1 00:00:00,660 --> 00:00:08,460 Now, after this, we see the logic of was once we have devalued value there, so we go now for the 2 00:00:08,640 --> 00:00:17,050 check and final check is English not and English if we open up the file in notepad. 3 00:00:17,640 --> 00:00:20,840 We are having here is English chick. 4 00:00:20,970 --> 00:00:23,270 That's the metal that we want. 5 00:00:23,280 --> 00:00:25,590 So here we use is English metal. 6 00:00:26,040 --> 00:00:34,010 And in this we pass the value which is there from the cryptic text which we have got comma. 7 00:00:34,020 --> 00:00:41,860 We pass here the word percentage that's equal to Pasic 40. 8 00:00:42,390 --> 00:00:48,720 And in this effort, which means this particular line will check with the user to see if the decrypted 9 00:00:48,720 --> 00:00:49,900 E has been found. 10 00:00:50,400 --> 00:01:01,010 So here you print a blank line, the next you put in your C possible encryption break. 11 00:01:03,020 --> 00:01:18,480 Then bring to the value of key plus SDR Woodvale with that concatenated again, see single code holding 12 00:01:19,010 --> 00:01:27,440 single codes and the value of decrypted it that two hundred limited. 13 00:01:28,430 --> 00:01:34,580 Then again, let's bring the blank line and then we give your print saying we are giving the message 14 00:01:34,580 --> 00:01:37,230 to enter the four done. 15 00:01:37,800 --> 00:01:42,360 Or just press and. 16 00:01:45,560 --> 00:01:45,920 To 17 00:01:49,190 --> 00:01:58,280 continue and let's close this year and whatever the user type, they could be using this input. 18 00:02:02,040 --> 00:02:09,420 And then we check that if the response does not convert to Apple Dot. 19 00:02:10,890 --> 00:02:22,460 Starts with you, you hear the case when we say the only descriptive text. 20 00:02:23,340 --> 00:02:26,400 And finally, one, this is done. 21 00:02:26,820 --> 00:02:28,700 We end this and we check here. 22 00:02:28,740 --> 00:02:37,710 If name is equal to men, then all the men. 23 00:02:39,000 --> 00:02:45,300 Now, let us save this file in the same spot when we have done all your examples. 24 00:02:46,050 --> 00:02:56,630 So hacking advanced level and here will give, say, hacking, Virginia Saiful dot fever. 25 00:02:57,900 --> 00:03:03,530 And now if we know, first of all, we have not given anything to be hacked. 26 00:03:03,540 --> 00:03:09,550 So what we would give is first thing we will do is let us open the Virginia site for Demo Oleo. 27 00:03:10,080 --> 00:03:15,680 And if we run this module, this is what is the encrypted text. 28 00:03:15,690 --> 00:03:22,430 So now we will cooperate on the same thing over here and now we would run this module. 29 00:03:22,440 --> 00:03:23,520 So let's save it. 30 00:03:25,280 --> 00:03:26,770 One thing we made a mistake. 31 00:03:27,080 --> 00:03:39,380 We have never will a state and you're just not as smart as it is, not one in which we have it means. 32 00:03:40,010 --> 00:03:50,290 And the message also we would write down over your encrypted message format, 56 days X is NZ, E, 33 00:03:50,360 --> 00:04:08,810 C, C, X, and if you then say Cucu, sorry, missed one more in me and let's see it. 34 00:04:09,410 --> 00:04:12,110 Let us try to decrypt this particular vote. 35 00:04:12,860 --> 00:04:15,770 Now, if you're not satisfied with this, we continue. 36 00:04:16,340 --> 00:04:22,630 This is what we have doki astronomy and a particular textbook and using that. 37 00:04:23,000 --> 00:04:25,110 So now we press the. 38 00:04:25,370 --> 00:04:31,970 And so that is all we have basically hacked off can using a dictionary value. 39 00:04:32,780 --> 00:04:38,180 So now if you just need to understand, whenever you run the particular values, this are just some 40 00:04:38,180 --> 00:04:44,180 keywords that as we have done and if we press enter, we can get to go along with some more keywords 41 00:04:44,420 --> 00:04:48,980 if it is not able to find it, if we give you an error message that unable to hack. 42 00:04:49,640 --> 00:04:56,090 So now over here in this particular demo now, because the source code for this program is similar to 43 00:04:56,090 --> 00:05:01,610 the previous hacking program that we have done, now, we want to be going line by line examination 44 00:05:01,610 --> 00:05:05,600 because that is not required as already we have completed part of this in the earlier one. 45 00:05:06,370 --> 00:05:13,550 So just a function that we have created in this program is your dictionary function, which basically 46 00:05:13,550 --> 00:05:18,710 attempts to use each vote in your dictionary file to decrypt the ciphertext. 47 00:05:18,890 --> 00:05:24,370 And when the decrypted text looks like an English word, according to your English module, then it 48 00:05:24,380 --> 00:05:30,080 prints the decryption and it prompts the user to quit or do so over here. 49 00:05:30,080 --> 00:05:33,020 If you just look at it, we have used your words. 50 00:05:33,020 --> 00:05:35,740 One is equal to a four one dark red line. 51 00:05:35,750 --> 00:05:41,170 So we have used red line method over here on the file object written from open. 52 00:05:41,780 --> 00:05:48,830 Now, unlike the method which returns the full content of the file as a single string, the ridgelines 53 00:05:48,830 --> 00:05:54,020 method returns a list of strings with each string as a single line from the fight. 54 00:05:54,320 --> 00:06:00,200 So since that is one word in each line of the dictionary, the word variable contains a list of every 55 00:06:00,200 --> 00:06:00,920 English word. 56 00:06:01,640 --> 00:06:07,310 The rest of the program that we have over here is similar to your transposition cipher hacking one which 57 00:06:07,310 --> 00:06:07,880 we have done. 58 00:06:08,300 --> 00:06:12,050 So this requires absolutely no values. 59 00:06:16,380 --> 00:06:23,010 It doesn't require a special understanding of the program as it is already done, all of you, to know 60 00:06:23,010 --> 00:06:28,080 that we have written a program that checks your weakness for using a dictionary attack. 61 00:06:28,380 --> 00:06:34,170 Now, let us look at how to have the beginning of Saiful, even when the key is a random group of letters 62 00:06:34,440 --> 00:06:37,680 rather than some dictionary word in the particular case. 63 00:06:38,340 --> 00:06:45,650 Now for that we will understand the concept of using the ASCII examination to find the snip. 64 00:06:46,080 --> 00:06:51,630 Now, because ASCII examination is a process that we can use to determine the length of the original 65 00:06:51,630 --> 00:06:54,440 key, which is used to encrypt the ciphertext. 66 00:06:54,660 --> 00:06:58,380 And we can then use the frequency analysis to break each of this up. 67 00:06:58,380 --> 00:07:05,430 These independent Charly's Bobridge was the first person to have broken the beginning cipher using this 68 00:07:05,430 --> 00:07:08,140 process, but he never published his results. 69 00:07:08,460 --> 00:07:15,510 Now his mother was later published by our friend Reg Pisarski at an early 20th century mathematician 70 00:07:15,510 --> 00:07:17,930 who became the namesake of the metal. 71 00:07:18,180 --> 00:07:21,840 So now let us look at the steps involved in the examination. 72 00:07:22,290 --> 00:07:26,050 First is, you need to find the repeated sequences. 73 00:07:26,580 --> 00:07:29,730 Now, let us understand this more in detail in the next edition. 74 00:07:30,060 --> 00:07:31,200 That's it from the session. 75 00:07:31,230 --> 00:07:32,100 Thank you very much.