Hill Cipher Encryption and Decryption with Numerical | Everything about Hill Cipher

Sdílet
Vložit
  • čas přidán 19. 09. 2019
  • Hello friends! Welcome to my channel.
    My name is Abhishek Sharma.#abhics789 #AbhishekDit
    In this video, i have explained the concept of HILL CIPHER ENCRYPTION AND DECRYPTION with numerical example in Cryptography and Network Security.
    If you learned something new do like and share this video with your friends and don't forget to subscribe to my channel :)
    There are lectures related to different subjects on this channel.Do check them out, guys.
    Substitution and Transposition techniques:
    • Substitution and tran...
    Link is given below:
    computer graphics:
    • Computer Graphics
    engineering economics:
    • Engineering Economics
    Cryptography :
    • Playfair Cipher Algorithm
    .Net C# :
    • .NET C#
    Pointers in C :
    • Pointers in C Introduc...
    Linked List for Interviews :
    • Introduction to Linked...
    Java Tricky videos/programs for interviews :
    • Java Labelled For Loop...
    File Handling in C :
    • Reading the contents o...
    pointers playlist:
    • Pointers in C
    C Programming tips and tricks:
    • C tricky programs/videos
    Abhishek VLOGS :
    • #VLOG-1 Riding through...
    Concerts :
    • Khushboo Grewal concer...

Komentáře • 185

  • @hareemkhan7900
    @hareemkhan7900 Před 3 lety +7

    MindBlowing explaination ...... saw your video without giving pause

  • @amishmishra761
    @amishmishra761 Před rokem +12

    Hats off to you sir for such a great explanation!

  • @kuhar98
    @kuhar98 Před rokem +2

    Best ever lecture on youtube for hill cipher

  • @chinni438
    @chinni438 Před 4 lety +11

    Really osm teaching very very nice tnq for making this vedio .

  • @vakayamini3782
    @vakayamini3782 Před 3 lety +9

    That's very clear and awesome explanation 🔥

  • @ritikachourasia5635
    @ritikachourasia5635 Před 2 lety +4

    best ever explained theorems .. really handsoff to u❣

  • @romarai3050
    @romarai3050 Před 2 lety +2

    Bht sahi bhaiya...kafi time se problem ho rha tha isme ab ekdm mst samjh aa gya..thank you

  • @prachidoshi9082
    @prachidoshi9082 Před 3 lety +1

    Best explanation on Information Security

  • @akankshasingh7866
    @akankshasingh7866 Před rokem +2

    thank you sir for providing a mind-blowing video

  • @AbdulRafay-vi6hz
    @AbdulRafay-vi6hz Před 3 lety +12

    good job brother....I was not able to understand the decryption before but I can handle any hill decryption like a champ...Thank you

    • @AbdulRafay-vi6hz
      @AbdulRafay-vi6hz Před 3 lety

      @Malik Oakley nice

    • @AbdulRafay-vi6hz
      @AbdulRafay-vi6hz Před 3 lety

      @Daniel Briggs flexZone is some kind of Online lectures or what is it??. Can you explain ?

  • @rashmisinha7228
    @rashmisinha7228 Před 4 lety +2

    Very nice explanation.. Great efforts

  • @PiyushMaurya007
    @PiyushMaurya007 Před 3 lety +1

    Keep up with the great work dude!!

  • @santhoshs7028
    @santhoshs7028 Před rokem +1

    Beautiful explanation. Thank You. Make more videos.....

  • @thecatinamorato838
    @thecatinamorato838 Před 3 lety +1

    very much helpful..thnx for ur teaching...

  • @musharafkhan7935
    @musharafkhan7935 Před 3 měsíci +1

    Arayyyyy Yarrr Mashallah kiya amazing Explanation hay ❤❤❤❤❤❤

  • @anjalirastogi5203
    @anjalirastogi5203 Před 4 lety +1

    Bhai tum bahut sahi video banaye ho ! Keep it up

  • @farishamdani5045
    @farishamdani5045 Před 2 lety +16

    Can you please share these hand written notes? That would be really helpful.

  • @savitaverma3469
    @savitaverma3469 Před 3 lety

    Too good. Very well explanation u gave

  • @xyz-pc3tl
    @xyz-pc3tl Před 2 lety

    Thanks a lot for your all Hardwork 🙏🙏🙏

  • @harshithap2620
    @harshithap2620 Před 5 měsíci

    Very easiest method thought it was very helpful thankyou

  • @osamakhalid6315
    @osamakhalid6315 Před 4 lety +1

    Very nice explanation brother.

  • @bosigaribayapureddy1671
    @bosigaribayapureddy1671 Před 4 lety +1

    I am fully understanded. Tqu

  • @dollydewangan8964
    @dollydewangan8964 Před 3 lety

    Very very nice explanation sir thank you so much sir 🙏

  • @tesem5741
    @tesem5741 Před 3 lety +1

    Thank you yrrr .lectures online horahe h kuch b nhi samjta usme

  • @fahimmuhammadkhan3874

    You are gem, Well delievered Sir,,, Respect

  • @thusharag.a.5184
    @thusharag.a.5184 Před 3 lety +1

    really good one

  • @sowbaranikag6514
    @sowbaranikag6514 Před 7 měsíci +1

    thanks a lot! u solved my doubt!😊🙏🙏🙏thankyou!

  • @akulupadhyay
    @akulupadhyay Před 3 lety +75

    Can you provide a link to these hand notes ? It will be very appreciated ❤️

    • @lokeshkumar4827
      @lokeshkumar4827 Před rokem +20

      man's ignoring all the comments regarding notes :')

  • @bhaveshthakor5389
    @bhaveshthakor5389 Před 3 lety

    so informative ❤️❤️

  • @lightdrops227
    @lightdrops227 Před 2 lety

    Zbrdast explaination

  • @anushkatyagi2062
    @anushkatyagi2062 Před 3 lety +10

    Sir pls provide pdf of these notes.. It will be very helpful

  • @M.RaoUbaid1410
    @M.RaoUbaid1410 Před rokem +1

    Nice keep it up❤

  • @muskan1154
    @muskan1154 Před 4 lety +1

    Crisp clear

  • @pawankumarpandit1822
    @pawankumarpandit1822 Před 9 měsíci +1

    thank you bhaiya so much it is amazing video

  • @satishreddy9766
    @satishreddy9766 Před 3 lety +4

    What is plain text contains odd number length and how to convert it into 2×2 matrix

  • @creed_forever
    @creed_forever Před 2 měsíci

    Thank you very much.

  • @ArbazKhan-md6zj
    @ArbazKhan-md6zj Před 3 lety +1

    Very interesting

  • @ashishtiwari1052
    @ashishtiwari1052 Před rokem +1

    Thankyou 😊

  • @aarivsingh0607
    @aarivsingh0607 Před 3 měsíci

    in decryption for finding inv(d) we can use inv(d)=(1+x*26)/d, where x is a constant

  • @yogendragavli2646
    @yogendragavli2646 Před 2 lety

    awsome amazing

  • @hipstergaming5651
    @hipstergaming5651 Před 4 lety +1

    Sir jo great ho

  • @muhammadsaad4036
    @muhammadsaad4036 Před rokem

    very good sir...

  • @hope_less
    @hope_less Před rokem

    1 ghante mai paper hai aur meko yeh channel abhi mila 🥲

  • @keyurpanchal9929
    @keyurpanchal9929 Před 4 lety +2

    Nice videos sir.... Can you please make a video on how to find multiplicative inverse in big numbers and it's methodology.?

    • @AbhishekSharmaDit
      @AbhishekSharmaDit  Před 4 lety +1

      I have uploaded a video on how to find multiplicative inverse
      U can check the playlist

  • @anshujoshi3622
    @anshujoshi3622 Před 3 lety +1

    What to do if 'd' is an even number? Then d*(d-inverse)mod 26 will never be 1. Please answer.

  • @lionesslady6795
    @lionesslady6795 Před 3 lety

    thank you

  • @priyanshubharti5680
    @priyanshubharti5680 Před 4 lety +4

    Nice video sir......easy explanation.....btw which book are u referring???

    • @AbhishekSharmaDit
      @AbhishekSharmaDit  Před 4 lety +11

      Cryptography and network security by William Stallings.
      And
      Cryptography and network security by Behrouz A Forouzan and Debdeep
      Mukhopadhyay

  • @pratikshadubey4307
    @pratikshadubey4307 Před 3 lety +1

    If the value of d inverse is negative then what should we do???

  • @gulshanyadav5918
    @gulshanyadav5918 Před 3 lety

    use extended euclidean algorithm to find d inverse.

  • @chiragmd8565
    @chiragmd8565 Před 2 lety

    love you bhai

  • @mansisengar6625
    @mansisengar6625 Před 4 lety +1

    nice sir

  • @SivaKumar-rv1nn
    @SivaKumar-rv1nn Před 3 lety

    Thanks sir

  • @rimsha4519
    @rimsha4519 Před 3 lety

    thanks for help

  • @Strawberry-oz1qu
    @Strawberry-oz1qu Před 3 lety +6

    I have a doubt, what to do if the plain text has odd number of letters. Eg;- ant, or plane because one column of the last matrix would be empty.

    • @alkayadav9064
      @alkayadav9064 Před 3 lety +4

      then aap pair bana sakte ho x use kar k ......
      eg; ant
      -> an tx..... is tarah

    • @Strawberry-oz1qu
      @Strawberry-oz1qu Před 3 lety

      @@alkayadav9064 oh ok. Thanks a lot ma'am.

  • @rimsha6001
    @rimsha6001 Před 2 lety

    Asslam u alaikum Sir
    Aik question hai kindly answer krdy
    Question:
    IT Security
    Personnel Security
    Physical Security
    Operational Security
    Into which of these would you put the following, justify your choice?
     Enforcing hard-to-guess passwords
     Encrypting your hard drive
     Looking sensitive documents in a safe
     Stationing a marine guard outside an embassy
     Assigning security clearances to staffers
     Using SSL for data transfer
     Having off-site backup of documents
    Plzzz sir i request you iska answer bta dy plzzzz

  • @viralvideos9227
    @viralvideos9227 Před 3 lety +5

    i have a small doubt what if the length of plain text is odd??

  • @aroraji7173
    @aroraji7173 Před 3 lety

    I have a doubt in a question related to Hill cipher will you plz solve it?
    How should i send you that question?

  • @prashantSharma-ht9po
    @prashantSharma-ht9po Před 2 lety

    Liked 👍

  • @co_be_b69_tusharpatil61

    Bhai tussi gr8 ho

  • @dishapanjwani9367
    @dishapanjwani9367 Před 2 lety

    yeah, can u please provide those handwritten notes?

  • @rajudebnath6353
    @rajudebnath6353 Před 4 lety +2

    👌👌👌👌👌

  • @NiteshKumar-vk72
    @NiteshKumar-vk72 Před 2 lety

    kese ho bhaiii...smbhl k rhna encrypt krdunga

  • @mdazam2315
    @mdazam2315 Před 3 lety +1

    Sir if you don't mind pls provide your lecture notes pdf...

  • @guestofallah7661
    @guestofallah7661 Před 3 lety +2

    Thanks but what if I have a plaintext (8 letters ) and key (3 letters)?

  • @muhammdyazdan1192
    @muhammdyazdan1192 Před měsícem

    Nice

  • @Jerry02vdm
    @Jerry02vdm Před 2 lety

    thanks

  • @souhardyahalder3903
    @souhardyahalder3903 Před 10 měsíci

    what happens if the length of plain text is odd in hill cipher and 2x2 matrix given as key

  • @muneebwaqas400
    @muneebwaqas400 Před 10 měsíci +3

    @Abhishek Sharma How can we decide that whether if we want a 3X3 key or 2X2 key?

    • @creed_forever
      @creed_forever Před 2 měsíci

      Depends on the length of key text. If key length is 4 then 2x2 if key length is 9 then 3x3. Add filler letters if the length of key text is not a perfect square.

  • @GurpreetSingh-gs7vb
    @GurpreetSingh-gs7vb Před 3 lety

    timestamp 15:00 - before decryption , how we have remove -ve values (add 26 to -ve no.) , if value is let -343 then how ?

  • @prasadmathpati1784
    @prasadmathpati1784 Před 3 lety

    Sir... Determinant value is 131 .then what is it's inverse..... Please tell sir

  • @indusounkhla7576
    @indusounkhla7576 Před 8 měsíci

    Why you hv taken 2*1 matrix for AT ,should we take 1*2 matrix if not thn why?

  • @chiragvyas3461
    @chiragvyas3461 Před 3 lety +1

    plain text should be converted into 1*n matric

  • @manojjain264
    @manojjain264 Před 4 lety +1

    Is it necessary to take value of A=0?? Can we take a=1 and so on with other alphabets??

    • @AbhishekSharmaDit
      @AbhishekSharmaDit  Před 4 lety +5

      As a standard we use a=0 b is 1 and so on
      So that if we take modulus with 26 we can get the values as 0,1,2 ....
      But of we use A=1 B=2 ....
      Then Z Will be 26
      And 26 mod 26 will be 0 and that will be an exception
      But its not wrong you can then divide by 27 then
      But its not given anywhere so u can google it out for details

  • @sahilprasantachoudhury911

    Self referential note: This topic is important

  • @kabirajmeri8229
    @kabirajmeri8229 Před 2 lety

    sir your teaching method is great ,love from ahmedabad

  • @siddhantsingh6578
    @siddhantsingh6578 Před 3 lety

    Hm d ka inverse na nikale aur determinant se divide kr de to?

  • @kavitabhosale2397
    @kavitabhosale2397 Před 3 lety +1

    what if the value is repeated in one column ? eg. TT ?
    can we replace it by TX like playfair matrix ?
    suppose place at ten
    [P] [A] [E] [T] [E]
    [L] [C] [A] [T] [N]
    is this correct or we have replace one T by X?

    • @nihalmohammed9619
      @nihalmohammed9619 Před 2 lety

      DID U HAPPENED TO FOUND OUT WHAT WE HAVE TO DO IN THIS CASE?

    • @basicmaths8026
      @basicmaths8026 Před rokem

      Repitition is not allowed in playfair matrix.. its against the rule..if we have a alphabet which is 3 times repeated we will just consider it once

  • @shreshthatripathi8861
    @shreshthatripathi8861 Před 2 lety +1

    If we have determinent value and adj value then what is the need to find multiplicative inverse of determinent..??

    • @arunkc9147
      @arunkc9147 Před 6 měsíci

      Because key must be in whole number not in fraction, if suppose |k|=5 and we directly do 1/|k| we get fraction value in final value of k inverse.
      To make clear why we take whole number only, is because letters of alphabet are arranged from 0-25, if it's 0, then we say it's letter a, if it's 1 then its letter b, but if k is in fraction like 1/2, what should we replace? So for this we don't directly calculate 1/|k|,

  • @dharma_reddy
    @dharma_reddy Před 3 lety +1

    How to find inverse if we get the determinant of the key matrix an even number. I think we cant do the same process if we get determinant an even number where we cannot find inverse using this method. Can you do the same problem using key matrix[1 7;9 3].

  • @mariyamamreen439
    @mariyamamreen439 Před 2 lety

    Determint me 26 se bra b ae to kia usse ase hi le k jna ha next k mod Lena ha phel??

  • @windowsmaster786
    @windowsmaster786 Před 2 lety

    Hill cipher is a polygraphic substitution cipher

  • @tahaahmed9787
    @tahaahmed9787 Před 4 lety +1

    If determinant value comes negative then what we will do like -3 then ?

  • @chetandivekar1813
    @chetandivekar1813 Před 2 lety

    Why you cannot take the attack as
    [A T T
    A C K]
    so the k is 2×2 matrix and p is 2×3 which can me multiplective matrix and the resultant matrix is 2×3

  • @ferozahmad6934
    @ferozahmad6934 Před 3 lety

    in decrypt part sir why you use mod 26 twice ...

  • @illonaroyce4625
    @illonaroyce4625 Před 2 lety

    Sir 3×1/3 SE b answer 1 ayega to 9 SE multiple krna zaroori hy Kiya ????

  • @sadiashamas786
    @sadiashamas786 Před rokem

    Bhai adjoint ma 26 q add kia ha koi or bi kr skty ha kia?

  • @vipulshrma8
    @vipulshrma8 Před 3 lety

    Hmm

  • @m.azeemaslam2872
    @m.azeemaslam2872 Před 4 lety

    how to convert 5 letter into hill cipher for example hello

  • @marwakharal1148
    @marwakharal1148 Před 3 lety

    Agr value 26 sy 6oti aa jaye to phir kia krain...mod 26 kesay lain??

  • @ShreeHarivansh-ip3jl
    @ShreeHarivansh-ip3jl Před 3 lety

    Can u plz recomnd any app or site ....how to decode the whatsapp mailed chat ....its so cunfusion there....plz recomnd a site or an app.

  • @salilchandan4196
    @salilchandan4196 Před 2 lety

    what if determinant is negative?

  • @TusharSharma_11
    @TusharSharma_11 Před rokem

    Bhaiya tum humare jeevan me bhagwan bankar aagaye tumne to humari zindagi sawaar di kal crypto ka paper ha . 🥲🥲

  • @jawedakhtar3929
    @jawedakhtar3929 Před 3 lety +1

    Question:- The hill cipher uses the key
    k=3 2
    5 7
    Obtain the decryption key to used for deccipher the cipher text.
    Using your method i got the value of
    k inverse = 58 38
    95. 133
    Now how to convert it into alphabet?

  • @yoshitha12
    @yoshitha12 Před rokem

    What if the key is not a square matrix?

  • @mariyamamreen439
    @mariyamamreen439 Před 2 lety

    Determint negative a jae to next kia krein????

  • @AshishKumarDwivedi
    @AshishKumarDwivedi Před rokem

    how you can multiply 2*1 matrix with 2*2 matrix

  • @aadityakant7329
    @aadityakant7329 Před rokem

    Hello bhiya
    Hill cipher ke liye kon sa book follow kiye hai , bataeye
    Jaruri hai
    Book name please 🙏

  • @pratikkumar9323
    @pratikkumar9323 Před 4 lety

    Bro if key is "CURD" than how to decrypt ciphet text.... Please tell me.... because determinant value comes in minus and many problems......🙏

  • @vishnus2567
    @vishnus2567 Před 3 lety +1

    what if the plain text contains only 7 letters? how we can we can arrange it as vectors?

    • @ashutoshgangwar1638
      @ashutoshgangwar1638 Před 2 lety

      You may add filler(bogus) letters and after decryption remove them

  • @coffeewithboys4582
    @coffeewithboys4582 Před měsícem

    17:13 revision