1 00:00:00,240 --> 00:00:06,330 So a number of possibilities based on the site, Folland would be you can have the key, they stole 2 00:00:06,510 --> 00:00:07,560 whatever values. 3 00:00:08,080 --> 00:00:14,700 So the more the higher number of keys you have, the more the bigger you have, the more it is difficult 4 00:00:14,700 --> 00:00:19,320 for computer to crack the given Virginia's Saiful. 5 00:00:19,710 --> 00:00:27,090 So with the keys that are 12 or more letters long, it becomes impossible for a new laptop to crack 6 00:00:27,090 --> 00:00:28,810 them in a reasonable amount of time. 7 00:00:29,490 --> 00:00:35,400 So choosing a key that prevents your dictionary attacks of your keys doesn't have to be a real one. 8 00:00:35,400 --> 00:00:36,100 Like Busia. 9 00:00:36,420 --> 00:00:40,740 It can be any combination of letters of any length just as well. 10 00:00:41,880 --> 00:00:48,840 In fact, not using a word that can be found in a dictionary is best, even though they a radiologist 11 00:00:48,840 --> 00:00:57,620 is also a turkey that is easier to remember than some unique or random characters in that case. 12 00:00:58,470 --> 00:01:04,370 So a crap analyst might anticipate that a cryptographer is using an English word as a key. 13 00:01:04,770 --> 00:01:10,110 So attempting a brute force attack, using very English words in the dictionary is known as a dictionary 14 00:01:10,110 --> 00:01:10,560 attack. 15 00:01:11,120 --> 00:01:14,680 Now it feels a 12 letter word for a dictionary hatzakis. 16 00:01:14,690 --> 00:01:21,270 It would be easier to prove than a random three letter, which would have many more possible combinations 17 00:01:21,270 --> 00:01:21,750 of calls. 18 00:01:21,750 --> 00:01:27,590 The cryptographer has an advantage that the cryptanalysis doesn't know the length of the beginning, 19 00:01:27,840 --> 00:01:33,990 but the cryptanalysis would try all one little kiss and all the two little keys and so on, which would 20 00:01:33,990 --> 00:01:37,620 still allow them to find a dictionary over very quickly. 21 00:01:37,980 --> 00:01:41,810 So now let's move on to the source code for the original cipher program. 22 00:01:42,150 --> 00:01:45,150 So let's close this and go back to over Python. 23 00:01:46,530 --> 00:01:49,140 So over here we would go for a new find. 24 00:01:49,140 --> 00:01:55,440 And in this we would write down the given program and see which again, remember that you should have 25 00:01:55,710 --> 00:01:58,560 the paperclip file in the same detector. 26 00:01:58,630 --> 00:02:02,700 OK, so first thing that we are going to do is we are going to import the. 27 00:02:03,860 --> 00:02:12,970 Paperclip module killer, and then we are going to find the letters star is equal to all the alphabet, 28 00:02:12,980 --> 00:02:17,810 a, b, c, d, e, f, g, h, i, chicken and be. 29 00:02:18,920 --> 00:02:28,620 You are a city of WXYZ in capital, then we are going to find the main matter and the stakes can be 30 00:02:28,620 --> 00:02:33,780 or you can basically create some message using the mind. 31 00:02:34,990 --> 00:02:42,240 The message is the hour, and here we are putting it in triple quotes or let's give your see, this 32 00:02:42,240 --> 00:02:46,620 is Biton hacking 33 00:02:48,930 --> 00:02:56,820 advanced level because you are learning. 34 00:02:57,880 --> 00:03:00,420 Let's give your Antal. 35 00:03:02,590 --> 00:03:03,880 So you're launching the. 36 00:03:06,100 --> 00:03:16,600 Beginning of Saiful program, let's close this, then we would also give your say my key is which is 37 00:03:16,600 --> 00:03:20,190 equal to let's give you a little kiss, a spy movie. 38 00:03:20,880 --> 00:03:23,640 Is this just any canticles you wish to give? 39 00:03:24,010 --> 00:03:26,400 Then we are giving you my Modesta. 40 00:03:26,410 --> 00:03:30,670 That's equal to currently and Krip is being said consented to decrypt. 41 00:03:30,670 --> 00:03:33,310 If we want to decrypt it then we check. 42 00:03:33,310 --> 00:03:42,670 If your are more SDR is equal to encrypt, then you will use all translated. 43 00:03:42,670 --> 00:03:44,410 S.G. all is equal to. 44 00:03:46,120 --> 00:03:57,040 See, let's see here encrypt message SDR and we pass Mikey Key hasta la comma. 45 00:03:57,190 --> 00:04:08,120 My message is then you check using is if your my mood SDR is equal to decrypt. 46 00:04:08,140 --> 00:04:14,050 If it is then you see translated a steal is equal to decrypt. 47 00:04:17,190 --> 00:04:29,640 Same message and again, here, be past my guest here and my message is, OK, then we are giving some 48 00:04:29,640 --> 00:04:38,830 brand statements here that is that give your influence and Eddie same message and then we pour into 49 00:04:38,830 --> 00:04:46,110 your thoughts and say, my mode SDR dot title. 50 00:04:47,040 --> 00:04:48,660 Then we print the. 51 00:04:50,290 --> 00:05:01,090 Translated Estie are healed after we print the translated as we use the Bible clip dorje copy and copy 52 00:05:01,090 --> 00:05:16,240 this translated Aschiana message print blank line and finally we princi the message has been copied 53 00:05:17,170 --> 00:05:19,950 to the clipboard. 54 00:05:21,670 --> 00:05:31,630 Now after this our definition for mean ends here and after this we are going to define the encrypt message 55 00:05:31,630 --> 00:05:36,830 as are with ATSDR and the same message dear. 56 00:05:37,210 --> 00:05:43,060 And in this we are just going to return another function that is translated. 57 00:05:44,580 --> 00:05:56,520 Message SDR, which is below Paskey SDR, then your message SDR and the text that is incorrect, similarly 58 00:05:56,520 --> 00:06:06,330 will to find another matter that is decrypt message Asgeir, which would again take the e-mail and the 59 00:06:06,330 --> 00:06:08,490 message, still same parameters. 60 00:06:08,820 --> 00:06:20,380 And again you'll be able to recall on the translated message are and passing that the gist of the messages. 61 00:06:20,770 --> 00:06:28,130 This time the text does dickert and then finally we will create to translate messages still function. 62 00:06:28,470 --> 00:06:32,630 Let us just save this file for before we actually create it. 63 00:06:32,670 --> 00:06:37,550 So let's go to our advanced level course and here we give it a name to save it. 64 00:06:37,890 --> 00:06:38,850 I see. 65 00:06:41,310 --> 00:06:54,990 It is G Virginia Saiful Demel, let's make C capital B, capital B by, so we are going to save this 66 00:06:55,470 --> 00:06:57,510 Ganassi for the Modot Beevor. 67 00:06:57,840 --> 00:07:03,090 Now the last thing that we are supposed to do is the main function to be created that is transmitted 68 00:07:03,090 --> 00:07:04,640 message isdell function. 69 00:07:05,070 --> 00:07:07,460 So we would create this in the next session. 70 00:07:07,770 --> 00:07:09,130 That's it from this session. 71 00:07:09,150 --> 00:07:10,140 Thank you very much.