01:27 Substitution techniques involve replacing letters of a plain text with other letters or symbols. 02:54 Substitution and transposition techniques involve replacing or rearranging characters in a message. 04:21 Permutations and transpositions for creating encryption codes 05:48 Types of transposition ciphers and substitution ciphers 07:15 Monoalphabetic substitution ciphers use a single cipher alphabet for each plain text alphabet. 08:42 Substitution ciphers have a 1 to 1 relationship between plain text and cipher text. 10:09 Polyalphabetic substitution ciphers use multiple substitutions for each character. 11:30 In substitution techniques, one character can be denoted by different letters, allowing for multiple substitutions.
Like and subscribe is done.... sir i have a question kindly zara detail mn answer dejeye ga. Substitution cipher mn jo text substitute keya jata hy means jo cioher text huta hy wo hum hamesha alag baanaty hn aur agr hamesha wo alag huty hn tau receiver ko kesy btaty hn ki this is the cipher text or ap ko esi set ko ly kr msg ko dcrypt krna hy.
I loved that in every video one second is not wasted , Thank you so much for explaining this so easily 🤩🤩🤩
insem exams hai kya??
aap bahot sundar ho
01:27 Substitution techniques involve replacing letters of a plain text with other letters or symbols.
02:54 Substitution and transposition techniques involve replacing or rearranging characters in a message.
04:21 Permutations and transpositions for creating encryption codes
05:48 Types of transposition ciphers and substitution ciphers
07:15 Monoalphabetic substitution ciphers use a single cipher alphabet for each plain text alphabet.
08:42 Substitution ciphers have a 1 to 1 relationship between plain text and cipher text.
10:09 Polyalphabetic substitution ciphers use multiple substitutions for each character.
11:30 In substitution techniques, one character can be denoted by different letters, allowing for multiple substitutions.
Excellent stuff, Abhishek has deep knowledge and excellent explanation skills, a valued lecture, spending time watching his lecture is worthy.
Bro you are life saver for end time revision ❤️
Without wasting time ,before watching video I just like the video.
Best channel for cryptography
Amazing Playlist ❤🔥
Awosome great knowledge thank you soo much brother ❤️❤️
u are lifesaving mannnn....amazing....keep it up...GOD BLESS YOU.....
can i get your insta id
@@Blackdog2511 dai parama padi da
Marvelous bhai 🔥🔥
So helpful to pass in last day of day
brilliant teaching you are brother...🤩🤩
Today is my insem tysm bade bhai❤
Bohot badhiya hai 👍 keep it up 😀
Bhai bohat badiya yaar 👌👌👌😊
one of the most amazing teaching sir.... thanku so much
2024, Still taking notes from this. Thanks Sir.
Execellent👏👏👏
explained perfectly sir ..Ty
very well explained good very good
Thank you so much Sir 😍😋
Superb explanation with real life examples.. 👍🏼
Your teaching technique is nice sir
I like it.
Thanks for clearing my concept in cryptography.
Thanks a lot Bhaiya
kaafi sahi
Beautiful .. Thoroughly explained with all details mate. Will keep checking this whole series. Keep up the great work mate.
explained so well!
Bht vadia c thnkuu sir
thank you sir 😍😇
Thank you Bhaiya
very nice explanation............loved it
thank you so much. your videos helped alot.
Abhishek Bhai bolthey🔥
Brother this video is very helpful for me
Nice explanation 👍😊
Hiii
Where are you
It would be great helpful if tutors like you offer your notes PDF 😄
bhai mile to btana
Hum logo ko bhi information security abishek sir hi para tha ha . Jrsu ma . Jharkhand raksha shakti University. Ranch . Forensic scirnce deperment
Nicely explained
you are the hero
Amazing Sir .thanks
Ek no
Thank you sir pass karwadiya apne ^_^
Is it possible to get the notes shown in this video?
GREAT tutorial....
Which book did you use for example?
Sir , can i get the note cryptography .........? please sir ,give your note also.....Excellent teaching sir 👌👍
Very Good Sir G
Abishek Can you please tell me the name of a Reference book for more reading to ciphers
What is this book name please tell me.
excellent
Thank u, it's so useful
do we have to learn that table?
Well explained.
But what should we do if the conversion table is not given so how can we convert those letters
Name the book of which you were giving an example in molnoalphabetic substitution cipher
Cryptography and network security by Behrouz A Forouzan and debdeep mukhopadhay
Cryptography and network security by william Stallings
Sir ye jo figure diya haai ye yaad karna padega ya diya hoga exam mai
Apne is video konsi book use ki hai??
Please reply asap
VERY GOOD
Great work bro
thank you
Can u please share the notes pleaseeeee
iske notes mil sakte hein cryptography ke
Well teaching sir❤️🙏
Bro I m a good fan of u… Can you tell me the name of the book you used?
THanks
Abhisekh sir please suggest a book for Cryptography. Please suggest me. You can explain it very clearly. Please suggest one book for cryptography.
Cryptography and Network Security by behrouz a forouzan
Cryptography and network security by William Stalling
8:29 Space ko kese Show krenge ?
Wow bro even our gtu book is copied frm ur content...
Can you send the PDF of this notes?
awesome
Bro we can called this also classical cryptography or not ?tell me because it is in my syllabus
Yes!! It is a type of Classical Encryption Technique
Sir Yeh kis author ki book h
Can you please share the book?
super
book kon si hai
thanks
plz show your video setup
Sir, can you please share the note?
Can you please share the notes ??
sir aapne to mono alphabetic ko using a keyword walla example nahi karwaya
Bro can you provide pdf of your notes ?
Sir apke notes best h kya notes mil skte. Please provide me. 😘😘
can someone provides his hand written notes
Sir please share your notes as well.
11:00 Revision
Plz apny notes k pdf ka link dy dain hmain
Brother cryptography ke apne notes upload krde please sbki bht help hojayegi🙏🏻
bro mujhe bhi chahiye notes!!! tere paas ye notes hai toh bhej sakta hai pls🙏🙏🙏🙏
@@adityapatole9691 I also want notes
@@sabashehzad9989 I asked him in insta DM but he has not made any pdf of it. So we have to take screenshots of the video itself😐
sir notes v description me provide kar dijiye ho paye toh
Sir can you share with me notes pdf
Sir, can you please suggest me some books about cryptography and network security
Cryptography and network security by Behrouz A Forouzan and debdeep mukhopadhay
Cryptography and network security by william Stallings
Please add English Subtitles Sir...
Can you please share your notes
Sir can you please share your notes?
Plz book ka name batao
Cryptography and network security by Behrouz A Forouzan
Hello bro can u provide notes alsoo
Can you send your notes?
Name of a book?
Cryptography and network security by Behrouz A Forouzan
Like and subscribe is done.... sir i have a question kindly zara detail mn answer dejeye ga.
Substitution cipher mn jo text substitute keya jata hy means jo cioher text huta hy wo hum hamesha alag baanaty hn aur agr hamesha wo alag huty hn tau receiver ko kesy btaty hn ki this is the cipher text or ap ko esi set ko ly kr msg ko dcrypt krna hy.
We'll send key used for encryption along with the cipher text. So simply, if there's a key, apply to the received msg and that'll be decrypted ;-)
bhai notes bhi dal de yai wale plz
😀😀😀😀😀😀😀🤩