Substitution Cipher Implementation with Python

preview_player
Показать описание
One of my favorite basic encryption methods: the substitution cipher. Enjoy!

Check out this code here:

Join my Discord server to chat with me:

Check out some code on my GitHub:

Tweet me something funny on Twitter:

Say hi over at Facebook:

Sincerely,
Engineer Man
Рекомендации по теме
Комментарии
Автор

It's just amazing to see you work, whether I understand it fully or not, but I love watching your videos.. :)

umairgillani
Автор

Seems familiar or maybe just the same way some vault tools works. You have a salt string and the salt iteration number, so you can only decrypt a hash if you got the salt string and know how many times you can iterate it. Would be cool to add the iteration times as a option in the script to loop over the value then encrypting or decrypting. Very cool video btw

KThaYo
Автор

This stuff is really interesting. That being said, I have no idea what you’re saying. Lol.

USASOLDIER
Автор

I know this is an old video, but I just stumbled on to your channel the other day and this one of my favorite videos. Have you checked out Pig Pen Ciphers? I've always thought it would be fun to write a pig pen cipher program but haven't reached the level of exploring graphic libraries yet.

traviscoleman
Автор

Thanks for making these videos! However, I think a better video than this would be showing us how to implement REAL crypto in our code. For instance, a small script that can encrypt a file in AES-256 based on a passphrase entered by the user (the key). Maybe using the Crypto module...

amlamarra
Автор

Hey Engineer Man, I'm curious about what software you use for your coding. Would you mind letting me know? It looks super smooth and well set out!

timvj
Автор

Which part of the code checks for the same key? I don't understand where the "could not decript" message came from

manuelpena
Автор

Lol, this reminds me of a time I was playing this flash game where you could save your progress by copying and pasting a string. Well I found out the string was just a bunch of plaintext properties encoded in base64 twice, so I started playing with them to cheat the game (only a singleplayer game btw) and have some fun. I posted about it to the developer to let him know of this problem and got banned for 'hacking' lmao. This is also why I don't believe in 'gray hat hacking.' Because if I find a vulnerability in some company's product, the last thing I'm going to do is tell the f***ers about it. If they really want to know they can pay me ffs

harleyspeedthrust
Автор

I have no clue how this works, what should i learn to understand this video?

TheCFJB
Автор

Of course this is a programming tutorial (and an excelent one at that!), not so much a secure encryption tutorial, but I think it is interesting to comment why substitution ciphers are not secure. If you type: echo | ./sbox.py -e, one can easily notice why they can be easily cracked. A frequency analysis, if the encrypted message is large enough, will always be succesful.

sanferrera
Автор

So was the "Could not decrypt" message not stdout? Why wasn't that message printed three times in the console?

ArtificialDuality
Автор

Can python/python3 make a compression cipher?

klintkrossa
Автор

What ide do you use when your writing your code?

thatstreamingguy
Автор

Could you please do an explanation on more up to date encryption types, like AES?

Rebouz
Автор

Have been watching you for a while, u have awesome videos,
I am working on a Twitter bot using selenium,
Can you make a video of how to make it, and other stuff....
I wanna see how you do it.

RohanOnBike
Автор

For the scamers it wouldn't be a problem if they had a small knowlledge of programming. They could just build an automated program that checks in seconds the existence of the accounts.

ArndtGustavo
Автор

Can you upload a video on Java streams api?

loveandlive
welcome to shbcf.ru