1 00:00:00,420 --> 00:00:02,760 So let's talk about this decision to save lives. 2 00:00:03,330 --> 00:00:11,010 We have already seen the substitution for substitute the brain by some other characters, so the characters 3 00:00:11,010 --> 00:00:13,380 are brain substituted by other characters. 4 00:00:13,860 --> 00:00:17,930 And the weakness of these operations over there can easily be brute force. 5 00:00:18,300 --> 00:00:24,750 So you can try all the combination of substitute characters and you can get a meaningful plaintext in 6 00:00:24,750 --> 00:00:30,010 one attempt and then the advantages can easily be encrypted. 7 00:00:31,170 --> 00:00:35,790 So let's see some examples of these obstetrician's efforts to get more idea about this. 8 00:00:37,380 --> 00:00:43,590 So first one, we're going to see the scissors four, and this is the very basics if you people that 9 00:00:43,590 --> 00:00:45,090 come to know when you're. 10 00:00:46,650 --> 00:00:52,080 So what deciphered the stories you need to write down all the alphabets. 11 00:00:52,200 --> 00:00:54,890 And these alphabet contains something indexes. 12 00:00:55,230 --> 00:00:59,730 So Index B's, one index and so on up to the this index. 13 00:00:59,910 --> 00:01:06,150 So we have indexes of integer are from zero point zero one, two, three, four, five, six and so 14 00:01:06,150 --> 00:01:06,240 on. 15 00:01:07,470 --> 00:01:12,890 So if you have a plain text and you pick, you have to apply character-based. 16 00:01:13,680 --> 00:01:17,070 So you take the first character and find that index. 17 00:01:17,490 --> 00:01:21,360 So after finding that index, you need to determine some key. 18 00:01:22,110 --> 00:01:28,640 So this is where you need to determine some key and you need to add that index to it. 19 00:01:28,890 --> 00:01:38,310 So index Peski, you get some value and what you want you want to do better is because if the value 20 00:01:38,310 --> 00:01:44,700 of index is like 20 and if there is value of the gift, then it will go out of this table. 21 00:01:44,820 --> 00:01:45,130 Right. 22 00:01:45,150 --> 00:01:49,240 Because the limit is twenty and we get 30 on addition. 23 00:01:49,530 --> 00:01:55,710 That's what we need to moderate the word politics so that we only consider the remainder of this division. 24 00:01:57,120 --> 00:02:03,900 So first we take the index of, uh, the character in the plain text and we manually determine some 25 00:02:03,900 --> 00:02:04,230 key. 26 00:02:04,560 --> 00:02:13,530 And then we add that index and key and then we the world with 36, such that the cipher text will be 27 00:02:13,530 --> 00:02:14,590 only in this range. 28 00:02:15,030 --> 00:02:16,710 So let's take a look at this example. 29 00:02:17,910 --> 00:02:22,740 So this is the table zero contents here and one B to C and so on. 30 00:02:25,440 --> 00:02:27,150 So I'm going to take an example. 31 00:02:27,630 --> 00:02:32,570 The plain text is empty, Wajir, so think it as an abbreviation. 32 00:02:32,680 --> 00:02:36,060 I know I have already determined the key is equal to six. 33 00:02:36,750 --> 00:02:41,970 So we need to do the Caesar's apparatuses for each and every character. 34 00:02:42,000 --> 00:02:42,790 Let's take you. 35 00:02:43,830 --> 00:02:46,210 So in the previous table, let's find out the index of it. 36 00:02:46,230 --> 00:02:48,120 So is it the index? 37 00:02:48,780 --> 00:02:59,790 And you need to press the key, which is six six zero six six and after only 26, 26 goes in zeros and 38 00:02:59,790 --> 00:03:00,900 then 206. 39 00:03:01,590 --> 00:03:06,860 And why do we take a look at the six in the table? 40 00:03:06,960 --> 00:03:07,860 You get the value. 41 00:03:09,060 --> 00:03:09,950 So write it down. 42 00:03:10,590 --> 00:03:19,440 So over here in the plaintext has been converted into G in the same for the same that you take them 43 00:03:19,440 --> 00:03:28,590 to at least four and then you add six, which you 18 and then 26 since the trust, then 26 goes 18 and 44 00:03:28,590 --> 00:03:30,540 zero times and leaves the room under 18. 45 00:03:30,930 --> 00:03:32,390 So the answer is 18. 46 00:03:32,400 --> 00:03:37,600 And if you take a look at the table, 13 values is so you write it down. 47 00:03:37,620 --> 00:03:43,680 So instead of your keeping us in the same way, you can do the every letter. 48 00:03:43,980 --> 00:03:44,970 Let's take a look at this. 49 00:03:44,970 --> 00:03:45,270 Right. 50 00:03:45,570 --> 00:03:48,750 The index of what you can differ. 51 00:03:48,810 --> 00:03:50,580 And if we are six, you get thirty. 52 00:03:50,880 --> 00:03:53,730 So our boundary has been zero. 53 00:03:53,970 --> 00:03:56,730 So the answer got all the different. 54 00:03:57,120 --> 00:03:58,230 So that's what we will do. 55 00:03:58,230 --> 00:04:03,550 The Modular 26, because we get only reminders from Dero to quantify. 56 00:04:03,580 --> 00:04:06,330 If you do a right, that's what we will do. 57 00:04:06,330 --> 00:04:07,580 The Model 26. 58 00:04:07,890 --> 00:04:10,570 So that might be good for. 59 00:04:11,760 --> 00:04:15,530 So 26 once is equal 26 and plus four gives thirty. 60 00:04:15,540 --> 00:04:15,810 Right. 61 00:04:16,590 --> 00:04:21,490 And for is eat the same that the 12. 62 00:04:23,220 --> 00:04:25,280 And then if you are six you get 31. 63 00:04:25,290 --> 00:04:28,790 And if you want to do it but only six you get the value of a year. 64 00:04:30,780 --> 00:04:34,590 So in that way we get the ciphertext final. 65 00:04:34,620 --> 00:04:35,700 Yes, yes. 66 00:04:35,820 --> 00:04:36,210 Yes. 67 00:04:37,470 --> 00:04:38,100 So you should have. 68 00:04:38,280 --> 00:04:45,180 We already have here we are adding us to Egypt, Loihi and the transfer of Savannakhet ciphertext will 69 00:04:45,190 --> 00:04:45,420 be. 70 00:04:46,200 --> 00:04:46,670 Yes. 71 00:04:46,710 --> 00:04:57,000 That if we send the key also to our receiver and then he just adds minus in the same way to get this 72 00:04:57,010 --> 00:05:03,670 plaintext, he put the minus and to the wider region and he get the value of the plaintext. 73 00:05:04,920 --> 00:05:07,440 So this is one of the example orders of protection. 74 00:05:07,710 --> 00:05:15,750 The weakness lies because the keys machsom keys, if you can produce, even though if you put the infinity, 75 00:05:16,140 --> 00:05:19,650 this modular condition, six use only that can be possible. 76 00:05:20,880 --> 00:05:30,180 So you can just apply the key to this plaintext and you can generate 25 different sets of ciphertext 77 00:05:30,390 --> 00:05:32,730 in those different sets. 78 00:05:32,730 --> 00:05:36,510 One set will be the meaningful because our plaintext will be meaningful. 79 00:05:36,700 --> 00:05:42,370 I took just this an example to show you the starting letters and letters and letters. 80 00:05:42,790 --> 00:05:48,190 So in reality, the plain text will be meaningful, that that's why Hacker will use this. 81 00:05:48,190 --> 00:05:53,800 If he knows the key and if he knows that we have used the same text, he simply put forces and he gets 82 00:05:54,010 --> 00:05:55,630 for in 24 hours. 83 00:05:55,660 --> 00:05:57,880 It's easy to find a meaningful sentence. 84 00:05:57,880 --> 00:05:58,180 Right? 85 00:05:58,480 --> 00:06:02,810 That's why it is easy repropose. 86 00:06:03,390 --> 00:06:09,190 And next example, we are going to seize the nerve center and what we're going to do is we're going 87 00:06:09,190 --> 00:06:12,510 to create a table and the rules and columns are created by Alphabet's. 88 00:06:12,970 --> 00:06:20,020 You need to create a table with the date and the rules and columns should also be the same and key should 89 00:06:20,020 --> 00:06:22,150 be exactly the same plain text. 90 00:06:22,510 --> 00:06:24,830 So it contains 10 characters. 91 00:06:24,850 --> 00:06:26,920 The key should be also 10 characters. 92 00:06:27,250 --> 00:06:28,510 If not, repeat the key. 93 00:06:29,680 --> 00:06:38,440 That means if the character in this print distance and the keys for we need to repeat it again. 94 00:06:38,440 --> 00:06:43,320 Four and you get the key is it so you get the remaining rate. 95 00:06:44,110 --> 00:06:48,880 That means you need to fill up two margaritas and you can distribute the two more characters are the 96 00:06:48,880 --> 00:06:49,130 key. 97 00:06:49,630 --> 00:06:57,340 So that's how you make sure that the exact, uh, the print accident and the current are equal and no 98 00:06:57,340 --> 00:07:01,610 mapping should be done between the plain text alphabets column and the keys are true. 99 00:07:02,920 --> 00:07:09,640 So you take each alphabet of plaintext and you cancel the column of the drawer of the table and the 100 00:07:09,640 --> 00:07:12,370 key are Pavitra and offer the mapping. 101 00:07:12,370 --> 00:07:16,180 You will get the one value and that value is the same for text. 102 00:07:17,500 --> 00:07:18,700 So let me explain. 103 00:07:18,730 --> 00:07:20,200 So this is the table. 104 00:07:20,200 --> 00:07:26,880 I have taken this photo from the Internet because I cannot I cannot create this in this much trouble. 105 00:07:27,220 --> 00:07:31,900 So you have those ABCDE, you do it again and your columns here to get. 106 00:07:32,690 --> 00:07:34,430 Now let's take an example. 107 00:07:34,690 --> 00:07:35,700 So print technical. 108 00:07:36,280 --> 00:07:37,240 Okay, this is my name. 109 00:07:38,470 --> 00:07:45,800 And the keys I take since the incident is less than plaintext, we need to repeat the key. 110 00:07:45,820 --> 00:07:48,590 So what we're going to do is we need to change it. 111 00:07:49,660 --> 00:07:51,280 So in this case, we got the. 112 00:07:51,280 --> 00:07:53,900 Exactly the multiverse. 113 00:07:53,920 --> 00:07:57,680 If you have only killed two, you need to Nicole here. 114 00:07:57,760 --> 00:07:59,290 You need to put it here. 115 00:08:00,790 --> 00:08:06,100 You just simply repeat until the plaintext characters are equal to key characters. 116 00:08:07,750 --> 00:08:13,970 So first, I want to take this first half of it and second half of it, which look at the end column. 117 00:08:14,530 --> 00:08:22,920 So in this end column, I need to look at the hits or so and column and hetero. 118 00:08:24,530 --> 00:08:31,580 So and Khorram, sorry, so much so, so I take this and call them. 119 00:08:33,280 --> 00:08:35,380 And so it is you. 120 00:08:36,820 --> 00:08:45,050 So my brain trying to transform into you in the same way I cut my throat. 121 00:08:46,300 --> 00:08:50,490 So we decided to call them and they throw it. 122 00:08:52,690 --> 00:08:53,810 And in the same way. 123 00:08:54,070 --> 00:09:01,870 So here is it's a kid column and drop and kid column, which are. 124 00:09:03,260 --> 00:09:09,470 So it's all you can find all this and let's see the last one I Iroh. 125 00:09:11,230 --> 00:09:12,610 Your column, Iroh. 126 00:09:15,040 --> 00:09:24,610 And so the ciphertext of the plane technically is UCU are PBT, so these two survivors are example of 127 00:09:24,610 --> 00:09:25,730 substitution ciphers. 128 00:09:26,050 --> 00:09:30,460 There are so many substitutions out there, but I cannot tell everything. 129 00:09:31,060 --> 00:09:32,880 There are not more than experts. 130 00:09:34,150 --> 00:09:39,820 So I took this to mean SEYFERT because I want to show you a whole substitution. 131 00:09:39,820 --> 00:09:46,810 Ciphers will work and no one can prove Forcett and you can also check it. 132 00:09:46,900 --> 00:09:49,760 Other substitutions I put on the Internet as well. 133 00:09:50,920 --> 00:09:55,560 But my intention is to show you that how this operation works. 134 00:09:55,720 --> 00:09:57,240 That's all for this video.