Symmetric Key Cryptography: The Rail Fence Cipher
Вставка
- Опубліковано 25 січ 2019
- This is the third in a series about cryptography; an extremely important aspect of computer science and cyber security. It covers a transposition cipher called the rail fence cipher, also known as the zig zag cipher. It explains how this method can be used to scramble the letters in a plain text message to generate cipher text. It also explains how the rail fence cipher can be used with different keys. The video includes a examples you can try to encrypt and decrypt yourself.
Thank you for making an explanation thats short and straight forward.
Your videos are so good. Hope to see something on operating systems soon.
Thank you so much Kevin ! So helpfull.
This was soo useful. I have competition tmrw at school and these are needed. I didntunderstand a thing in the other videos but your video is so clear
Glad to help. I hope it went well. :)KD
Thank you 🙏
Cheers, the first 1.27 mins were more than enough for me, to implement in Python :)
kool profile pic
Hey sir, why in the example at the end of the video the key is 4, do we need to try or is there any way to know that?
Please receive my admiral. I really enjoy watching your teaching video.
Thank you :)KD
How do you do this with an offset, on my science olympiad test this method didn't work because there was an unknown offset
How to improve the cipher: fill in the blanks of the grid to make real sentences even if they come out nonsensical.
thanks studying crypto and this was quick easy and ...going to be fun to send quick easy messages with friends
Glad to help :)KD
Thank you so much that help me a lot ❤
You're welcome :)KD
With the final example how did u know what the encryption key was ? Is it always based on trial Nd error or is there a way to find it
Use a 'brute force' approach (trial and error). In fact, it's an easy one to crack with this approach, so it is normally used in conjunction with other ciphers.
With the puzzle Fine words butter no parsnips. I did draw 25 blocks but how do you know it was 4? How do you find that out?
Use a 'brute force' approach (trial and error). In fact, it's an easy one to crack with this approach, so it is normally used in conjunction with other ciphers.
Key 2:
cool = cool
:)KD
thank you o much sir
You're very welcome :)KD
Thanks sir
You're welcome :)KD
Remember guys your key should not be more than total letters in you sentence or it'll end up in original sentence without any encryption
Good point :)KD
someone from uk is speaker
Türkçe yok 1 yıldız
? :)KD
@@ComputerScienceLessons I am just messing around ^^ Keep up the good work