1 00:00:00,060 --> 00:00:01,200 So make more. 2 00:00:03,910 --> 00:00:13,350 Then what all this was after the complete import statement, we would go for creating Zelikow's SDR, 3 00:00:13,350 --> 00:00:17,400 which is a constant, and here we are giving all the code and capital. 4 00:00:17,400 --> 00:00:29,550 So the f g h i j guillemin opis to estie, youve w, x, y, z, all the letters in the capital. 5 00:00:29,640 --> 00:00:41,750 We have given and require you to see no letters or space battle that's equal to we are giving here oddy 6 00:00:41,760 --> 00:00:43,950 dot com by. 7 00:00:45,400 --> 00:00:50,330 And in this, we are giving a single quotation marks. 8 00:00:50,710 --> 00:01:00,700 We are giving the exponential operator from a capital Z slash as low as this and the wreckage after 9 00:01:00,700 --> 00:01:04,600 this, we are starting with the definition of main function. 10 00:01:04,750 --> 00:01:08,320 And inside of this, we are creating our message. 11 00:01:08,320 --> 00:01:09,450 ACR are OK. 12 00:01:09,880 --> 00:01:16,000 And in this message is we are supposed to give the encrypted text, which we need to decrypt and so 13 00:01:16,000 --> 00:01:16,430 forth. 14 00:01:16,530 --> 00:01:20,300 What we would do is let's open our site for them. 15 00:01:20,710 --> 00:01:23,600 So for that, let us go here only. 16 00:01:24,070 --> 00:01:31,360 And we would see the substitution cipher demo and we would copy down this message. 17 00:01:31,550 --> 00:01:37,400 OK, so let us just commend this spot as this, OK? 18 00:01:37,420 --> 00:01:39,610 And let's remove the command of this. 19 00:01:39,910 --> 00:01:47,330 And now we would copy of this from the current file and based it over here. 20 00:01:47,470 --> 00:01:51,060 OK, now this is what basically we want to decrypt. 21 00:01:51,490 --> 00:01:57,340 OK, now after that we are going to determine the possible value ciphertext translations. 22 00:01:57,670 --> 00:02:02,440 So for that we would be creating safe print and printing 23 00:02:05,560 --> 00:02:06,000 packing. 24 00:02:07,590 --> 00:02:19,510 The fight, OK, and then we are creating little mapping, one that's equal to see heck of simple survival 25 00:02:19,530 --> 00:02:21,240 and pass message. 26 00:02:21,250 --> 00:02:22,320 S.G. in that. 27 00:02:22,620 --> 00:02:24,770 Now this we would be creating bilum. 28 00:02:25,050 --> 00:02:26,440 Heck, so simple. 29 00:02:26,820 --> 00:02:35,640 OK, now before that for displaying the results, we would give a print command seeing mapping and then 30 00:02:35,640 --> 00:02:40,500 we print the value of little mapping. 31 00:02:40,500 --> 00:02:48,690 One object that we created about let's print a blank line and below that we would print in single code 32 00:02:48,690 --> 00:02:58,330 the original ciphertext and print the value of your messages. 33 00:02:58,500 --> 00:03:00,330 You are off the match again. 34 00:03:00,360 --> 00:03:04,620 Print a blank line and then we see copy. 35 00:03:05,950 --> 00:03:19,930 The hacked message to global, OK, after this, we are creating an object or a variable for hack message 36 00:03:19,930 --> 00:03:28,090 one, and that is equal to again here we will be creating this matter, said Decrypt with Saiful 37 00:03:30,430 --> 00:03:33,130 little mapping one. 38 00:03:33,460 --> 00:03:42,070 And in that we are going to pass the message SDR variable and our little mapping one. 39 00:03:42,760 --> 00:03:47,710 OK, and then we see the paper clip. 40 00:03:48,700 --> 00:04:01,720 Got sloppy and you hear that message, what is the parameter, again, for the value of that message 41 00:04:01,720 --> 00:04:06,300 was OK after successfully giving multiple commands? 42 00:04:06,540 --> 00:04:15,220 OK, now below this, we will give your definition for another function that is Segert blank. 43 00:04:17,370 --> 00:04:18,180 Saiful 44 00:04:20,670 --> 00:04:22,780 little mapping one. 45 00:04:23,280 --> 00:04:29,540 And in this particular function, we are just going to on a dictionary value that is blank Falletta 46 00:04:29,550 --> 00:04:30,090 mappings. 47 00:04:30,360 --> 00:04:36,640 So here we just have a written statement and in this written statement we are going to write down say 48 00:04:36,660 --> 00:04:49,350 for example a colon open close bracket comma be all again open close bracket similarly see colon open 49 00:04:49,350 --> 00:04:54,210 closed bracket, the colon open closed bracket. 50 00:04:54,800 --> 00:04:59,580 So now let's just copy on this and change it. 51 00:04:59,820 --> 00:05:00,690 That's E. 52 00:05:02,410 --> 00:05:05,350 Then you have f 53 00:05:07,990 --> 00:05:08,560 g 54 00:05:12,550 --> 00:05:15,460 h i 55 00:05:18,070 --> 00:05:29,350 j k l m n o p q r s deeply sorry you re WXYZ. 56 00:05:29,730 --> 00:05:34,400 OK, and let's close this bracket here. 57 00:05:34,660 --> 00:05:42,180 So now here we are saying f g h i j let's change this game. 58 00:05:43,690 --> 00:05:48,400 L m n 59 00:05:51,160 --> 00:05:53,500 o p 60 00:05:56,200 --> 00:06:05,320 then q r s t u. 61 00:06:08,840 --> 00:06:22,150 V, W, X, Y and Z, so we're returning all the blank letter mappings using this blank site for letter 62 00:06:22,190 --> 00:06:23,240 mapping object. 63 00:06:23,660 --> 00:06:28,560 OK, now below, we would also create other functions which we are using above. 64 00:06:28,880 --> 00:06:31,890 So let's continue doing this demo in the next session. 65 00:06:32,120 --> 00:06:33,410 That's it from this session. 66 00:06:33,440 --> 00:06:34,340 Thank you very much.