Substitution and transposition techniques | Monoalphabetic and polyalphabetic substitution ciphers

preview_player
Показать описание
Hello friends! Welcome to my channel.
My name is Abhishek Sharma. In this video, i have explained various classical encryption techniques i.e. Substitution and transposition techniques | monoalphabetic and polyalphabetic substitution ciphers in cryptography.
#abhics789 #AbhishekDit

Courses on my Website (Huge discounts going on)

If you learned something new do like and share this video with your friends and don't forget to subscribe to my channel :)

There are lectures related to different subjects on this channel.Do check them out, guys.

Link is given below:
computer graphics:

engineering economics:

Cryptography :

.Net C# :

Pointers in C :

Linked List for Interviews :

Java Tricky videos/programs for interviews :

File Handling in C :

pointers playlist:

C Programming tips and tricks:

Abhishek VLOGS :

Concerts :
Рекомендации по теме
Комментарии
Автор

I loved that in every video one second is not wasted, Thank you so much for explaining this so easily 🤩🤩🤩

asthasona
Автор

Excellent stuff, Abhishek has deep knowledge and excellent explanation skills, a valued lecture, spending time watching his lecture is worthy.

vasiljaveed
Автор

Without wasting time, before watching video I just like the video.

shivanisingh
Автор

Bro you are life saver for end time revision ❤️

Abhishek-qhro
Автор

Awosome great knowledge thank you soo much brother ❤️❤️

abdullahjabbar
Автор

01:27 Substitution techniques involve replacing letters of a plain text with other letters or symbols.
02:54 Substitution and transposition techniques involve replacing or rearranging characters in a message.
04:21 Permutations and transpositions for creating encryption codes
05:48 Types of transposition ciphers and substitution ciphers
07:15 Monoalphabetic substitution ciphers use a single cipher alphabet for each plain text alphabet.
08:42 Substitution ciphers have a 1 to 1 relationship between plain text and cipher text.
10:09 Polyalphabetic substitution ciphers use multiple substitutions for each character.
11:30 In substitution techniques, one character can be denoted by different letters, allowing for multiple substitutions.

DeepakKumar-kuzb
Автор

2024, Still taking notes from this. Thanks Sir.

G-kf
Автор

u are lifesaving mannnn....amazing....keep it up...GOD BLESS

kanishkatiwari
Автор

Wow bro even our gtu book is copied frm ur content...

jamespottex
Автор

Your teaching technique is nice sir
I like it.
Thanks for clearing my concept in cryptography.

nikhilchourasiya
Автор

Hum logo ko bhi information security abishek sir hi para tha ha . Jrsu ma . Jharkhand raksha shakti University. Ranch . Forensic scirnce deperment

ComputerWindows-fk
Автор

brilliant teaching you are brother...🤩🤩

sanketsingh
Автор

It would be great helpful if tutors like you offer your notes PDF 😄

mshussain
Автор

What is this book name please tell me.

tanmoymandal
Автор

Sir, can i get the note cryptography please sir, give your note teaching sir 👌👍

actiongameworld
Автор

Beautiful .. Thoroughly explained with all details mate. Will keep checking this whole series. Keep up the great work mate.

ZarbeAbbas
Автор

one of the most amazing teaching sir.... thanku so much

prachigarg
Автор

Name the book of which you were giving an example in molnoalphabetic substitution cipher

mdraashidhussain
Автор

Superb explanation with real life examples.. 👍🏼

shamaligupta
Автор

Is it possible to get the notes shown in this video?

Zainitentiony