1 00:00:00,180 --> 00:00:07,650 Now, in this session, we will be using the brute force approach to hack the transposition cipher of 2 00:00:07,650 --> 00:00:13,020 the thousands of keys that could possibly be associated with the transposition cipher. 3 00:00:13,530 --> 00:00:20,100 Now, the correct key now should be the only one that results in an eligible English. 4 00:00:20,340 --> 00:00:26,560 So here in this particular example, we would be using the older example which we have created for Czech 5 00:00:26,580 --> 00:00:27,120 English. 6 00:00:27,190 --> 00:00:34,470 OK, where we have written transposition cipher Hackl program will find us the correct key using the 7 00:00:34,830 --> 00:00:38,070 Czech English not be code or that we have written. 8 00:00:38,220 --> 00:00:43,690 So now let us come and write down this old score for the Transpositions Saiful Hackl program. 9 00:00:43,890 --> 00:00:51,000 So as normal we would be creating a file new file and we would be entering the code here and saving 10 00:00:51,000 --> 00:00:53,490 it by any example, not by. 11 00:00:53,640 --> 00:00:58,890 OK, now make sure wherever you are saving this particular fight in the same folder, you should have 12 00:00:58,890 --> 00:00:59,610 the paper clip. 13 00:00:59,610 --> 00:01:03,900 But also you should also have the Demo 13 file. 14 00:01:04,320 --> 00:01:06,820 Also check English that we have seen. 15 00:01:07,080 --> 00:01:13,440 Now, if you just go to your Windows Explorer here and look at our folder, that despite an intermediate 16 00:01:13,440 --> 00:01:19,380 level here, we have the checking list or pivo, which we have already done now Demo 13 and we have 17 00:01:19,380 --> 00:01:25,740 taken from our beginner level because in that we had created for decryption and the paper clip we had 18 00:01:25,760 --> 00:01:26,280 imported. 19 00:01:26,670 --> 00:01:31,620 And this dictionary is indeed from the last station that we have created. 20 00:01:31,950 --> 00:01:37,440 So all these four files have to be there in the same folder where we want to see if the current file 21 00:01:37,440 --> 00:01:38,650 that we're creating. 22 00:01:38,790 --> 00:01:45,370 OK, so now let's go back here and create a file for transposition cipher Hakka program. 23 00:01:45,840 --> 00:01:51,460 So the first thing we will do is write down here the import paper clip. 24 00:01:51,600 --> 00:01:55,310 Then the next we have is check English 25 00:01:57,750 --> 00:02:01,320 and the next we have this demo 13. 26 00:02:01,710 --> 00:02:06,220 OK, now we define here the main method. 27 00:02:06,660 --> 00:02:15,510 OK, now in this particular code, we would be writing down your message saying, my MSJ, that's equal 28 00:02:15,510 --> 00:02:19,680 to OK, we are giving it in quotation marks. 29 00:02:21,930 --> 00:02:28,020 OK, now here, before writing this message for decryption, what we would do is let us open. 30 00:02:28,470 --> 00:02:34,270 Now in drive, we have this Demo 10, which is basically for encrypting. 31 00:02:34,620 --> 00:02:41,400 So here we would put some text, say this is 510 32 00:02:43,830 --> 00:02:44,550 hacking 33 00:02:47,160 --> 00:02:54,660 intermediate level because we are trying 34 00:02:58,350 --> 00:03:03,900 hacking with Trons position. 35 00:03:05,770 --> 00:03:06,460 Sipho. 36 00:03:08,780 --> 00:03:12,920 This message is used to. 37 00:03:15,450 --> 00:03:23,370 Encrypted the text now we have written this particular message, let us splattered across multiple lines. 38 00:03:29,010 --> 00:03:29,720 And. 39 00:03:30,900 --> 00:03:32,340 Let's try to give your. 40 00:03:35,950 --> 00:03:40,420 OK, and now let us try to run this particular course. 41 00:03:41,360 --> 00:03:46,910 Now, this is what we are getting it as an encrypted message, so now we would copied on this. 42 00:03:47,210 --> 00:03:50,170 OK, let's close this demo then. 43 00:03:50,690 --> 00:03:57,290 As for now and here, we would paste that encrypted, which we want to decrypt using transposition, 44 00:03:57,290 --> 00:03:57,680 hacking. 45 00:03:57,920 --> 00:04:07,790 OK, so now if you just look at over them online, for example, Lemington, for example, we have Yoshiaki, 46 00:04:07,790 --> 00:04:08,210 that is. 47 00:04:08,600 --> 00:04:10,460 And this is the text that we have used. 48 00:04:10,490 --> 00:04:14,470 OK, so now the same key would be used for decryption. 49 00:04:15,170 --> 00:04:20,990 So once we are done doing this particular or executor's particular program now, what do we want to 50 00:04:20,990 --> 00:04:24,890 do is if we want can move it like this. 51 00:04:25,700 --> 00:04:26,080 OK. 52 00:04:28,190 --> 00:04:35,780 And then after writing this, my message board here, let's not give these basis, let it be hazardous. 53 00:04:39,470 --> 00:04:46,520 OK, now, before below this, we would have had a misty start. 54 00:04:46,970 --> 00:04:53,220 Now that is equal to we are going to find another matter in this and that matter will be be transposition. 55 00:04:53,600 --> 00:04:55,430 So we are calling that over here. 56 00:04:55,430 --> 00:05:05,150 Haak trons position is to give their mind MSG's but amica would you want to. 57 00:05:05,150 --> 00:05:16,310 Hecate OK then we check if we had Misty GST are is equal to none then we are going to give here princi 58 00:05:16,550 --> 00:05:20,030 in single quotes say field. 59 00:05:23,460 --> 00:05:34,600 To crack encryption or else we will give print as. 60 00:05:36,600 --> 00:05:42,630 Copying her message to Clybourn. 61 00:05:44,630 --> 00:05:52,970 OK, and we know that we will give another predicament where we would be printing the hacked Amnesty 62 00:05:52,980 --> 00:06:04,750 Aschiana message and then we would see a paper clip not copy again, hacked Amnesty Hestia, OK. 63 00:06:04,790 --> 00:06:15,950 And after this now we are supposed to define the hack Tranz position, SDR method, which is going to 64 00:06:15,950 --> 00:06:19,420 be a message Asgeir as the not going into it. 65 00:06:19,940 --> 00:06:27,860 And in this particular message or the method we are going to print, say, in single code hacking. 66 00:06:29,500 --> 00:06:33,440 OK, close this then. 67 00:06:34,760 --> 00:06:41,720 Now over here, basically Python programs that we're executing can be stopped at any time while executing 68 00:06:41,740 --> 00:06:46,200 repressing controls on windows or control on machoism Linux. 69 00:06:46,250 --> 00:06:55,790 OK, so here we are going to give a print command for the user leaving their text, say press control, 70 00:06:56,450 --> 00:07:19,260 see on windows or control the say on Mac OS and Linux to which at any time when the program is executing. 71 00:07:20,270 --> 00:07:26,180 Now after that, we would be using a brute force by looping through every possible key. 72 00:07:26,570 --> 00:07:35,590 So we use here the key is still in the range of we are giving one comma the length of messages here 73 00:07:36,470 --> 00:07:49,280 and in this four loop we are printing C trying keep hash, we print your percent s, then we give the 74 00:07:49,880 --> 00:07:55,350 end of single code and print the value of SDR here. 75 00:07:55,850 --> 00:08:03,490 Then we use C decrypt or decrypted text SDR. 76 00:08:03,620 --> 00:08:05,360 That's equal to now. 77 00:08:05,360 --> 00:08:07,550 We want to use the demo. 78 00:08:07,660 --> 00:08:12,510 Then don't let us just open up the demo then file. 79 00:08:12,890 --> 00:08:20,200 Let's open demo 30 and here we are having the decrypted messages here. 80 00:08:20,360 --> 00:08:23,270 So we would be using demo 13. 81 00:08:23,270 --> 00:08:26,210 Bot Decrypt message is still here. 82 00:08:26,210 --> 00:08:34,040 We are passing the GST R and the message STF wanted to create the method again. 83 00:08:34,040 --> 00:08:35,810 Hence we are using it for.