Hill Cipher Encryption and Decryption with Numerical | Everything about Hill Cipher

  Рет қаралды 406,144

Abhishek Sharma

Abhishek Sharma

4 жыл бұрын

Hello friends! Welcome to my channel.
My name is Abhishek Sharma.#abhics789 #AbhishekDit
In this video, i have explained the concept of HILL CIPHER ENCRYPTION AND DECRYPTION with numerical example in Cryptography and Network Security.
If you learned something new do like and share this video with your friends and don't forget to subscribe to my channel :)
There are lectures related to different subjects on this channel.Do check them out, guys.
Substitution and Transposition techniques:
• Substitution and tran...
Link is given below:
computer graphics:
• Computer Graphics
engineering economics:
• Engineering Economics
Cryptography :
• Playfair Cipher Algorithm
.Net C# :
• .NET C#
Pointers in C :
• Pointers in C Introduc...
Linked List for Interviews :
• Introduction to Linked...
Java Tricky videos/programs for interviews :
• Java Labelled For Loop...
File Handling in C :
• Reading the contents o...
pointers playlist:
• Pointers in C
C Programming tips and tricks:
• C tricky programs/videos
Abhishek VLOGS :
• #VLOG-1 Riding through...
Concerts :
• Khushboo Grewal concer...

Пікірлер: 186
@amishmishra761
@amishmishra761 Жыл бұрын
Hats off to you sir for such a great explanation!
@hareemkhan7900
@hareemkhan7900 3 жыл бұрын
MindBlowing explaination ...... saw your video without giving pause
@kuhar98
@kuhar98 Жыл бұрын
Best ever lecture on youtube for hill cipher
@romarai3050
@romarai3050 2 жыл бұрын
Bht sahi bhaiya...kafi time se problem ho rha tha isme ab ekdm mst samjh aa gya..thank you
@chinni438
@chinni438 4 жыл бұрын
Really osm teaching very very nice tnq for making this vedio .
@vakayamini3782
@vakayamini3782 3 жыл бұрын
That's very clear and awesome explanation 🔥
@musharafkhan7935
@musharafkhan7935 4 ай бұрын
Arayyyyy Yarrr Mashallah kiya amazing Explanation hay ❤❤❤❤❤❤
@ritikachourasia5635
@ritikachourasia5635 2 жыл бұрын
best ever explained theorems .. really handsoff to u❣
@akankshasingh7866
@akankshasingh7866 Жыл бұрын
thank you sir for providing a mind-blowing video
@anjalirastogi5203
@anjalirastogi5203 4 жыл бұрын
Bhai tum bahut sahi video banaye ho ! Keep it up
@PiyushMaurya007
@PiyushMaurya007 3 жыл бұрын
Keep up with the great work dude!!
@prachidoshi9082
@prachidoshi9082 3 жыл бұрын
Best explanation on Information Security
@rashmisinha7228
@rashmisinha7228 4 жыл бұрын
Very nice explanation.. Great efforts
@thecatinamorato838
@thecatinamorato838 3 жыл бұрын
very much helpful..thnx for ur teaching...
@santhoshs7028
@santhoshs7028 Жыл бұрын
Beautiful explanation. Thank You. Make more videos.....
@xyz-pc3tl
@xyz-pc3tl 2 жыл бұрын
Thanks a lot for your all Hardwork 🙏🙏🙏
@dollydewangan8964
@dollydewangan8964 3 жыл бұрын
Very very nice explanation sir thank you so much sir 🙏
@savitaverma3469
@savitaverma3469 3 жыл бұрын
Too good. Very well explanation u gave
@fahimmuhammadkhan3874
@fahimmuhammadkhan3874 Жыл бұрын
You are gem, Well delievered Sir,,, Respect
@bosigaribayapureddy1671
@bosigaribayapureddy1671 4 жыл бұрын
I am fully understanded. Tqu
@AbdulRafay-vi6hz
@AbdulRafay-vi6hz 3 жыл бұрын
good job brother....I was not able to understand the decryption before but I can handle any hill decryption like a champ...Thank you
@AbdulRafay-vi6hz
@AbdulRafay-vi6hz 3 жыл бұрын
@Malik Oakley nice
@AbdulRafay-vi6hz
@AbdulRafay-vi6hz 3 жыл бұрын
@Daniel Briggs flexZone is some kind of Online lectures or what is it??. Can you explain ?
@akulupadhyay
@akulupadhyay 3 жыл бұрын
Can you provide a link to these hand notes ? It will be very appreciated ❤️
@lokeshkumar4827
@lokeshkumar4827 Жыл бұрын
man's ignoring all the comments regarding notes :')
@harshithap2620
@harshithap2620 6 ай бұрын
Very easiest method thought it was very helpful thankyou
@osamakhalid6315
@osamakhalid6315 4 жыл бұрын
Very nice explanation brother.
@bhaveshthakor5389
@bhaveshthakor5389 3 жыл бұрын
so informative ❤️❤️
@sowbaranikag6514
@sowbaranikag6514 8 ай бұрын
thanks a lot! u solved my doubt!😊🙏🙏🙏thankyou!
@farishamdani5045
@farishamdani5045 2 жыл бұрын
Can you please share these hand written notes? That would be really helpful.
@tesem5741
@tesem5741 3 жыл бұрын
Thank you yrrr .lectures online horahe h kuch b nhi samjta usme
@pawankumarpandit1822
@pawankumarpandit1822 10 ай бұрын
thank you bhaiya so much it is amazing video
@thusharag.a.5184
@thusharag.a.5184 3 жыл бұрын
really good one
@M.RaoUbaid1410
@M.RaoUbaid1410 Жыл бұрын
Nice keep it up❤
@samarthgupta4069
@samarthgupta4069 2 жыл бұрын
Thank You so much...
@lightdrops227
@lightdrops227 2 жыл бұрын
Zbrdast explaination
@muskan1154
@muskan1154 4 жыл бұрын
Crisp clear
@ashishtiwari1052
@ashishtiwari1052 Жыл бұрын
Thankyou 😊
@yogendragavli2646
@yogendragavli2646 2 жыл бұрын
awsome amazing
@muhammadsaad4036
@muhammadsaad4036 Жыл бұрын
very good sir...
@ArbazKhan-md6zj
@ArbazKhan-md6zj 3 жыл бұрын
Very interesting
@hope_less
@hope_less Жыл бұрын
1 ghante mai paper hai aur meko yeh channel abhi mila 🥲
@hipstergaming5651
@hipstergaming5651 4 жыл бұрын
Sir jo great ho
@anushkatyagi2062
@anushkatyagi2062 3 жыл бұрын
Sir pls provide pdf of these notes.. It will be very helpful
@satishreddy9766
@satishreddy9766 3 жыл бұрын
What is plain text contains odd number length and how to convert it into 2×2 matrix
@chiragmd8565
@chiragmd8565 2 жыл бұрын
love you bhai
@rimsha4519
@rimsha4519 3 жыл бұрын
thanks for help
@co_be_b69_tusharpatil61
@co_be_b69_tusharpatil61 3 жыл бұрын
Bhai tussi gr8 ho
@lionesslady6795
@lionesslady6795 3 жыл бұрын
thank you
@SivaKumar-rv1nn
@SivaKumar-rv1nn 3 жыл бұрын
Thanks sir
@mansisengar6625
@mansisengar6625 4 жыл бұрын
nice sir
@aarivsingh0607
@aarivsingh0607 4 ай бұрын
in decryption for finding inv(d) we can use inv(d)=(1+x*26)/d, where x is a constant
@keyurpanchal9929
@keyurpanchal9929 4 жыл бұрын
Nice videos sir.... Can you please make a video on how to find multiplicative inverse in big numbers and it's methodology.?
@AbhishekSharmaDit
@AbhishekSharmaDit 4 жыл бұрын
I have uploaded a video on how to find multiplicative inverse U can check the playlist
@prashantSharma-ht9po
@prashantSharma-ht9po 2 жыл бұрын
Liked 👍
@kabirajmeri8229
@kabirajmeri8229 2 жыл бұрын
sir your teaching method is great ,love from ahmedabad
@hayatatia9767
@hayatatia9767 Жыл бұрын
D D^-1 = 1 mod 26 If D = 12 What would b D-1
@Jerry02vdm
@Jerry02vdm 2 жыл бұрын
thanks
@priyanshubharti5680
@priyanshubharti5680 4 жыл бұрын
Nice video sir......easy explanation.....btw which book are u referring???
@AbhishekSharmaDit
@AbhishekSharmaDit 4 жыл бұрын
Cryptography and network security by William Stallings. And Cryptography and network security by Behrouz A Forouzan and Debdeep Mukhopadhyay
@viralvideos9227
@viralvideos9227 3 жыл бұрын
i have a small doubt what if the length of plain text is odd??
@manmohan_pundir
@manmohan_pundir 2 жыл бұрын
Add bogus character
@NiteshKumar-vk72
@NiteshKumar-vk72 2 жыл бұрын
kese ho bhaiii...smbhl k rhna encrypt krdunga
@Strawberry-oz1qu
@Strawberry-oz1qu 3 жыл бұрын
I have a doubt, what to do if the plain text has odd number of letters. Eg;- ant, or plane because one column of the last matrix would be empty.
@alkayadav9064
@alkayadav9064 3 жыл бұрын
then aap pair bana sakte ho x use kar k ...... eg; ant -> an tx..... is tarah
@Strawberry-oz1qu
@Strawberry-oz1qu 3 жыл бұрын
@@alkayadav9064 oh ok. Thanks a lot ma'am.
@rimsha6001
@rimsha6001 2 жыл бұрын
Asslam u alaikum Sir Aik question hai kindly answer krdy Question: IT Security Personnel Security Physical Security Operational Security Into which of these would you put the following, justify your choice?  Enforcing hard-to-guess passwords  Encrypting your hard drive  Looking sensitive documents in a safe  Stationing a marine guard outside an embassy  Assigning security clearances to staffers  Using SSL for data transfer  Having off-site backup of documents Plzzz sir i request you iska answer bta dy plzzzz
@rajudebnath6353
@rajudebnath6353 4 жыл бұрын
👌👌👌👌👌
@AshishKumarDwivedi
@AshishKumarDwivedi Жыл бұрын
how you can multiply 2*1 matrix with 2*2 matrix
@pratikshadubey4307
@pratikshadubey4307 3 жыл бұрын
If the value of d inverse is negative then what should we do???
@anb4351
@anb4351 2 жыл бұрын
matrix inverse bila waja mushkil method se krwaya
@tanugupta9333
@tanugupta9333 2 жыл бұрын
Sir Agar 5 character bali spelling lege tab square matrix kese bnega
@muhammdyazdan1192
@muhammdyazdan1192 2 ай бұрын
Nice
@anshujoshi3622
@anshujoshi3622 3 жыл бұрын
What to do if 'd' is an even number? Then d*(d-inverse)mod 26 will never be 1. Please answer.
@TusharSharma_11
@TusharSharma_11 Жыл бұрын
Bhaiya tum humare jeevan me bhagwan bankar aagaye tumne to humari zindagi sawaar di kal crypto ka paper ha . 🥲🥲
@aroraji7173
@aroraji7173 3 жыл бұрын
I have a doubt in a question related to Hill cipher will you plz solve it? How should i send you that question?
@guestofallah7661
@guestofallah7661 3 жыл бұрын
Thanks but what if I have a plaintext (8 letters ) and key (3 letters)?
@gulshanyadav5918
@gulshanyadav5918 3 жыл бұрын
use extended euclidean algorithm to find d inverse.
@souhardyahalder3903
@souhardyahalder3903 11 ай бұрын
what happens if the length of plain text is odd in hill cipher and 2x2 matrix given as key
@mdazam2315
@mdazam2315 3 жыл бұрын
Sir if you don't mind pls provide your lecture notes pdf...
@dishapanjwani9367
@dishapanjwani9367 2 жыл бұрын
yeah, can u please provide those handwritten notes?
@Muskan-by3ze
@Muskan-by3ze 2 жыл бұрын
Sir total kitni techiques h?
@muneebwaqas400
@muneebwaqas400 11 ай бұрын
@Abhishek Sharma How can we decide that whether if we want a 3X3 key or 2X2 key?
@creed_forever
@creed_forever 3 ай бұрын
Depends on the length of key text. If key length is 4 then 2x2 if key length is 9 then 3x3. Add filler letters if the length of key text is not a perfect square.
@kavitabhosale2397
@kavitabhosale2397 3 жыл бұрын
what if the value is repeated in one column ? eg. TT ? can we replace it by TX like playfair matrix ? suppose place at ten [P] [A] [E] [T] [E] [L] [C] [A] [T] [N] is this correct or we have replace one T by X?
@nihalmohammed9619
@nihalmohammed9619 2 жыл бұрын
DID U HAPPENED TO FOUND OUT WHAT WE HAVE TO DO IN THIS CASE?
@basicmaths8026
@basicmaths8026 Жыл бұрын
Repitition is not allowed in playfair matrix.. its against the rule..if we have a alphabet which is 3 times repeated we will just consider it once
@letsbeautifyu6860
@letsbeautifyu6860 3 жыл бұрын
Bro 2+3(19)=59 3+6(19)=117 then when we done mod 26 to those values then am getting another letters🙄
@sahilprasantachoudhury911
@sahilprasantachoudhury911 3 жыл бұрын
Self referential note: This topic is important
@gauravjoshi3687
@gauravjoshi3687 3 жыл бұрын
what if the key is not in nxn matrix. Lets say *Hey*?
@siddhantsingh6578
@siddhantsingh6578 4 жыл бұрын
Hm d ka inverse na nikale aur determinant se divide kr de to?
@aadityakant7329
@aadityakant7329 Жыл бұрын
Hello bhiya Hill cipher ke liye kon sa book follow kiye hai , bataeye Jaruri hai Book name please 🙏
@DEEPAKKUMAR-xx5ri
@DEEPAKKUMAR-xx5ri 2 жыл бұрын
Please bro iske sare notes ke pdf banake provide kara do🙏🙏🙏🙏
@dharma_reddy
@dharma_reddy 4 жыл бұрын
How to find inverse if we get the determinant of the key matrix an even number. I think we cant do the same process if we get determinant an even number where we cannot find inverse using this method. Can you do the same problem using key matrix[1 7;9 3].
@shawnlawrencedante1209
@shawnlawrencedante1209 3 жыл бұрын
I agree with you
@shreshthatripathi8861
@shreshthatripathi8861 2 жыл бұрын
If we have determinent value and adj value then what is the need to find multiplicative inverse of determinent..??
@arunkc9147
@arunkc9147 7 ай бұрын
Because key must be in whole number not in fraction, if suppose |k|=5 and we directly do 1/|k| we get fraction value in final value of k inverse. To make clear why we take whole number only, is because letters of alphabet are arranged from 0-25, if it's 0, then we say it's letter a, if it's 1 then its letter b, but if k is in fraction like 1/2, what should we replace? So for this we don't directly calculate 1/|k|,
@GurpreetSingh-gs7vb
@GurpreetSingh-gs7vb 3 жыл бұрын
timestamp 15:00 - before decryption , how we have remove -ve values (add 26 to -ve no.) , if value is let -343 then how ?
@manmohan_pundir
@manmohan_pundir 2 жыл бұрын
Add 26 till u get positve value
@rubabshah8116
@rubabshah8116 9 ай бұрын
Kindly guide me how can we find the value 57 114 mod 26 =5 10
@griefandghewar
@griefandghewar 7 ай бұрын
26*2+5=57 so that leaves remainder 5
@vinyastv8955
@vinyastv8955 4 ай бұрын
@@griefandghewar thank u
@chiragvyas3461
@chiragvyas3461 3 жыл бұрын
plain text should be converted into 1*n matric
@tahaahmed9787
@tahaahmed9787 4 жыл бұрын
If determinant value comes negative then what we will do like -3 then ?
@pranv_garg
@pranv_garg 4 жыл бұрын
then -3 mod 26
@prasadmathpati1784
@prasadmathpati1784 3 жыл бұрын
Sir... Determinant value is 131 .then what is it's inverse..... Please tell sir
@manojjain264
@manojjain264 4 жыл бұрын
Is it necessary to take value of A=0?? Can we take a=1 and so on with other alphabets??
@AbhishekSharmaDit
@AbhishekSharmaDit 4 жыл бұрын
As a standard we use a=0 b is 1 and so on So that if we take modulus with 26 we can get the values as 0,1,2 .... But of we use A=1 B=2 .... Then Z Will be 26 And 26 mod 26 will be 0 and that will be an exception But its not wrong you can then divide by 27 then But its not given anywhere so u can google it out for details
@malleswarikandregula4570
@malleswarikandregula4570 3 жыл бұрын
Please you can do these in English language
@chetandivekar1813
@chetandivekar1813 2 жыл бұрын
Why you cannot take the attack as [A T T A C K] so the k is 2×2 matrix and p is 2×3 which can me multiplective matrix and the resultant matrix is 2×3
@sadiashamas786
@sadiashamas786 Жыл бұрын
Bhai adjoint ma 26 q add kia ha koi or bi kr skty ha kia?
@mariyamamreen439
@mariyamamreen439 2 жыл бұрын
Determint me 26 se bra b ae to kia usse ase hi le k jna ha next k mod Lena ha phel??
@indusounkhla7576
@indusounkhla7576 9 ай бұрын
Why you hv taken 2*1 matrix for AT ,should we take 1*2 matrix if not thn why?
@m.azeemaslam2872
@m.azeemaslam2872 4 жыл бұрын
how to convert 5 letter into hill cipher for example hello
@windowsmaster786
@windowsmaster786 2 жыл бұрын
Hill cipher is a polygraphic substitution cipher
@ferozahmad6934
@ferozahmad6934 3 жыл бұрын
in decrypt part sir why you use mod 26 twice ...
@vishnus2567
@vishnus2567 3 жыл бұрын
what if the plain text contains only 7 letters? how we can we can arrange it as vectors?
@ashutoshgangwar1638
@ashutoshgangwar1638 2 жыл бұрын
You may add filler(bogus) letters and after decryption remove them
@bazilshah8976
@bazilshah8976 Жыл бұрын
Sir encryption tou app nysmjhayi bhot achy sy lakin dcription m bhaag rhy hain Aor multiplative inverse bhe sahi sy nai smjha payee
Playfair Cipher Algorithm
12:28
Abhishek Sharma
Рет қаралды 352 М.
DES in Hindi video-1 | Data Encryption Standard in Cryptography
18:32
Abhishek Sharma
Рет қаралды 708 М.
Идеально повторил? Хотите вторую часть?
00:13
⚡️КАН АНДРЕЙ⚡️
Рет қаралды 6 МЛН
Они так быстро убрались!
01:00
Аришнев
Рет қаралды 1,9 МЛН
Hill Cipher (Encryption)
17:39
Neso Academy
Рет қаралды 466 М.
Public Key Cryptography - Computerphile
6:20
Computerphile
Рет қаралды 887 М.
AES Explained (Advanced Encryption Standard) - Computerphile
14:14
Computerphile
Рет қаралды 1,2 МЛН
Hill Cipher Decryption 2by2 Matrix
10:55
SR COMPUTER EDUCATION
Рет қаралды 150 М.
Row Column Transposition Ciphering Technique
8:15
Neso Academy
Рет қаралды 248 М.
Playfair Cipher (Part 1)
12:49
Neso Academy
Рет қаралды 462 М.
Hill Cipher Encryption Explained in Detail with Solved Example in Hindi
11:28
5 Minutes Engineering
Рет қаралды 213 М.
Caesar Cipher in Cryptography | Substitution Techniques
14:34
Abhishek Sharma
Рет қаралды 293 М.