1 00:00:00,180 --> 00:00:06,870 So now let's talk about this transpositions was I did not mention the definition in the terminology, 2 00:00:07,290 --> 00:00:11,010 so I now I'm going to explain this this translation. 3 00:00:11,010 --> 00:00:14,970 So I the position operational plaintext characters. 4 00:00:16,450 --> 00:00:23,110 So in substitution, so first we are substituted the Predix characters by some other characters, but 5 00:00:23,110 --> 00:00:29,770 in this we are not going to substitute a new characters, but we will change the position of those characters. 6 00:00:30,550 --> 00:00:36,500 So and it is easy to do because it's simply rearrangement of these characters. 7 00:00:36,760 --> 00:00:39,580 So let's see some examples of this. 8 00:00:39,740 --> 00:00:42,280 So which comes under translucence. 9 00:00:42,280 --> 00:00:45,310 I was the first one is called transposition cipher. 10 00:00:45,610 --> 00:00:50,510 And in this we will construct a metrics with number of columns equal to kids. 11 00:00:50,560 --> 00:00:56,500 Keyzer And so we will take a plaintext and we will take also a key Tochigi. 12 00:00:56,830 --> 00:01:05,640 So this key is a half of it consists of half of it and then write the plain text in that matrix. 13 00:01:05,680 --> 00:01:10,390 So after building the multitude number of columns said the current is four. 14 00:01:10,600 --> 00:01:12,790 Then we will create a four ColorMatrix. 15 00:01:12,790 --> 00:01:15,530 That depends on the plaintext. 16 00:01:15,820 --> 00:01:24,040 And we write in those columns laneways, the plaintext and the ciphertext from writing columns according 17 00:01:24,040 --> 00:01:25,600 to the alphabetical order of the key. 18 00:01:26,140 --> 00:01:34,540 So the key contents ABC then the first column under it is written first and the next alphabetical order 19 00:01:34,690 --> 00:01:38,110 of the column is conter, and that is the column is written next. 20 00:01:38,710 --> 00:01:40,700 So I think this will not make sense. 21 00:01:40,750 --> 00:01:42,170 I will explain with an example. 22 00:01:42,460 --> 00:01:45,340 So we we have this plaintext. 23 00:01:45,370 --> 00:01:48,460 Meet me at midnight and the keys fancy. 24 00:01:49,060 --> 00:01:56,200 So what we're going to do is we are going to create a matrix are the simple rules and columns with fancy 25 00:01:56,200 --> 00:02:05,080 Ozeki like you create a fancy at the top and the length of the keys we create the econometrics, the 26 00:02:05,080 --> 00:02:05,440 rules. 27 00:02:05,440 --> 00:02:06,190 We do not know. 28 00:02:06,190 --> 00:02:09,080 We just keep on reading in this in that matrix. 29 00:02:10,510 --> 00:02:12,160 So this is the Matrix. 30 00:02:12,310 --> 00:02:20,500 First, I have written the fancy, very fancy and I also given the order of these keys, alphabetical 31 00:02:20,500 --> 00:02:27,880 order in the fancy way we get the first and the second and they have and then end in and then rushed 32 00:02:27,880 --> 00:02:28,150 way. 33 00:02:28,510 --> 00:02:30,280 So we I have given the numbers. 34 00:02:30,280 --> 00:02:31,390 One, two, three, four. 35 00:02:32,080 --> 00:02:35,500 Now what I'm going to do in this matrix, I'm going to read the plain text. 36 00:02:35,680 --> 00:02:36,640 So the index is. 37 00:02:38,850 --> 00:02:44,520 And I'm going to meet him and after that, I cannot write further because there are only four columns 38 00:02:44,520 --> 00:02:45,710 I need to read in the next. 39 00:02:46,290 --> 00:02:51,000 Meet me at next, but not so in that I can I help write the plain text. 40 00:02:51,720 --> 00:02:57,210 And what I'm going to do is I want to write the columns elements, only the column elements. 41 00:02:57,570 --> 00:03:00,660 So the first column elements are easier to write. 42 00:03:00,660 --> 00:03:02,220 This is are considered as first. 43 00:03:03,150 --> 00:03:08,050 The alphabetical order is of use one and it comes four straight. 44 00:03:08,340 --> 00:03:18,060 That's what we do to write these columns, alphabets, p, e, etc. That is for some part of the ciphertext. 45 00:03:18,240 --> 00:03:20,280 And we need to consider the second column. 46 00:03:20,280 --> 00:03:24,510 That is this one P and Nightwatch, this one. 47 00:03:24,630 --> 00:03:28,860 And we have to write all these alphabets in the column in the laneways. 48 00:03:29,700 --> 00:03:38,820 And and if we can, the next one, it goes by three young Megson and the four EPMD and unmuted. 49 00:03:39,210 --> 00:03:40,270 And we did so. 50 00:03:40,800 --> 00:03:49,220 So in this way we have we can save Egen and the plaintext in this ciphertext using this current transportation 51 00:03:49,230 --> 00:03:50,700 so far in this case. 52 00:03:52,360 --> 00:04:00,700 We do not substitute any new value into this, we just arranged the order of this pretextual use rate, 53 00:04:01,210 --> 00:04:05,400 we hold the key and we have constructed a matrix of different. 54 00:04:06,730 --> 00:04:14,460 Of the column of the column length of this that is free and then we hold it in the prediction that matters 55 00:04:14,470 --> 00:04:18,130 and what we have done is we do not write or the. 56 00:04:19,770 --> 00:04:25,680 All right, right past the metrics, but we have created a new rose, but the column should maintain 57 00:04:25,680 --> 00:04:27,590 the length of the key, that is five columns. 58 00:04:27,600 --> 00:04:34,290 We can read any number of rows and then we will return the ciphertext as the first column and the second, 59 00:04:34,560 --> 00:04:35,620 third, fourth and fifth. 60 00:04:35,970 --> 00:04:38,940 So this is the simple column, transportation metrics. 61 00:04:39,960 --> 00:04:42,510 You can also do the retransmission metrics. 62 00:04:42,840 --> 00:04:48,390 All you have to do is you have to write the fancy as a rose and then in the current index. 63 00:04:48,780 --> 00:04:51,570 So that is the reverse of this current transmission metrics. 64 00:04:52,500 --> 00:04:58,340 So this one is the example of the transposition ciphers and the next one is relevant. 65 00:04:58,380 --> 00:05:04,280 So I'm not going to add some texture because I'm so tired in making these people is OK. 66 00:05:05,100 --> 00:05:07,250 So I'm going to explain one image. 67 00:05:07,380 --> 00:05:10,040 The plain text is this is a secret message. 68 00:05:10,050 --> 00:05:11,520 So this is some text. 69 00:05:11,640 --> 00:05:17,060 I want to send it to receiver and this is relevant encoding key. 70 00:05:17,430 --> 00:05:19,080 OK, key is the number. 71 00:05:20,030 --> 00:05:26,310 And therefore, we need to create four roles and we need to write this message as it a. 72 00:05:28,010 --> 00:05:33,290 If you control this message, the secret message you can see here is written in the first row, first 73 00:05:33,290 --> 00:05:36,290 column, and it has written down in the second row. 74 00:05:36,290 --> 00:05:43,100 And I in that address, in the photo and then we did not read, I hear. 75 00:05:43,100 --> 00:05:48,560 But we have written here like to go like this with like Montaigne's. 76 00:05:49,750 --> 00:05:54,010 Like ups and downs, ups and downs, but you're not you do not break this line, right? 77 00:05:54,820 --> 00:06:01,470 So this is how you rate this is a secret message and then it ends here. 78 00:06:01,510 --> 00:06:03,130 Now, what we're going to do is ciphertext. 79 00:06:03,430 --> 00:06:14,950 You write every element in the room, so you have to be ready yet PJI and it just as e e so that will 80 00:06:14,950 --> 00:06:16,000 be our message. 81 00:06:16,000 --> 00:06:17,310 Cipher text message. 82 00:06:18,010 --> 00:06:28,060 You can see the here and Jesus Yomi here and then ia e r e s IRS and then see us. 83 00:06:29,840 --> 00:06:34,020 So that's how you you create a site for dictionaries and so forth. 84 00:06:34,610 --> 00:06:37,140 So I will explain it again for McClarty first. 85 00:06:37,220 --> 00:06:37,500 Right. 86 00:06:37,520 --> 00:06:43,460 The plain text and then according to the key, create those many rules and what we want to lose from 87 00:06:43,610 --> 00:06:43,960 staff. 88 00:06:44,210 --> 00:06:46,300 You need to read the exact pattern. 89 00:06:46,820 --> 00:06:47,680 So like this. 90 00:06:47,690 --> 00:06:50,670 Down, up, down, up, down, up and down. 91 00:06:51,350 --> 00:06:54,290 So you need to maintain this zigzag pattern. 92 00:06:54,320 --> 00:06:56,250 You should not break this pattern. 93 00:06:56,510 --> 00:06:57,380 You should not read. 94 00:06:57,380 --> 00:07:00,350 I hear you should write according to this chain. 95 00:07:01,640 --> 00:07:06,530 And after you heard it and you need to consider the rules, the elements are the rules for and the second, 96 00:07:06,770 --> 00:07:12,710 third and fourth rule, if you combine all those rules where you get the same protection. 97 00:07:13,460 --> 00:07:20,570 So these two are the other one come these two comes under the transposition ciphers. 98 00:07:20,690 --> 00:07:27,760 And I have showed you how transposition ciphers works and they just rearrange just the plain text that 99 00:07:27,770 --> 00:07:29,660 does not introduce any new character.