Python Implementation in CS - Caesar Cipher (Cryptography) | Code Analysis - EP 01 | Ran$ome
Welcome back to the channel guys, in this video we will be talking about how python can be an important tool for the security researchers. We will be discuss...
🔥 Related Trending Topics
LIVE TRENDSThis video may be related to current global trending topics. Click any trend to explore more videos about what's hot right now!
THIS VIDEO IS TRENDING!
This video is currently trending in Thailand under the topic 'สภาพอากาศ'.
About this video
Welcome back to the channel guys, in this video we will be talking about how python can be an important tool for the security researchers. We will be discussing about cryptography and Caesar Cipher in this video and a basic implementation of it.
Caesar Cipher is the earliest form of cryptographic algorithm which works on shifting principle. Shifting principle basically means to assign a different alphabetical/special character value to the initial string which is provided by the user as input. The shifting value which primarily is an integer helps us to identify the difference of the encrypted and the original string. For example - if the shifting value is 4 and string 'A' is given as input by the user then the output value will be 'E' as it's the fourth alphabet after 'A'.
This can be your first programming project which will give you a boost in your Python learning and will help you to write your future projects. You can write more advanced Caesar Cipher algorithms on your own or can even try adding features to the program we used in the video.
Project link - https://github.com/ran-s-ome/CaesarCipher
Do comment if you have any doubt and do like, share and subscribe the channel for more such cybersecurity related content.
Video Information
Views
84
Total views since publication
Likes
3
User likes and reactions
Duration
15:41
Video length
Published
Jul 15, 2022
Release date
Quality
hd
Video definition
About the Channel
Tags and Topics
This video is tagged with the following topics. Click any tag to explore more related content and discover similar videos:
#Cyber Security #Ransome #Ran$ome #Technology #Bug Bounty #Penetraion Testing #Ethical Hacking #Secure Coding #Cryptography #Dev Sec Ops #Cloud Security #Forum #Venture #Startup #Community #Tutorials #Mentorship #Red Teamming #Blue Teamming #SAAS #Training #IT #Block Chain Security #IOT Security #Engineering #Exif Meta Data #Weak Login Functionality #SSL #CSRF #Cross Site Request Forgery #OAuth #Broken Link Hijacking
Tags help categorize content and make it easier to find related videos. Browse our collection to discover more content in these categories.