1 00:00:00,180 --> 00:00:04,920 Now, let us take a closer look at the Fine Saiful hacker program that we have created. 2 00:00:05,520 --> 00:00:12,180 So let us go to the program and the first line that is importing four different modules, one is your 3 00:00:12,210 --> 00:00:12,900 paperclip. 4 00:00:13,230 --> 00:00:17,060 A fine for them will check English and Cryptome. 5 00:00:17,490 --> 00:00:23,190 So when you run the are fine for hacker program, you will see that it produces a lot of output as it 6 00:00:23,190 --> 00:00:26,280 walks this way through all the possible descriptions. 7 00:00:26,490 --> 00:00:29,740 Harveyville, printing all this output slows down the program. 8 00:00:29,760 --> 00:00:35,880 So if you want to speed up the program, said the silent mode variable to try to stop it from printing 9 00:00:35,880 --> 00:00:36,930 all these messages. 10 00:00:37,240 --> 00:00:43,370 So if we have done this falsehood, suppose we make this true and now we run this. 11 00:00:43,710 --> 00:00:46,680 So now we will get there some particular values. 12 00:00:46,680 --> 00:00:51,840 Not all so now would not be slowing your CPU time. 13 00:00:53,040 --> 00:00:54,750 This is if you want to do it. 14 00:00:54,810 --> 00:00:56,880 If you don't do it well, it doesn't matter. 15 00:00:57,400 --> 00:01:00,720 So it will complete this execution for us. 16 00:01:00,850 --> 00:01:03,300 We would make it again, false. 17 00:01:04,160 --> 00:01:05,250 No need of doing it. 18 00:01:05,640 --> 00:01:09,540 The ciphertext to be hacked is stored in a particular string variable. 19 00:01:09,810 --> 00:01:11,870 That is my message asdf. 20 00:01:12,510 --> 00:01:18,390 Now the string is passed on to your cofinanced your function, which we will look in the coming session. 21 00:01:18,750 --> 00:01:24,360 The return value from this caller is either a string of the original message if ciphertext has hacked 22 00:01:24,360 --> 00:01:27,490 or the non-value if the hacking has failed. 23 00:01:27,960 --> 00:01:31,380 So over here we are checking using the if condition. 24 00:01:32,340 --> 00:01:37,430 So we hear that the message is still variable, was that to none? 25 00:01:37,860 --> 00:01:44,010 And if it is, there is not equal to the messages printed on the screen and copied to the clipboard. 26 00:01:44,010 --> 00:01:49,350 Otherwise, programs simply prints the feedback to the user that it was unable to hack the ciphertext. 27 00:01:49,650 --> 00:01:55,780 Now, let's take a closer look at how the hack, a fine Asgeir matter that we have created of, looks 28 00:01:56,130 --> 00:01:59,880 so succumbing to the definition of hack a fine SGA. 29 00:02:00,390 --> 00:02:04,260 OK, now it begins that contains the call for the decryption. 30 00:02:04,260 --> 00:02:09,630 First of all, it starts by printing some instructions to the user's decryption process. 31 00:02:09,780 --> 00:02:10,660 Can take a while. 32 00:02:10,800 --> 00:02:16,890 So if the user wants to exit program only, they can press controls on windows or control the Mac or 33 00:02:16,920 --> 00:02:17,460 Linux. 34 00:02:17,880 --> 00:02:23,310 So before we continue with the rest of the code, we'll have the forced learn about the exponent operator, 35 00:02:23,310 --> 00:02:24,760 which we are using it over here. 36 00:02:25,140 --> 00:02:29,390 So the exponent operator is basically a useful mat operator. 37 00:02:29,490 --> 00:02:32,560 You need to know to understand the fine site for hacker program. 38 00:02:32,880 --> 00:02:39,810 Now, besides the basic plus minus multiplication division or the double division operator, we have 39 00:02:39,810 --> 00:02:42,250 the exponent operator, which is double multiplication. 40 00:02:42,540 --> 00:02:48,570 Now the exponent operator raises a number to the power of another number, for example, to the power 41 00:02:48,570 --> 00:02:56,610 of five would be looking something like we just put this in the command part said to Exponent Operator 42 00:02:56,700 --> 00:02:57,130 five. 43 00:02:57,360 --> 00:03:01,170 Now this is equivalent to two multiplied by itself five times. 44 00:03:01,170 --> 00:03:05,300 That is, we can say two in total into two in total in total. 45 00:03:05,730 --> 00:03:09,540 Now both expressions evaluate to an integer value, which is thirty two. 46 00:03:09,810 --> 00:03:16,110 For example, if you want to just check this, we go back to the interactive SQL and type here say five 47 00:03:17,010 --> 00:03:18,060 exponent to two. 48 00:03:18,450 --> 00:03:22,920 Twenty five to five comes to thirty two. 49 00:03:23,460 --> 00:03:24,510 Seven twenty three. 50 00:03:28,640 --> 00:03:29,880 Comes to a particular number. 51 00:03:30,170 --> 00:03:36,170 So the expression five into to evaluate twenty five, because five multiplied by itself is equivalent 52 00:03:36,180 --> 00:03:42,440 to twenty five, likewise to double multiplied by five written so little because two multiplied by itself 53 00:03:42,440 --> 00:03:45,100 five times evaluates to 32. 54 00:03:45,560 --> 00:03:51,190 So let's return to the source code now and see what the double exponential operator does in the program.