Caesar Cipher | Caesar Substitution Cipher | Cryptography series | Eng - Hindi | Tutorial-1
#AskFaizan | #syedfaizanahmad Playfair Substitution Cipher https://youtu.be/w_xr7pj-O6c Monoalphabetic Substitution Cipher https://youtu.be/Hw1T7GOnVW0 C...
🔥 Related Trending Topics
LIVE TRENDSThis video may be related to current global trending topics. Click any trend to explore more videos about what's hot right now!
THIS VIDEO IS TRENDING!
This video is currently trending in Bangladesh under the topic 's'.
About this video
#AskFaizan | #syedfaizanahmad
Playfair Substitution Cipher https://youtu.be/w_xr7pj-O6c
Monoalphabetic Substitution Cipher https://youtu.be/Hw1T7GOnVW0
Caesar Cipher | Caesar Substitution Cipher https://youtu.be/2N9GlhysYJw
PlayList : Cryptography and Network Security : https://www.youtube.com/playlist?list=PLhwpdymnbXz7hvvqhqjIIG4tEdhAgQqll
The Caesar cipher is one of the earliest known and simplest ciphers.
It is a type of substitution cipher in which each letter in the plaintext is 'shifted' a certain number of places down the alphabet.
For example, with a shift of 1, A would be replaced by B, B would become C, and so on.
The method is named after Julius Caesar, who apparently used it to communicate with his generals.
The algorithm can be expressed as
For each plaintext letter p , substitute the ciphertext letter C
C = E(k, p) = (p + k) mod 26
Where k takes on a value in the range 1 to 25.
The decryption algorithm is simply
p = D(k, C) = (C - k) mod 26
Drawbacks - Caesar Cipher is one of the weakest forms of encryption as
The key space is very small. Using a brute force attack method, one could easily try all (25) possible combinations to decrypt the message without initially knowing the key.
The language of the plaintext is known and easily recognizable.
Cryptanalysis: Cryptanalytic attacks rely on the nature of the algorithm plus perhaps some knowledge of the general characteristics of the plaintext or even some sample plaintext–ciphertext pairs.
Brute-force attack: The attacker tries every possible key on a piece of ciphertext until an intelligible translation into plaintext is obtained. On average, half of all possible keys must be tried to achieve success.
#askfaizan | #syedfaizanahmad
Video Information
Views
1.6K
Total views since publication
Likes
14
User likes and reactions
Duration
6:45
Video length
Published
Aug 3, 2018
Release date
Quality
hd
Video definition
About the Channel
Tags and Topics
This video is tagged with the following topics. Click any tag to explore more related content and discover similar videos:
#network security #substitution cipher #substitution techniques #transposition cipher decryption #substitution cipher tutorial #substitution cipher la noire #substitution techniques in cryptography #substitution techniques in cryptography with examples #substitution techniques in information security #substitution techniques in hindi #caesar cipher algorithm #caesar cipher decryption #caesar cipher example in cryptography #caesar cipher solution ##askfaizan #ask faizan
Tags help categorize content and make it easier to find related videos. Browse our collection to discover more content in these categories.