Cybersecurity | Cryptography | Caesar Cipher
#cybersecurity #databreach #datarisk #cybersecuritygoals #breachimpact #cryptography #substitutionciphers #transpositionciphers #confidentiality #integrity #...
🔥 Related Trending Topics
LIVE TRENDSThis video may be related to current global trending topics. Click any trend to explore more videos about what's hot right now!
THIS VIDEO IS TRENDING!
This video is currently trending in South Korea under the topic 'cybersecurity news today'.
About this video
#cybersecurity #databreach #datarisk #cybersecuritygoals #breachimpact #cryptography #substitutionciphers #transpositionciphers #confidentiality #integrity #authentication #nonrepudiation #symmetriccryptography #caesarcipher #privatekey #secretkeys #alicebob #moderncryptography #algorithms #historicalcryptography #scrambling
* Hello everyone, welcome back, in this video, I am explaining historical cryptography with python code implementation (in PyCharm IDE) for Caesar Cipher !
* Two primary types of non-math cryptography / ciphering methods for scrambling
I. Substitution Ciphers
II. Transposition Ciphers
* Encrypt letter function in Python with two arguments, letter & shift
1. Convert the letter to ASCII value, use ord ( ) function
2. Add the shift value to the converted ASCII value
3. Convert back final value to character, use chr ( ) function
4. Return the converted character
* YouTube channel link: https://www.youtube.com/@NareshKSHETRI
* Cybersecurity playlist in my Channel: https://www.youtube.com/playlist?list=PL7-xjgCdZq85ZwT6L6UHLc39rGGGX60Wc
* Python code in GitHub repository: https://github.com/kshetrinaresh/CybSec
* LinkedIn (let us connect): https://www.linkedin.com/in/NareshKshetri/
* Website (Google Sites): https://sites.google.com/view/NareshKshetri
* Please like, share, & subscribe if the video was helpful !
Video Information
Views
104
Total views since publication
Likes
7
User likes and reactions
Duration
4:52
Video length
Published
Sep 25, 2024
Release date
Quality
hd
Video definition
About the Channel
Tags and Topics
This video is tagged with the following topics. Click any tag to explore more related content and discover similar videos:
#cybersecurity #historical cryptography #substitution cipher #transposition cipher #non-math cryptography #ciphering method #secrecy #security controls #authentication #nonrepudiation #confidentiality #integrity #asymmetric #private key #alice bob #asymmetric cryptography #modern cryptography #key agreement #encryption algorithm #symmetric and asymmetric algorithm #not scalable #symmetric key #key regeneration #caesar cipher #python programming #scrambling characters
Tags help categorize content and make it easier to find related videos. Browse our collection to discover more content in these categories.