Shift Cipher (Introductory Cryptography)

Published on ● Video Link: https://www.youtube.com/watch?v=7pFTTz_R0ZU



Duration: 39:38
18 views
2


In today's lecture we learn our first cryptosystem/cipher, the shift cipher! We apply some of the main terms we seen last time, learn how to carry out the shift cipher on plaintext and back from ciphertext, and more! Next time we will see more examples such as in the setting of the Caesar Cipher, and its cryptanalysis.

Time Stamps:
0:00 Recap
0:25 Shift Cipher, definition and the process
13:11 Example of encrypting message
24:50 Example of decrypting a message, some notes about modular arithmetic
39:17 Closing

Have a beautiful day!

Supporters (to date of publication, by tier (top to bottom)):
----------------------------------------------------------
Patreon Supporters (General Support):
Draikou
Patreon Supporters (Basic Support):
Eric R
Patreon Supporters (Supporter Access!):

-----------------------------------------------------------
Become a supporter today! To support my work and mission to provide free or accessible Computer Science education (especially in theory), subscribe to the channel, share my videos. Please donate and contribute to support my work for more content:
PATREON: https://www.patreon.com/PageWizard
SUBSCRIBESTAR: https://www.subscribestar.com/drpage
PAYPAL: https://paypal.me/pagewizard

Follow also at:
FACEBOOK: https://www.facebook.com/DanielRPage
TWITTER: https://twitter.com/PageWizardGLE
QUORA: https://www.quora.com/profile/Daniel-R-Page
TWITCH: https://www.twitch.tv/pagewizard

#ComputerScience
#cryptography
#cipher




Other Videos By PageWizard Games, Learning & Entertainment


2023-04-26Non-Regular Language with Equal Sums and More! (Theory of Computing)
2023-04-24Language with More 0s Before Less 1s is not Regular (Theory of Computing)
2023-04-21Dan Plays Chrono Trigger (April 20, 2023)
2023-04-21Language of Palindromic Strings is not Regular (Theory of Computing)
2023-04-19Language with Prime-Length Strings is not Regular [using Pumping Lemma] (Theory of Computing)
2023-04-19It's Poppin' Time!
2023-04-19Pushdown Automata
2023-04-17Tips on Using the Pumping Lemma to Prove Languages are Not Regular (Theory of Computing)
2023-04-14Caesar Cipher, Shift Cipher Cryptanalysis (Introductory Cryptography)
2023-04-14Dan Plays Chrono Trigger (April 13, 2023)
2023-04-12Shift Cipher (Introductory Cryptography)
2023-04-11Context-Free Grammars and Languages II
2023-04-10Cryptography: Basic Terminology, Communication Channel (Introductory Cryptography)
2023-04-07Application of the Pumping Lemma: Not All Languages are Regular (Theory of Computation)
2023-04-05The Pumping Lemma for Regular Languages [FULL PROOF] (Theory of Computing)
2023-04-03Pumping Lemma for Regular Languages: A Gentle Introduction (Theory of Computing)
2023-04-01Dan Plays Chrono Trigger (March 31, 2023 - Part 2)
2023-04-01Dan Plays Chrono Trigger (March 31, 2023 - Part 1)
2023-03-31Algebraic Laws of Regular Expressions and More! (Theory of Computing)
2023-03-29Applying Kleene's DFA to Regex Construction (Theory of Computing)
2023-03-28Exploring Properties of Regular Languages



Tags:
Computer Science
Algorithms
Data Structures
Education
CompSci
CS
PageWizard
Mathematics
Accessibility
University
COMPSCI
COMP
CSCI
Western
Manitoba
StFX
Regina
caesar cipher
shift cipher
offset cipher
clear text
cipher
decrypt
encrypt
basic cipher
crypto