8. Secret Messages 2: How to build the enemy encoder using the functions we have already built?

Опубликовано: 24 Декабрь 2025
на канале: WIBYTE
49
4

In this video, we build the enemy encoder using the functions we have created for converting the plaintext messages into ciphertext or secret messages. The enemy first creates a message (preamble plus secret code) and then sends it to a randomly chosen transposition and then a Caesar cipher of a randomly chosen shift value.

Other videos in the series Secret Messages 2 -
1. Introduction -    • 1. Secret Messages 2: Introduction to the ...  
2. How to build a Caesar Cipher? -    • 2. Secret Messages 2: How to build a Caesa...  
3. Why and how to use the modulo operator in the Caesar cipher? -    • 3. Secret Messages 2: Why and how to use t...  
4. Making Caesar cipher work for capital letters and numbers -    • 4. Secret Messages 2: Making Caesar cipher...  
5. How to decode a Caesar cipher? -    • 5. Secret Messages 2: How to decode a Caes...  
6. Our encryption technology goes into wrong hands! -    • 6. Secret Messages 2: Our encryption techn...  
7. How to generate random integers using random.randint() -    • 7. Secret Messages 2: How to generate rand...  
8. How to build the enemy encoder using the functions already built? -    • 8. Secret Messages 2: How to build the ene...  
9. Cracking the enemy code when the transposition is set to ‘No Change’ -    • 9. Secret Messages 2: Cracking the enemy c...  
10. Using break statement to prematurely end the for loop -    • 10. Secret Messages 2: Using break stateme...  
11. Cracking enemy code when the transposition encoder is set to even odd swap -    • 11. Secret Messages 1: Cracking enemy code...  
12. Cracking the enemy code even when the encoder is randomly chosen -    • 12. Secret Messages 2: Cracking the enemy ...  

www.wibyte.in