1 00:00:00,240 --> 00:00:06,300 Will come for the next session in Biton, hacking into, of course, now in the earlier session, we 2 00:00:06,300 --> 00:00:11,100 have learned that the Afine Saiful is actually the multiplicative. 3 00:00:11,100 --> 00:00:18,360 Saiful, combined with the scissors and the multiplicative, Saiful is similar to a seasonal Saiful 4 00:00:18,540 --> 00:00:24,100 except it uses multiplication instead of addition to encrypted messages. 5 00:00:24,510 --> 00:00:30,600 So now in this session we will build and run a program to implement the Fine Saiful now because you'll 6 00:00:30,600 --> 00:00:35,580 find Saiful uses two different Saiful as part of its encryption process. 7 00:00:35,820 --> 00:00:41,650 It needs Loki's one for a multiplicative cipher and another for seasonal Saiful. 8 00:00:42,000 --> 00:00:48,750 So for the Afine Saiful program we will split a single integer into two different views and the topics 9 00:00:48,750 --> 00:00:52,470 which we will be covering in this session would be the tuple data type. 10 00:00:52,650 --> 00:00:57,980 How many different keys can and a fine cipher and generating some random keys. 11 00:00:58,440 --> 00:01:02,010 So we move on to the source code for the affianced program. 12 00:01:02,430 --> 00:01:09,090 So here we would be creating a file, new file and we would be entering the code into this particular 13 00:01:09,090 --> 00:01:09,840 file ed. 14 00:01:10,260 --> 00:01:15,580 We would save it with a fine named or we might not make sure that we're able to save this file. 15 00:01:15,600 --> 00:01:22,410 You should have the paperclip module, the module that we created in the last session in the same folder 16 00:01:22,410 --> 00:01:23,880 as you, saving the same file. 17 00:01:24,150 --> 00:01:26,130 So let us start creating this file. 18 00:01:26,160 --> 00:01:30,630 Now, the first thing is let us go to our Windows Explorer. 19 00:01:30,960 --> 00:01:33,590 So we go to the Explorer. 20 00:01:33,810 --> 00:01:37,720 Now, when you drive, we are saving in Python intermediate level all the goals. 21 00:01:38,030 --> 00:01:41,890 So here we have the Cryptome at one module and we have the paperclip. 22 00:01:42,900 --> 00:01:47,760 So now let's go back to our goal here in the new file. 23 00:01:48,060 --> 00:01:51,420 And first thing is, we will have to import now. 24 00:01:51,420 --> 00:02:08,880 We will be importing the S y es then by the end of March one, that is C ottavi and then fandoms after 25 00:02:08,880 --> 00:02:13,440 this import we are creating here, says Symbol's SDR. 26 00:02:13,980 --> 00:02:17,010 That's equal to saving all the capital letters. 27 00:02:18,670 --> 00:02:31,650 I think all of you are receiving WXYZ now, all in small a, b, c, d e f g h i j k elemental b q honesty 28 00:02:31,770 --> 00:02:34,380 u v w, x, y, z. 29 00:02:34,380 --> 00:02:39,270 And then the numbers did zero. 30 00:02:39,300 --> 00:02:46,180 Then a space exclamation question mark foetid operator and close this of course. 31 00:02:46,500 --> 00:02:50,790 Now after this we are going to define the main method. 32 00:02:51,300 --> 00:02:57,630 And in this we would be creating say my message a and that's equal to now. 33 00:02:57,630 --> 00:02:59,260 We are giving it in a duplicate. 34 00:02:59,360 --> 00:03:00,390 See your. 35 00:03:01,940 --> 00:03:02,840 Computer. 36 00:03:04,600 --> 00:03:10,090 Would dissolve to be called as. 37 00:03:12,240 --> 00:03:15,030 Intelligent if it. 38 00:03:16,300 --> 00:03:16,750 Coach. 39 00:03:20,450 --> 00:03:24,920 Behave like a human into. 40 00:03:27,240 --> 00:03:38,730 Believing that it was human, some phrase we have written, OK, let us give some name, ABC. 41 00:03:43,290 --> 00:03:43,830 Thank you. 42 00:03:44,220 --> 00:03:44,470 OK. 43 00:03:44,490 --> 00:03:50,820 And then we will close this with triplets, so now that's just one. 44 00:03:51,570 --> 00:03:58,280 And here we would be creating the next that is see my ETR. 45 00:03:58,320 --> 00:04:01,970 And that is equal to we are giving it nine four, for example. 46 00:04:02,580 --> 00:04:04,990 We are creating your mind, Modesta. 47 00:04:05,010 --> 00:04:08,720 And that is equal to we are giving the text as in group. 48 00:04:08,730 --> 00:04:11,880 Now you can either set it to encrypt or decrypt. 49 00:04:11,880 --> 00:04:19,470 Currently we are sending it to encrypt and then we are checking below that if the value of my Monastir 50 00:04:19,620 --> 00:04:22,540 is equal to encrypt. 51 00:04:22,650 --> 00:04:25,020 OK, then what are you supposed to do. 52 00:04:26,250 --> 00:04:37,380 Let's go below and we will open the call and here we will create a translator to steer is equal to now. 53 00:04:37,390 --> 00:04:41,730 We will be calling this encrypt message that we want to create. 54 00:04:42,140 --> 00:04:47,220 So will be able to encrypt message as are forced then, Mike. 55 00:04:48,030 --> 00:05:02,260 And my message is then you check that as if your mind, Modesta, if it is equal to decrypt, not encrypt, 56 00:05:02,430 --> 00:05:04,230 then you will see. 57 00:05:05,360 --> 00:05:11,390 Translated steer is equal to we would be creating the group message to steer. 58 00:05:11,720 --> 00:05:19,400 And again, we would be passing the Mickey ETR and my message is steering this. 59 00:05:19,580 --> 00:05:27,320 And after this, let's go back here and print the value of key all symbols. 60 00:05:27,320 --> 00:05:31,700 And as we put into law enforcement, Mickey. 61 00:05:33,410 --> 00:05:42,220 SDF and after this, the next print will give in single quotation marks, zipless and as Ed. 62 00:05:43,710 --> 00:05:56,280 Text Glenn Close this and Hillary posted say my Modeste are not tight, then print the value of. 63 00:05:57,840 --> 00:06:01,980 Translated, I stand here and use five. 64 00:06:04,140 --> 00:06:04,640 Copy. 65 00:06:04,980 --> 00:06:05,970 For copying the. 66 00:06:07,250 --> 00:06:12,590 Translated up and put into Saiful. 67 00:06:14,760 --> 00:06:15,390 Text. 68 00:06:16,780 --> 00:06:17,470 Cold feet. 69 00:06:20,590 --> 00:06:26,940 Clipboard and put into the value of my more Esther. 70 00:06:27,350 --> 00:06:34,240 Now, once you have done all the transactions, letters and dysfunction here and go back here and define 71 00:06:34,240 --> 00:06:35,050 SEGERT. 72 00:06:38,200 --> 00:06:47,890 Keep out this year, and here we will pass the parameter keister and here we will get see a one that's 73 00:06:47,890 --> 00:06:49,690 equal to sickies. 74 00:06:51,810 --> 00:07:06,150 Land of symbols STF similarly give one is equal to hastier and then your widow modulars length of. 75 00:07:07,390 --> 00:07:13,670 Symbols, SGA, and then we return here the value of key. 76 00:07:14,650 --> 00:07:23,710 Even comma de Vivan now, after we have returned the value of QI, we need another definition that is 77 00:07:23,710 --> 00:07:25,420 Cicek SDR. 78 00:07:25,780 --> 00:07:28,430 And here we are passing the value of QI. 79 00:07:28,510 --> 00:07:31,360 Even then he V1. 80 00:07:32,780 --> 00:07:48,050 And Modesta, and then here we are checking that if C, P, E one is equal to one and say Modesta is 81 00:07:48,050 --> 00:07:52,910 equal to say incorrect, then what are you supposed to do? 82 00:07:53,180 --> 00:08:00,460 Say start exact blueprint CESI four is we give. 83 00:08:02,100 --> 00:08:02,490 Kee. 84 00:08:03,740 --> 00:08:09,560 Yvonne is one, so we give here, say Choo's or. 85 00:08:10,940 --> 00:08:11,510 Different. 86 00:08:12,830 --> 00:08:15,570 So directly, we are saying your sister, except for that.