a Caesar Cypher. The A-Z alphabet is shifted by a certain number (the key). The caesar cypher is very easy to break, apps exist that can break a caesar cypher instantly. Secure networks do not use this method. What is used in cyber security is way more advanced.
im confused, is the bottom row, keys or ciphers?
Probally useless now but the bottem is a shift of the key above it like if you have key 1 and key 2, key 2 would be a shift of key 1 by the number of key 2, or just add all the keys and it's basically the same.
Can please answer my question
EWAZX TFVBHY UIOKM
DECRYPT this to original message of length 3 character
Isn't it just like the shift cipher
Caesar cipher
Excellent video. However, I do think you should be more explicit in identifying the "right-shifting" as "right-rotation", because that's what it really is, and also because I often see students oblivious to the difference. People often say "right-shift" when they mean "right-rotate", and it helps to make students explicitly aware of this "from the jump".
Also, to clear up confusion, a block cipher CAN use Caesar shifting (as in this video). A block cipher, however, unlike Caesar ciphers generally, must operate on fixed-length "blocks" (sets of bits) of data. Keep in mind that block does not mean anything relating to squares or cubes as implied by another comment on this video. Blocks are just sets of bits of fixed length. A block cipher, therefore, simply needs to operate on such a "family" of blocks. (A family is a well-defined set of sets, so a message can be seen as a family of sets of bits.)
search this cryptography research language
Who else is here while playing CALL OF DUTY BLACK OPS COLD WAR?
4 months late but you’re not alone brother! :)
Bola
Can someone help ke decipher this please
Cipher Codes
1) From many,one. First cipher: the number of orders
2) From many,one. Second cipher: the creators of the world
3) From many,one. Third cipher: the number of years
4) from many,one, Cipher: 23-8-19-15-4-1
5) from many,one. Cipher: Night Guest In Sorrow
6) from many,one. Cipher: .htlqxubtpkxqpcb
Caesar cypher
I forgot face was a word and kept pronouncing it 'fack-eh'
This isn't block cipher🤨
Abdef
Fabcde
This is ceaser cipher
ん乇レレの
Idk. I’m here bcoz of zodiac killer
have you take a crack at kryptos
YES! HE ISN'T INDIAN!!!!
I remember back in the day when the word "Racist" actually meant something.
hehe I felt same
Yugi_oh88 Hes probaly american and cant understand a thick indian accent
you bitch....appreciate the way he teaches....not his citizenship
Racism.