Sign up now
to enroll in courses, follow best educators, interact with the community and track your progress.
Enroll
271
Download
Symmetric Key Encryption and Types (in Hindi )
962 plays

More
In this lesson I will teach you about ceaser cipher a substitute key for NTA NET computer science

Nisha Mittal is teaching live on Unacademy Plus

Nisha Mittal
🌟 MCA Gold Medalist 🌟 Star Educator 🌟Gate Qualified 🔴UGC NET qualified🔴🌟YouTuber ☆🌟BOOK published on LINUX ADMINISTRATION by kalyani publish

U
Unacademy user
mam agar 100 stars b hote to....apko mil jate.... I am not from mathematics background. I was facing so much trouble in trigonometry. Kuch smjh ni ata ta.... Thank you sooooooo much... apka gala b sayad khrab ta.....apne tb b itne ache se concepts clear kr diya.... I am very very very very thankful....????????????????
ma'am here Z is written as A.. so how will we write 'X' and 'Y'??
I got it.. thankyou.. Z will be written as C
  1. Symmetric Key Cryptography (SKC) Nisha Mittal


  2. Secret Key Cryptography (SKC) Symmetric Key Cryptography (SKC) Two basic types of secret-key cryptosystems substitution based cryptosystems transposition based cryptosystems


  3. Substitution Technique A substitution technique is one in which the letters of plaintext are replaced by other letters or by numbers or symbols.


  4. Substitution techniques Caesar Cipher Monoalphabetic Ciphers Playfair Cipher Hill Cipher Polyalphabetic Ciphers One-Time Pad


  5. Caesar Cipher V Caesar Substitution cipher was by Julius Caesar. VThe Caesar cipher involves replacing each letter of the alphabet with the letter standing three places further down the alphabet.


  6. Caesar Cipher substitution cipher was by Julius Caesar. The Caesar cipher involves replacing each letter of the alphabet with the letter standing three places further down the alphabert. For example, plain: MEET ME AFTER THE TOGA PARTY cipher: PHHW PH DIWHUWKH WRJD SDUWB


  7. Caesar Cipher vsubstitution cipher was by Julius Caesar. V The Caesar cipher involves replacing each letter of the alphabet with the letter standing three places further down the alphabet For example, plain: meet me after the toga party cipher: PHHW PH DIWHUWKH WRJD SDUWB Note that the alphabet is wrapped around, so that the letter following Z is A.We can define the transformation by listing all possibilities, as follows: plain: abcdefghij k I m n o p cipher: d ef ghij kim n o p q rs