Understanding Symmetric & Asymmetric Substitution & Transposition in Cryptography π
Explore the fundamentals of symmetric and asymmetric cryptography, including substitution and transposition techniques, in this comprehensive lesson. Perfect for mastering cryptographic concepts!

Wisdomers - Computer Science and Engineering
360 views β’ May 28, 2024

About this video
Symmetric Asymmetric Substitution Transposition in Cryptography
In this class, We discuss Symmetric Asymmetric Substitution Transposition in Cryptography.
The reader should have prior knowledge of additive cipher. Click Here.
Symmetric Key Cryptography:
If the encryption and decryption use the same key, then we say it is symmetric key cryptography.
Asymmetric Key Cryptography:
If the encryption and decryption use different keys, then we say asymmetric key cryptography.
Substitution method:
Replacing a character in place of another character is called the substitution method.
The additive cipher uses the substitution method.
the character βhβ is replaced with βwβ
Transposition method:
Changing the positions of characters is called the transposition method.
Example:
βhelloβ is changed to βolhelβ.
Link for playlists:
https://www.youtube.com/channel/UCl8x4Pn9Mnh_C1fue-Yndig/playlists
Link for our website: https://learningmonkey.in
Follow us on Facebook @ https://www.facebook.com/learningmonkey
Follow us on Instagram @ https://www.instagram.com/learningmonkey1/
Follow us on Twitter @ https://twitter.com/_learningmonkey
Mail us @ learningmonkey01@gmail.com
In this class, We discuss Symmetric Asymmetric Substitution Transposition in Cryptography.
The reader should have prior knowledge of additive cipher. Click Here.
Symmetric Key Cryptography:
If the encryption and decryption use the same key, then we say it is symmetric key cryptography.
Asymmetric Key Cryptography:
If the encryption and decryption use different keys, then we say asymmetric key cryptography.
Substitution method:
Replacing a character in place of another character is called the substitution method.
The additive cipher uses the substitution method.
the character βhβ is replaced with βwβ
Transposition method:
Changing the positions of characters is called the transposition method.
Example:
βhelloβ is changed to βolhelβ.
Link for playlists:
https://www.youtube.com/channel/UCl8x4Pn9Mnh_C1fue-Yndig/playlists
Link for our website: https://learningmonkey.in
Follow us on Facebook @ https://www.facebook.com/learningmonkey
Follow us on Instagram @ https://www.instagram.com/learningmonkey1/
Follow us on Twitter @ https://twitter.com/_learningmonkey
Mail us @ learningmonkey01@gmail.com
Tags and Topics
Browse our collection to discover more content in these categories.
Video Information
Views
360
Likes
12
Duration
4:07
Published
May 28, 2024
Related Trending Topics
LIVE TRENDSRelated trending topics. Click any trend to explore more videos.
Trending Now