Rail Fence and Row Transposition cipher techniques | Types Of Transposition Techniques
Vložit
- čas přidán 14. 09. 2019
- In this video, I have explained types of transposition techniques in cryptography and network security.
I have explained Rail Fence technique and columnar Transposition technique/ Row Transposition technique in cryptography.
#abhics789 #railfence #RowTransposition
#transposition #Cryptography #NetworkSecurity #ColumnarTransposition
If you learned something new do like and share this video with your friends and don't forget to subscribe to my channel :)
There are lectures related to different subjects on this channel.Do check them out, guys.
Substitution and Transposition techniques:
• Substitution and tran...
Keyless & Keyed Transposition Techniques:
• Keyless and Keyed Tran...
Link is given below:
computer graphics:
• Computer Graphics
engineering economics:
• Engineering Economics
Cryptography :
• Playfair Cipher Algorithm
.Net C# :
• .NET C#
Pointers in C :
• Pointers in C Introduc...
Linked List for Interviews :
• Introduction to Linked...
Java Tricky videos/programs for interviews :
• Java Labelled For Loop...
File Handling in C :
• Reading the contents o...
pointers playlist:
• Pointers in C
C Programming tips and tricks:
• C tricky programs/videos
Abhishek VLOGS :
• #VLOG-1 Riding through...
Concerts :
• Khushboo Grewal concer...
Keep it up thanx for help in my mid term exam...
Tq bro.....all of your videos helped me a lot....God bless🙏🏻
much informative well done
Big Thanks brother ...🙏🙏🙏🙏
Awesome explaination
I love your teaching idea
very well explained
Hi , I love your teaching , is there any way to get then notes in pdf ??? would help immensely
thanks abhishek so helpful
Bro you are the best 🙌
Gud presentation
Life savior 🙏
Too good man ❤️
Thank you
You explain really well, just reduce the number of advertisements in between please, it breaks the concentration. Maybe you can put then all in the beginning and in the end
Excellent
Nice explanation....
very nice video
Nice explaination
Great sir
Love you sir
Please explain decryption technique for these transposition techniques
thank you sir 😍😇
Hey bro can you explain me the same thing given in the 7th edition there i have doubt in their orignal sequence number I m student from the same book but of 7th edition
Man, the video are very good, even a person from a different area can understand this clearly, and can you recommand me a good book on this topic of cryptography
I am referring Cryprtography and network security by Behrouz A Forouzan
And
Cryptography and network security by William Stallings
Thanks a ton for these lectures. It is helping me to understand the concept in a clear way. My university is following the book "Security in Computing" 5th edition by Charles P.Pfleeger. They are recommending us to read the book, which is really a boring thing for me. I am confused about which book you have followed and ignoring reading the suggested book from my university. Is it ok to just follow your lectures for exam preparation? I believe you can advise me in a better way. I just want to avoid reading books and still want to have good preparation by following your videos.
Thank you. :)
Do you have notes of these lectures can you pls share them if you have
@@neghatnazir1668 yes
@@vickymishra7908 notes ho to do
Pdf
What is a letter with 2 same letter need to be encryoted for row transposition ? For eg ‘need’ , how to give values ?
🔥
While explaining row transformation how you decide to take key?
sir in the integer value, key: if the letters are repeated how are they numbered? as you said numbers cannot be repeated
i guess you wont get a key with same characters
In a row transportation what is interger value of key Aabhi..? number should not repeat right..?
we do not need any key in in rail fence cipher right?
Hello sir, In row transposition cipher why we get only 7 columns. Why not get the 6, 8 or 5.
Great explanations
How to many real fence depth we can use
what if key is like striipe so we will take same value for both i?
Bro can you gives use the notes pdf...
This so helpfull for as...
Which book you are using? Can you pls tell?
Asslam u alaikum Sir
Aik question hai kindly answer krdy
Question:
IT Security
Personnel Security
Physical Security
Operational Security
Into which of these would you put the following, justify your choice?
Enforcing hard-to-guess passwords
Encrypting your hard drive
Looking sensitive documents in a safe
Stationing a marine guard outside an embassy
Assigning security clearances to staffers
Using SSL for data transfer
Having off-site backup of documents
Plzzz sir i request you iska answer bta dy plzzzz
How to solve if in the given key an alphabet is repeated in row transposition cipher?
Key will not be given like this
But if it happens then you can give more priority to that alphabet which occurs first in your word
Example AXCC will become 1423
Key kaise likhe ho (integer) pls reply
decryption bhi bata dete guruji to achha hota
what about decryption process?
Separate video
Kyu maje le raha hai 😃😏
bhai cryptography ka playlist hai cryptanalysis ka nhi
Just reverse the word simple
I mean to say reverse the all the step you do
which book you are using?
Sir which book should be best, which includes entire subject topic of CNS
Cryptography and Network Security by Behrouz A. Forouzan
Bhai rotor machine pa bhi ak video bna dain
I am studying this subject through your video not from my teacher , please upload the notes pdf.
Abhishek Sharma is here man
What if the key in row transposition has same alphabets eg: HELLO instead of CRYPTO
bhaiya decrypt kr ke original line kaise laye??
I have a question. What is the difference between row transposition and columnar transposition?
both are same just different name I think..
It is also known as block transposition
How to decrypt it
Sir may I take your notes in PDF from
What if we have 2 same letters in the key for ex key = CRACK in which there are 2 C's.
Or this is not possible n key will always have diff letters ?
In this case priority will be given to repeated alphabet that comes first like in this case CRACK will become 25134.
Respect sir university Student kindly make more course in Hindi in Urdu in Post Quantum Cryptography Please sir
Bro deception kaise. Hoga.
Please send your written notes also
Can you provide notes...
Hi Sir,
Can you please share pdfs of these notes. That will be really appreciated.
Thanks
Have you got the pdf or you made notes..?
pls can you share the notes pls bro
i would be thankful of you
In sab techniques ki decryption kha ha???
Bhaiya I need your advice.
Mere syllabus me DES topic se start hua hai to kya hum Substitution and transpositions technique skip kar de .
Karlo to better rahega
Warna jaha b substitution and transposition use hoga waha clear ni hoga ache se
@@AbhishekSharmaDit ok thanks for the advice
hi sir, how can we get your notes also, kindly give these notes for exam preparation it will help a lot
Have you got the pdf or you made notes..?
Treat due, if I passed in my upcoming semester exam
attack postponed by two hour? broken enigma ! || IMITATION GAME
Bhai Isme.... discription process kaise hoga
book ka name batao bro.
sir can you please share notes ??
Bro sare text ka ek PDF banaker send Kar do
please upload those notes T-T
If you have notes of all these lectures. Please share
bro mujhe bhi chahiye notes!!! tere paas ye notes hai toh bhej sakta hai pls🙏🙏🙏🙏
bro can you share notes if you have of crypto
i would be thankful of you
please give the notes than we understand better
Sir notes kii PDF bii chye sir
Can you share written notes with us ?
Did you get the notes or you made yourself?
@@Kk_2072bro I cleared exam and got the job also 1.5 years of experience I have this is good channel you can make a notes by watching this videos
can i get your notes pdf
learn 2024 for mid term exam
I have same book as u used😅😅
Which book?
Bhai notes hoto pdf me to discrimination link dedo
For which exams will it be helpful??
Colleges exams and any competitive exam in which u have Cryprtography as a subject
@@AbhishekSharmaDit Can we get your notes pleaseeeeeeeee? :)
@@Mr_SSKhave you got the notes or you made?
@@Kk_2072 Yaar, ye sab na yaad dilao, vul chuka hoon mai ye sab boht mushkil se...
Notes?
Bro Please Send the Notes
Book name? Jo video ma ha...
Cryptography and network security by behrouz a forouzan
hey bro...plz share the notes pdf...
Did you get notes ? If yes can you please share
with me also🙏🙏🙏🙏
@@adityapatole9691did you make notes ?
OWP+++
please snap the notes by mob and upload it to drive
Did you get notes ? If yes can you please share
Did you get notes ? If yes can you please share with me also🙏🙏🙏🙏
Nooo
There is no information about hill cipher
We have a dedicated video on this topic. Check the cryptography playlist
I think this is wrong because order should be according to key and you are taking cipher text as 1,2,3.....7 which is totally wrong. Cipher text must be as key order like-4(aodw) 3(tsuo) and so on.
Please look into it otherwise students will get it wrong.
If you are not going to speak in english, please point out that in the title. You waste people's time.
You can find thousands of videos in English, but these all lectures only for Hindi or nearest language...
Bhai yeh notes pdf me share bhi krdete toh bht accha rhta.
Did you get the notes or you made yourself..?