Hill Cipher Encryption and Decryption with Numerical | Everything about Hill Cipher
Vložit
- čas přidán 19. 09. 2019
- Hello friends! Welcome to my channel.
My name is Abhishek Sharma.#abhics789 #AbhishekDit
In this video, i have explained the concept of HILL CIPHER ENCRYPTION AND DECRYPTION with numerical example in Cryptography and Network Security.
If you learned something new do like and share this video with your friends and don't forget to subscribe to my channel :)
There are lectures related to different subjects on this channel.Do check them out, guys.
Substitution and Transposition techniques:
• Substitution and tran...
Link is given below:
computer graphics:
• Computer Graphics
engineering economics:
• Engineering Economics
Cryptography :
• Playfair Cipher Algorithm
.Net C# :
• .NET C#
Pointers in C :
• Pointers in C Introduc...
Linked List for Interviews :
• Introduction to Linked...
Java Tricky videos/programs for interviews :
• Java Labelled For Loop...
File Handling in C :
• Reading the contents o...
pointers playlist:
• Pointers in C
C Programming tips and tricks:
• C tricky programs/videos
Abhishek VLOGS :
• #VLOG-1 Riding through...
Concerts :
• Khushboo Grewal concer...
MindBlowing explaination ...... saw your video without giving pause
Hats off to you sir for such a great explanation!
Best ever lecture on youtube for hill cipher
Really osm teaching very very nice tnq for making this vedio .
That's very clear and awesome explanation 🔥
best ever explained theorems .. really handsoff to u❣
Bht sahi bhaiya...kafi time se problem ho rha tha isme ab ekdm mst samjh aa gya..thank you
Best explanation on Information Security
thank you sir for providing a mind-blowing video
good job brother....I was not able to understand the decryption before but I can handle any hill decryption like a champ...Thank you
@Malik Oakley nice
@Daniel Briggs flexZone is some kind of Online lectures or what is it??. Can you explain ?
Very nice explanation.. Great efforts
Keep up with the great work dude!!
Beautiful explanation. Thank You. Make more videos.....
very much helpful..thnx for ur teaching...
Arayyyyy Yarrr Mashallah kiya amazing Explanation hay ❤❤❤❤❤❤
Bhai tum bahut sahi video banaye ho ! Keep it up
Can you please share these hand written notes? That would be really helpful.
Too good. Very well explanation u gave
Thanks a lot for your all Hardwork 🙏🙏🙏
Very easiest method thought it was very helpful thankyou
Very nice explanation brother.
I am fully understanded. Tqu
Very very nice explanation sir thank you so much sir 🙏
Thank you yrrr .lectures online horahe h kuch b nhi samjta usme
You are gem, Well delievered Sir,,, Respect
really good one
thanks a lot! u solved my doubt!😊🙏🙏🙏thankyou!
Can you provide a link to these hand notes ? It will be very appreciated ❤️
man's ignoring all the comments regarding notes :')
so informative ❤️❤️
Zbrdast explaination
Sir pls provide pdf of these notes.. It will be very helpful
Nice keep it up❤
Crisp clear
thank you bhaiya so much it is amazing video
What is plain text contains odd number length and how to convert it into 2×2 matrix
Thank you very much.
Very interesting
Thankyou 😊
in decryption for finding inv(d) we can use inv(d)=(1+x*26)/d, where x is a constant
awsome amazing
Sir jo great ho
very good sir...
1 ghante mai paper hai aur meko yeh channel abhi mila 🥲
Nice videos sir.... Can you please make a video on how to find multiplicative inverse in big numbers and it's methodology.?
I have uploaded a video on how to find multiplicative inverse
U can check the playlist
What to do if 'd' is an even number? Then d*(d-inverse)mod 26 will never be 1. Please answer.
thank you
Nice video sir......easy explanation.....btw which book are u referring???
Cryptography and network security by William Stallings.
And
Cryptography and network security by Behrouz A Forouzan and Debdeep
Mukhopadhyay
If the value of d inverse is negative then what should we do???
use extended euclidean algorithm to find d inverse.
love you bhai
nice sir
Thanks sir
thanks for help
I have a doubt, what to do if the plain text has odd number of letters. Eg;- ant, or plane because one column of the last matrix would be empty.
then aap pair bana sakte ho x use kar k ......
eg; ant
-> an tx..... is tarah
@@alkayadav9064 oh ok. Thanks a lot ma'am.
Asslam u alaikum Sir
Aik question hai kindly answer krdy
Question:
IT Security
Personnel Security
Physical Security
Operational Security
Into which of these would you put the following, justify your choice?
Enforcing hard-to-guess passwords
Encrypting your hard drive
Looking sensitive documents in a safe
Stationing a marine guard outside an embassy
Assigning security clearances to staffers
Using SSL for data transfer
Having off-site backup of documents
Plzzz sir i request you iska answer bta dy plzzzz
i have a small doubt what if the length of plain text is odd??
Add bogus character
I have a doubt in a question related to Hill cipher will you plz solve it?
How should i send you that question?
Liked 👍
Bhai tussi gr8 ho
yeah, can u please provide those handwritten notes?
👌👌👌👌👌
kese ho bhaiii...smbhl k rhna encrypt krdunga
Sir if you don't mind pls provide your lecture notes pdf...
Thanks but what if I have a plaintext (8 letters ) and key (3 letters)?
Nice
thanks
what happens if the length of plain text is odd in hill cipher and 2x2 matrix given as key
@Abhishek Sharma How can we decide that whether if we want a 3X3 key or 2X2 key?
Depends on the length of key text. If key length is 4 then 2x2 if key length is 9 then 3x3. Add filler letters if the length of key text is not a perfect square.
timestamp 15:00 - before decryption , how we have remove -ve values (add 26 to -ve no.) , if value is let -343 then how ?
Add 26 till u get positve value
Sir... Determinant value is 131 .then what is it's inverse..... Please tell sir
Why you hv taken 2*1 matrix for AT ,should we take 1*2 matrix if not thn why?
plain text should be converted into 1*n matric
Is it necessary to take value of A=0?? Can we take a=1 and so on with other alphabets??
As a standard we use a=0 b is 1 and so on
So that if we take modulus with 26 we can get the values as 0,1,2 ....
But of we use A=1 B=2 ....
Then Z Will be 26
And 26 mod 26 will be 0 and that will be an exception
But its not wrong you can then divide by 27 then
But its not given anywhere so u can google it out for details
Self referential note: This topic is important
sir your teaching method is great ,love from ahmedabad
Hm d ka inverse na nikale aur determinant se divide kr de to?
what if the value is repeated in one column ? eg. TT ?
can we replace it by TX like playfair matrix ?
suppose place at ten
[P] [A] [E] [T] [E]
[L] [C] [A] [T] [N]
is this correct or we have replace one T by X?
DID U HAPPENED TO FOUND OUT WHAT WE HAVE TO DO IN THIS CASE?
Repitition is not allowed in playfair matrix.. its against the rule..if we have a alphabet which is 3 times repeated we will just consider it once
If we have determinent value and adj value then what is the need to find multiplicative inverse of determinent..??
Because key must be in whole number not in fraction, if suppose |k|=5 and we directly do 1/|k| we get fraction value in final value of k inverse.
To make clear why we take whole number only, is because letters of alphabet are arranged from 0-25, if it's 0, then we say it's letter a, if it's 1 then its letter b, but if k is in fraction like 1/2, what should we replace? So for this we don't directly calculate 1/|k|,
How to find inverse if we get the determinant of the key matrix an even number. I think we cant do the same process if we get determinant an even number where we cannot find inverse using this method. Can you do the same problem using key matrix[1 7;9 3].
I agree with you
Determint me 26 se bra b ae to kia usse ase hi le k jna ha next k mod Lena ha phel??
Hill cipher is a polygraphic substitution cipher
If determinant value comes negative then what we will do like -3 then ?
then -3 mod 26
Why you cannot take the attack as
[A T T
A C K]
so the k is 2×2 matrix and p is 2×3 which can me multiplective matrix and the resultant matrix is 2×3
in decrypt part sir why you use mod 26 twice ...
Sir 3×1/3 SE b answer 1 ayega to 9 SE multiple krna zaroori hy Kiya ????
Bhai adjoint ma 26 q add kia ha koi or bi kr skty ha kia?
Hmm
how to convert 5 letter into hill cipher for example hello
Agr value 26 sy 6oti aa jaye to phir kia krain...mod 26 kesay lain??
Can u plz recomnd any app or site ....how to decode the whatsapp mailed chat ....its so cunfusion there....plz recomnd a site or an app.
what if determinant is negative?
Bhaiya tum humare jeevan me bhagwan bankar aagaye tumne to humari zindagi sawaar di kal crypto ka paper ha . 🥲🥲
Question:- The hill cipher uses the key
k=3 2
5 7
Obtain the decryption key to used for deccipher the cipher text.
Using your method i got the value of
k inverse = 58 38
95. 133
Now how to convert it into alphabet?
K inverse mod 26
What if the key is not a square matrix?
Determint negative a jae to next kia krein????
how you can multiply 2*1 matrix with 2*2 matrix
Hello bhiya
Hill cipher ke liye kon sa book follow kiye hai , bataeye
Jaruri hai
Book name please 🙏
Bro if key is "CURD" than how to decrypt ciphet text.... Please tell me.... because determinant value comes in minus and many problems......🙏
What is your p?
what if the plain text contains only 7 letters? how we can we can arrange it as vectors?
You may add filler(bogus) letters and after decryption remove them
17:13 revision