Timestamps 00:06 - Understanding Playfair Cipher encryption and generating ciphertext. 01:26 - Understanding the Playfair Cipher's letter positioning rules for encryption. 02:47 - Explains Playfair Cipher rules for different letter positions. 04:08 - Explains rectangle formation and encryption in Playfair Cipher. 05:34 - Demonstrates Playfair Cipher encryption with examples. 07:06 - Encrypting letters in the same row of the Playfair Cipher. 08:31 - Overview of rules for encrypting using Playfair Cipher. 09:54 - Encrypting letters in the same column using the Playfair Cipher.
@@rufaidashaik4753 you said correct but see A goes to B and B goes to either I or J or it could be either BI or BJ only X will be the mapping of S as per rule right .🌸
Sir as you have told ( session 16) if any character will repeat in plain text , still playfair will have different cipher for both , but here it isn't ? 6:32
Very helpful only figured using chatgpt the logic behind I/J although it was not clearly discussed here but other than that it was completely useful video
for first problem of attack , doubt is for ck we can do row swapping as well right? column swapping is required? if row swapping is done the c will be and K will be D
can you please upload the full operating system course on your website? Lot of us have been waiting for such a long time, and many of us have IOS and not android, we want to view lectures on our computers/IOS devices. God bless and thank you very much for your assistance
Why Clg or university professor doesn't teach like this ,they only read & push the topic rapidly to complete there syallabus #sedreality to education system
Home work: You are Awesome (and in last there is one extra char which is ''x') Home work task is convert cipher text to plain text method is just opposite of encryption rules for example go left if diagrams are in row wise (wrap around ) etc
this guy explains better than my professor, huge thanks my friend
Same to me bro
And my professor explained it better
Daddy vibes?
@@Habibullahgerono
Rapid Fire Activity Solution:
1. oa-NR
2. ab-BI
3. gk-IE
4. dc-CH
5. rz-DR
6. zr-RD
7. mz-RU
8. rm-MO
Thank me later 😇
hi please can u tell me how to know choose I or J at the second question?
@@saradev9445 you need to write both the possibilities it's actually BI or BJ and IE or JE for ab and gk
@@msvss7526 If I or J comes in the keyword itself, then what pair are we gonna make??
coz 1 pair is mandatory as it has 25 alphabets only??
Exactly
@@saradev9445 Either way choosing i or j will result you the same answer while decrypting so it's your choice
Best teacher ever I have found .very easy to understand and nice explanation
self notes
row : right
col: down
rectangle : row's opposite end
My favourite tutor right here
I missed class… thanks to him am far much better than who attended… 🙏
Outstanding lecture regarding this approach also clear all of the questiona that arises during the lecture about some specific points.
Glad I found you. You're really great! World needs more teacher like you. Thank you ❤
Timestamps
00:06 - Understanding Playfair Cipher encryption and generating ciphertext.
01:26 - Understanding the Playfair Cipher's letter positioning rules for encryption.
02:47 - Explains Playfair Cipher rules for different letter positions.
04:08 - Explains rectangle formation and encryption in Playfair Cipher.
05:34 - Demonstrates Playfair Cipher encryption with examples.
07:06 - Encrypting letters in the same row of the Playfair Cipher.
08:31 - Overview of rules for encrypting using Playfair Cipher.
09:54 - Encrypting letters in the same column using the Playfair Cipher.
Diagrams:
1,oa-NR
2,ab-BI
3,gk-IE
4,dc-CH
5,rz-DR
6,zr-RD
7,mz-RU
8,rm-MO
i think ab=xi since it is same column we take the down letter
@@rufaidashaik4753 no bro, as it is in same column we consider the next word down to it
@@rufaidashaik4753 you said correct but see A goes to B and B goes to either I or J or it could be either BI or BJ only
X will be the mapping of S as per rule right .🌸
@@PardeepSingh-vq5wx so we can i and j , any of them can b written after b?
ok
Best Explanation...Thank you sir...🙏
Really nice video with a full detailed explanation of this Playfair algorithm.
Sir as you have told ( session 16) if any character will repeat in plain text , still playfair will have different cipher for both , but here it isn't ? 6:32
Super interesting lectures, thank you!
what about ab. what do we have to take for b? i or j?
Dude thank you so much for saving my time
Thankyou so very much, you saved my exam
Tutorial solution : oa- nr
ab - bi
gk - ie
dc - ch
rz - dr
mz - ru
rm - mo
zr-RD
@@ercfs ya, You can also write like that.
Why should we take only i when there is also a chance to pick j.
@@prashanthmandati2990 you can also take J, no issue😃
@@arpanbhoi7794 basically we'll ignore 'J' in playfair cipher algo
Very helpful only figured using chatgpt the logic behind I/J although it was not clearly discussed here but other than that it was completely useful video
for first problem of attack , doubt is for ck we can do row swapping as well right? column swapping is required? if row swapping is done the c will be and K will be D
What if you have the digram IJ?
Whether you like if you like you take I otherwise you like j you can take
7:00 ck should be replaced as ED not DE
No , C right-most is D and K left-most is E . So due to this method your answer will comeout to be DE not ED !
@janaksharma3133 jyada dimag mt chla
Take the letters from the same row but in the opposite corners of the rectangle.
Wao, u are great u make simpler for me.
i have a doubt in this topic u have joined i/j in same box so in wat should be encrypted as cipher text
I
hi. at 7:03 you are mentioning the plaintext as keyword. actually mosque is the plaintext here. the keyword remains the same as monarchy.
wow finally got it was simple but the book theory was tough though with no proper example
I enjoyed ur lecture sir.
you the best NA
thank for this "well-explained" video...
can you please upload the full operating system course on your website? Lot of us have been waiting for such a long time, and many of us have IOS and not android, we want to view lectures on our computers/IOS devices. God bless and thank you very much for your assistance
Super explanation.. thanku
Well explained👍
Whew...thanks man🎉
Can u please present how to decrypt
how did you solved mosque with the 5x5 table of monarchy ? isn,t it wrong ?
If I or J is in key then which two alphabet will keep together in one box of 5x5
why MONARCHY is still taken as example in different questions , ?
Thank you sir
What we gonna use if we come for I/J as diagram letter.
Should I write I or J or both.
Please let me know ASAP
You can choose 1 either I or J. It's your choice. If you want to write I, then it is okay and if you want to write J then it is also okay.
Thank you so much
hi, could u explain how to decrypt them next?
Thank you sir❤️
Now sir but teacher said hello wil be he lx lo ez
Then why attack is same attack instead of at tx ac kz
Thank youuuu
thank you
What will be for a filter -xm
Plain text is -algorithm
sir please tell me what will happen when we will convert "oa" what will be its cipher text?
?
NR
Wow, thanks!
My professor watched this video before class
Got it sir.
sir for all matrix we should use monorachy or what sir
That is keyword which can be anything, any English word or any sentence.
amazing ty
Thnx Sir
how is i/j used
explain
sir, pls make videos on modern techniques
i think its called diagraphs instead of diagrams*. thanks
See what expected
oa = NR
ab = BI/J
gk = I/JE
dc = CH
rz = DR
zr = RD
mz = RU
rm = MO
Lovely
DOUBTS -
1. What if we have to encrypt i/j ? Like jimmy ?
2. If you got i/j after swiping which one would be considered as cipher text ?
Activity
Cipher text:MBKSXFQD
Why Clg or university professor doesn't teach like this ,they only read & push the topic rapidly to complete there syallabus #sedreality to education system
Description of play fair
sir ji agi baar mandir lekar bhi solve kardena
Attack mosquitoe 💀💀💀💀
Uh decryption?
1) NR
2) BI/BJ
3) IE/JE
4) CH
5) DR
6) RD
7) RU
8) MO
IIIT ONGOLE❤❤❤❤@bhvuanesh😅
Good explanation but the video made to be long intentionally both part one and two can be one video in less than 10 min.
Encrypt "The key is hidden under the door" using playfair cipher with keyword "guidance"
Someone plz solve this😢
The answer to the homework problem is NRBIIECHDRRDRUMO
Please check whether it is correct or not ..
correct but not sure about II
Correct
Correct
We have to find the plain text I guess
Home work: You are Awesome (and in last there is one extra char which is ''x')
Home work task is convert cipher text to plain text method is just opposite of encryption rules
for example go left if diagrams are in row wise (wrap around ) etc
top
👌👌👌👌👌👌👌👌
🙏🙏🙏🙏
it's o not wo & it's N not yen . irritated by this . btw you explain better .
That how south people pronounce letters. what someone from US says to you its not zed(Z) it zee
Your comment is rude and disrectful.
👍
Oo latter
NR
BI
IE
CH
DR
RD
RU
MO
nr bi le ch dr rd ru mo
I should give you my fees
😂😂😂
please #DES algorthim
thank you