Caesar Cipher (Part 2)
Vložit
- čas přidán 7. 09. 2024
- Network Security: Caesar Cipher (Part 2)
Topics discussed:
1) Classical encryption techniques or Classical cryptosystems.
2) Explanation of Shift ciphers and Caesar ciphers with example.
3) Pros and Cons of shift and Caesar ciphers.
4) Explanation of Brute force attack with cryptanalysis examples.
Follow Neso Academy on Instagram: @nesoacademy (bit.ly/2XP63OE)
Contribute: www.nesoacademy...
Memberships: bit.ly/2U7YSPI
Books: www.nesoacademy...
Website ► www.nesoacademy...
Forum ► forum.nesoacad...
Facebook ► goo.gl/Nt0PmB
Twitter ► / nesoacademy
Music:
Axol x Alex Skrindo - You [NCS Release]
#NetworkSecurityByNeso #Cryptography #NetworkSecurity #CaesarCipher
C = E (P, K), MOD 26 = (P+4)MOD 26 KEY = 4
Q1: Plain text: CRYPTOGRAPHY -> Cipher Text: GVCTXSKVETLC
Q2: NESO = NESO -> Since Key = 0, plaintext remains same as Ciphertext.
Plaintext:- Crypto graphy
Caesar cipher:- GVCTXS KVETLC
Plaintext:- neso
Caesar cipher:- NESO
correct
bro its the shift cipher
1. Plaintext:- Cryptography
Caesar cipher:- GVCTXSKVETLC
2. Plaintext:- neso
Caesar cipher:- NESO
1 -->: Plain text: CRYPTOGRAPHY -> Cipher Text: GVCTXSKVETLC
2 -->: NESO = NESO -> Key = 0, plaintext remains same as Ciphertext.
Waiting for the next video of this series sir...your teaching approach is so amazing ✨
Very Good Explanation sir. As usual, best video about Caesar Cipher on CZcams. Thank You NESO Academy ! 😍
Homework:
Q1: plaintext: cryptography
key: 4
ciphertext: GVCTXSKVETLC
Q2: plaintext: Neso
key: 0
ciphertext: NESO
(1) cryptography =>GVCTXSKVETLC (2) neso it will be same as the plain text hence, neso => NESO
I think while we where applying the brute force, we need to deduce the key form the cipher text whereas it is incremented while the example is shown.
Are there any corrections to it or I didnt get the thing that is being done there
Please help me out here 😶🌫😶🌫
you are right
why u are using encryption algorithm while decrypting the ciphertext into plaintext via brute force approach??
yeah same question from my side
Sm doubt
That was just an example to show that shift cipher is very vulnerable to attacks. I mean if you can crack the code using brute force methods that thing has to be easy and open so basically shift cipher is not secure
because we dont know the key and main aim is to find key so we will do it by brute force when the plain text will be readable we will know that it is the key
@@gopals8 the shifts represented in the example is may be one of the correct key of 25. right.so we can just subract the shift value from cipher text to find the readable text.but here they follow a different approach.This is the actual doubt they asked
Plaintext: Cryptography
Caesar cipher: GVCTXSKVETLC
Plaintext: neso
Caesar cipher: NESO
C = E(P,K) MOD 26
C= (P+K) MOD 26
Plaintext: cryptography
caesar cipher: c=2, k=4=6(G)
GVCTXSKVETLC
Cipher for NESO
K=0
Is: NESO
I watch all videos sir
All the videos are so helpful
Sir. Now I got clear idea sir
Post more lectures sir
Thank you sir
good job man , thank you very much .
Tg🎉
I love you neso ❤❤❤ thank you so much 😊
1. GVCTXSKVETLC
2. NESO
Great presentation 🎉
thank you sir🙏🙏🙏🙏🙏
thank so much!
Can you show us the decryption method
Please, does the key value change at any point
What is symbol in the program???
Have a Doubt ,🤔🤔In the Brute Force attack.. CIPHER TEXT: SQDYMZK , U had explained that from Cipher to Plain Text, formula is P = D(C -- K) mod 26 but u have shifted 1 step forward ...?
Sir please make videos on DBMS
keep it up😇😇😍😍😍
1:13
1st. GVCTXSKVETLC
2nd. Neso
1) GVCTXSKVETLC
2)NESO
Q1: GVCTXSKVETLC
Q2: NESO
Legends focusing on shift = 5
XVIDREP
Why you take key value 4 .. is it necessary?
No it depends on the user to select the shift key
@@ritidipsarkar618 jai balayya
@@sbc498 jai vijaykanth sir
Rsa
Can you translate Arabic
Plaintext:- "cryptography"
Ciphertext:- GVCTXSKVETLC
Plaintext:CRYPTOGRAPHY
ciphertext:GVCTXSKVETLC
cryptography:GVCTXSKVETLC
Neso:NESO
"GVCTXSKVETLC"
"NESO"
cipher text to cryptography -> GVCTXSKVETLC
i. GVCTXSKVETLC
ii. NESO