In this video, we build the enemy encoder using the functions we have created for converting the plaintext messages into ciphertext or secret messages. The enemy first creates a message (preamble plus secret code) and then sends it to a randomly chosen transposition and then a Caesar cipher of a randomly chosen shift value.
Other videos in the series Secret Messages 2 -
1. Introduction - • 1. Secret Messages 2: Introduction to the ...
2. How to build a Caesar Cipher? - • 2. Secret Messages 2: How to build a Caesa...
3. Why and how to use the modulo operator in the Caesar cipher? - • 3. Secret Messages 2: Why and how to use t...
4. Making Caesar cipher work for capital letters and numbers - • 4. Secret Messages 2: Making Caesar cipher...
5. How to decode a Caesar cipher? - • 5. Secret Messages 2: How to decode a Caes...
6. Our encryption technology goes into wrong hands! - • 6. Secret Messages 2: Our encryption techn...
7. How to generate random integers using random.randint() - • 7. Secret Messages 2: How to generate rand...
8. How to build the enemy encoder using the functions already built? - • 8. Secret Messages 2: How to build the ene...
9. Cracking the enemy code when the transposition is set to ‘No Change’ - • 9. Secret Messages 2: Cracking the enemy c...
10. Using break statement to prematurely end the for loop - • 10. Secret Messages 2: Using break stateme...
11. Cracking enemy code when the transposition encoder is set to even odd swap - • 11. Secret Messages 1: Cracking enemy code...
12. Cracking the enemy code even when the encoder is randomly chosen - • 12. Secret Messages 2: Cracking the enemy ...
www.wibyte.in