1 00:00:00,360 --> 00:00:08,430 So there is an issue that I'm going to talk about this, because if so, this is very huge and you can 2 00:00:08,430 --> 00:00:12,510 find so many algorithms and the encoding and decoding. 3 00:00:12,510 --> 00:00:17,100 So you can see there are so many tools in order to secure the rest of our tools. 4 00:00:17,490 --> 00:00:23,700 And you can do cryptanalysis and modern cryptography and Barriere fabric. 5 00:00:23,940 --> 00:00:25,490 First the translation. 6 00:00:25,500 --> 00:00:26,430 So for example. 7 00:00:26,730 --> 00:00:36,660 So these are the examples and you can just click on any of this one and you can just encode and decode 8 00:00:36,660 --> 00:00:39,090 the print ciphertext. 9 00:00:40,200 --> 00:00:41,680 So there are so many websites. 10 00:00:42,120 --> 00:00:52,500 So this Web site contains a better list and we can see the character encodings that are ASCII and BACHAR 11 00:00:52,500 --> 00:00:53,270 and codings also. 12 00:00:53,280 --> 00:00:55,470 And you can see also Base64 and Goring's. 13 00:00:58,360 --> 00:01:05,690 And there are so many if you are putting initiative up, make sure that if you try any of these, uh, 14 00:01:05,860 --> 00:01:11,140 algorithms, there are also some symbolic encryptions also. 15 00:01:15,280 --> 00:01:21,220 So as you can see, there are so many so many encouraging signs and good friends and descriptions and 16 00:01:21,220 --> 00:01:25,050 also having steganography, we'll talk about it later. 17 00:01:27,520 --> 00:01:31,360 And you can see there are a lot more tools here. 18 00:01:33,760 --> 00:01:40,780 And if you could go down in history, then you can check out some numerology. 19 00:01:42,580 --> 00:01:53,110 I don't know this one, the Egyptian numerals, and they'll be like these numerals and you can convert 20 00:01:53,110 --> 00:01:57,730 this into the ciphertext and you can send the numbers to the receiver 21 00:02:00,280 --> 00:02:01,090 and. 22 00:02:06,570 --> 00:02:15,480 Let's pray, pray our seas are safer so that it is safer now. 23 00:02:15,560 --> 00:02:17,160 Let's quote. 24 00:02:18,990 --> 00:02:32,850 So my name is Nicole, so that's Encored with the key key 23 surgical procedure. 25 00:02:34,050 --> 00:02:35,180 This is my encrypted. 26 00:02:36,420 --> 00:02:39,060 Now, what I want to use I will copy this. 27 00:02:41,760 --> 00:02:50,190 Now, what I want to do is I will to start so because there are only two excuse and we can just decrypt 28 00:02:50,190 --> 00:02:50,970 every other key. 29 00:02:51,330 --> 00:03:01,650 So I have got all these keys are these plaintext brute force results and that one of this and one sentence 30 00:03:01,650 --> 00:03:03,640 contains some meaningful and my. 31 00:03:04,350 --> 00:03:07,290 So in this way to you can be considered safer. 32 00:03:10,410 --> 00:03:14,180 And I want to show you another website that is called Jeff. 33 00:03:21,770 --> 00:03:23,190 So sorry, not this one. 34 00:03:24,500 --> 00:03:30,410 I don't even typing, that is OK, crappy website. 35 00:03:30,740 --> 00:03:40,280 And in this website you can see so many recordings and you can see these are the recordings and recordings 36 00:03:40,280 --> 00:03:41,810 descriptively provides. 37 00:03:44,500 --> 00:03:53,800 So there is another way to say that he's OK, that it will automatically address the price to do some 38 00:03:55,600 --> 00:03:56,350 description's. 39 00:04:06,650 --> 00:04:13,340 Yes, this is, again, very confused between these Kotcheff and they were just so I don't really want 40 00:04:13,340 --> 00:04:15,020 to put the input here. 41 00:04:17,480 --> 00:04:27,320 OK, let's say this and this sample input, I need you to do drag and drop this. 42 00:04:27,330 --> 00:04:33,910 And so if I want to say encryption, I want to encrypt this using this encryption, I can just sit here 43 00:04:34,310 --> 00:04:36,380 and I could simply put it in here. 44 00:04:37,160 --> 00:04:43,100 So automatically the output, this algorithm we operate on this input and then output will be displayed. 45 00:04:43,850 --> 00:04:52,940 And you can also delete this one and then also take the Morse code and be magic tool. 46 00:04:53,420 --> 00:04:57,170 You can also convert this into the text. 47 00:05:02,380 --> 00:05:07,270 So you can also use the new design for solving the key. 48 00:05:08,760 --> 00:05:09,240 Sorry. 49 00:05:12,600 --> 00:05:13,080 Like this. 50 00:05:13,350 --> 00:05:18,420 These are some things, websites, which helps you in cryptography. 51 00:05:19,350 --> 00:05:21,090 Make sure you check out these. 52 00:05:21,480 --> 00:05:23,940 Just keep an idea of this any time. 53 00:05:23,940 --> 00:05:27,750 If there will be a crew in the city of name, I mean, challenge them. 54 00:05:28,080 --> 00:05:34,830 And then that name gives you a clue that you need to apply this algorithm at this. 55 00:05:34,830 --> 00:05:37,770 Any other asymmetric customer takes over. 56 00:05:37,950 --> 00:05:44,670 So make sure that you just know what are the encodings and encryption software in these websites. 57 00:05:46,290 --> 00:05:51,360 It will your mind will get to get an idea about all this. 58 00:05:51,360 --> 00:05:54,170 And if they will, there will be a clue in the challenge. 59 00:05:54,600 --> 00:05:59,430 And by seeing that clue, you get an idea that, OK, this may be like this cipher. 60 00:06:00,180 --> 00:06:03,750 So these are three websites that I use of our capital city of.