Sign up now
to enroll in courses, follow best educators, interact with the community and track your progress.
Enroll
268
Download
Symmetric Key Encryption and Types (in Hindi )
947 plays

More
In this lesson I will teach you about ceaser cipher a substitute key for NTA NET computer science

Nisha Mittal is teaching live on Unacademy Plus

Nisha Mittal
🌟 MCA Gold Medalist 🌟 Star Educator 🌟Gate Qualified 🔴UGC NET qualified🔴🌟YouTuber ☆🌟BOOK published on LINUX ADMINISTRATION by kalyani publish

U
Unacademy user
sir I think d last answer of question is traits. Thank you so much sir
ma'am here Z is written as A.. so how will we write 'X' and 'Y'??
I got it.. thankyou.. Z will be written as C
  1. Symmetric Key Cryptography (SKC) Nisha Mittal


  2. Secret Key Cryptography (SKC) Symmetric Key Cryptography (SKC) Two basic types of secret-key cryptosystems substitution based cryptosystems transposition based cryptosystems


  3. Substitution Technique A substitution technique is one in which the letters of plaintext are replaced by other letters or by numbers or symbols.


  4. Substitution techniques Caesar Cipher Monoalphabetic Ciphers Playfair Cipher Hill Cipher Polyalphabetic Ciphers One-Time Pad


  5. Caesar Cipher V Caesar Substitution cipher was by Julius Caesar. VThe Caesar cipher involves replacing each letter of the alphabet with the letter standing three places further down the alphabet.


  6. Caesar Cipher substitution cipher was by Julius Caesar. The Caesar cipher involves replacing each letter of the alphabet with the letter standing three places further down the alphabert. For example, plain: MEET ME AFTER THE TOGA PARTY cipher: PHHW PH DIWHUWKH WRJD SDUWB


  7. Caesar Cipher vsubstitution cipher was by Julius Caesar. V The Caesar cipher involves replacing each letter of the alphabet with the letter standing three places further down the alphabet For example, plain: meet me after the toga party cipher: PHHW PH DIWHUWKH WRJD SDUWB Note that the alphabet is wrapped around, so that the letter following Z is A.We can define the transformation by listing all possibilities, as follows: plain: abcdefghij k I m n o p cipher: d ef ghij kim n o p q rs