1 00:00:00,180 --> 00:00:05,080 Now, there is another definition that we are defining now, this was for encrypting. 2 00:00:05,460 --> 00:00:09,450 Now we have four say decrypt message. 3 00:00:09,930 --> 00:00:12,850 Here we take only the value of key. 4 00:00:13,460 --> 00:00:24,510 OK, and in this particular definition, we take a variable C is equal to we call the encrypt message 5 00:00:24,510 --> 00:00:29,160 here and we pass the value of SDR, comma, key one. 6 00:00:29,700 --> 00:00:34,290 OK, so whatever value is being written by this function is stored in the value of BTR. 7 00:00:34,770 --> 00:00:39,990 Then we have C decrypt or the E C string. 8 00:00:40,620 --> 00:00:43,470 OK, like we have the in the string we have C. 9 00:00:45,530 --> 00:00:53,430 They insist straight, OK, and this is also initially will do blank, we don't a for, say, I in the 10 00:00:53,430 --> 00:00:56,670 valley of BTR here we check if. 11 00:00:57,710 --> 00:01:10,120 Or of I more than equal to sixty five floors to Brakhage and or die of I is less than equal to 90, 12 00:01:10,670 --> 00:01:24,830 then we are going to say here the variable DNC string is equal to say DNC string plus C in Brakhage 13 00:01:25,190 --> 00:01:35,960 say already at the index ie minus Saeki minus sixty five percentage twenty six plus sixty five. 14 00:01:36,800 --> 00:01:43,820 Then the next elusive part here we will be seeing security at the index. 15 00:01:43,820 --> 00:01:55,940 I'm more than equal to ninety seven and already had the index I less than equal to seven twenty two. 16 00:01:56,870 --> 00:02:07,330 Then we see the NC string is equal to say DNC string plus the value of Sicher. 17 00:02:08,660 --> 00:02:10,280 Get the coat off I. 18 00:02:11,960 --> 00:02:22,280 OK, after which we say minus Kate, minus ninety seven percent or modulars twenty six plus ninety seven 19 00:02:23,120 --> 00:02:30,290 blows the bracket wall for the L spot here and use DNC string. 20 00:02:31,040 --> 00:02:46,100 Now that's equal to the NC string plus feature of the already index ie minus the key value at ski one. 21 00:02:46,820 --> 00:02:50,480 OK, so here we missed this Diski one. 22 00:02:52,070 --> 00:03:02,100 OK, so after we have done this, if, if and the aspart OK, we go back here and see your return, 23 00:03:02,960 --> 00:03:09,800 the value of the NC string, then we end this particular function, then we move on footprint. 24 00:03:10,190 --> 00:03:19,160 We ask here and string to encrypt and decrypt. 25 00:03:19,880 --> 00:03:23,300 OK, then we take your string. 26 00:03:23,300 --> 00:03:33,050 One is equal to we call the input and take the value that then we print see the value as enter the key 27 00:03:33,380 --> 00:03:37,070 and we give your C example eleven. 28 00:03:37,730 --> 00:03:41,180 OK, you can give anything, just a value which you want to input. 29 00:03:41,750 --> 00:03:48,920 Then we take your C keep is equal to convert to integer the value of input. 30 00:03:49,760 --> 00:03:54,050 OK then we check if your keeping. 31 00:03:55,080 --> 00:03:58,170 Is equal to keeping more or less. 32 00:03:58,890 --> 00:04:03,840 Twenty six, OK, and we give your friend see 33 00:04:07,080 --> 00:04:16,020 encrypted string and close the double quotes here we call the function that is encrypt the message. 34 00:04:16,530 --> 00:04:21,000 So let us copy down this here and here. 35 00:04:21,000 --> 00:04:25,460 We pass the value that this string one and keep. 36 00:04:26,340 --> 00:04:39,680 OK, similarly next, we give your decrypted string colon and here we call the function that is decrypt 37 00:04:39,690 --> 00:04:40,590 the message here. 38 00:04:40,590 --> 00:04:45,360 Also, we just pass the value of Kippy because string is not required. 39 00:04:45,360 --> 00:04:48,140 String is already taken by the encrypt function. 40 00:04:48,180 --> 00:04:48,570 Right. 41 00:04:48,960 --> 00:04:50,970 So with this, we save this. 42 00:04:51,160 --> 00:04:54,240 OK, so let us save it in a drive. 43 00:04:55,290 --> 00:05:03,270 Same folder said the military got by and we save it and we try to execute this. 44 00:05:03,900 --> 00:05:06,210 So interesting, you want to encrypt decrypt. 45 00:05:06,310 --> 00:05:16,340 So this is fighting hacking session one and some examples. 46 00:05:16,420 --> 00:05:18,630 We enter your 12. 47 00:05:20,900 --> 00:05:21,900 OK, fine. 48 00:05:21,950 --> 00:05:23,030 Let's shake this. 49 00:05:24,350 --> 00:05:26,700 OK, we have made a mistake. 50 00:05:26,750 --> 00:05:34,210 This also has to be the same system we are taking the there and passing the same string and the encrypt 51 00:05:34,210 --> 00:05:34,610 message. 52 00:05:34,630 --> 00:05:36,840 So now we save it and we run the module. 53 00:05:37,180 --> 00:05:47,400 So now we see this is saved by hacking session once, OK? 54 00:05:47,470 --> 00:05:53,740 And if you want to enter so that it has encrypted a particular message and it has decrypt, we have 55 00:05:53,740 --> 00:05:55,180 just not reversed it. 56 00:05:55,510 --> 00:06:02,260 But now we have also encrypted it in a proper format and we have also decrypted the same in a proper 57 00:06:02,260 --> 00:06:02,580 format. 58 00:06:03,310 --> 00:06:07,540 OK, so that is how we have done this encrypting and decrypting option.