The Bazeries Cipher Explained – A Classical Cipher Based on Substitution and Transposition
#cryptology, #cryptography, #cryptanalysis
The Bazeries cipher is a classical cipher and was invented by Étienne Bazeries. It is based on substitution and transposition. In this video, we briefly explain the background of the cipher, how you can encrypt and decrypt text using the cipher and its keyspace size as well as its unicity distance. Finally, we use CrypTool 2 to actually use the cipher.
A small article on my blog about the cipher: https://www.kopaldev.de/2023/01/28/the-bazeries-cipher-explained-a-classical-cipher-based-on-substitution-and-transposition/
If you are interested in learning the fundaments of cryptology, let me invite you to have a look at our video series about the basics of cryptology, also for beginners: https://youtu.be/jbumW7Ym03o
You can download the latest version of CrypTool 2 from here: https://www.cryptool.org/en/ct2/downloads
Visit my blog: https://www.kopaldev.de
Join Discord server: https://discord.gg/8JeTZd8EpT
Видео The Bazeries Cipher Explained – A Classical Cipher Based on Substitution and Transposition канала Cryptography for Everybody
The Bazeries cipher is a classical cipher and was invented by Étienne Bazeries. It is based on substitution and transposition. In this video, we briefly explain the background of the cipher, how you can encrypt and decrypt text using the cipher and its keyspace size as well as its unicity distance. Finally, we use CrypTool 2 to actually use the cipher.
A small article on my blog about the cipher: https://www.kopaldev.de/2023/01/28/the-bazeries-cipher-explained-a-classical-cipher-based-on-substitution-and-transposition/
If you are interested in learning the fundaments of cryptology, let me invite you to have a look at our video series about the basics of cryptology, also for beginners: https://youtu.be/jbumW7Ym03o
You can download the latest version of CrypTool 2 from here: https://www.cryptool.org/en/ct2/downloads
Visit my blog: https://www.kopaldev.de
Join Discord server: https://discord.gg/8JeTZd8EpT
Видео The Bazeries Cipher Explained – A Classical Cipher Based on Substitution and Transposition канала Cryptography for Everybody
Показать
Комментарии отсутствуют
Информация о видео
27 января 2023 г. 17:54:20
00:13:21
Другие видео канала
![Zodiac Killer Ciphers – Let's have a Look at Unicity Distances With Excel](https://i.ytimg.com/vi/OXMalTqLLNw/default.jpg)
![10 - Automatic Translation of CrypTool 2 To a New Language](https://i.ytimg.com/vi/10bX5N6epQI/default.jpg)
![04 - Internationalization of the Component (CrypTool 2 Development Series)](https://i.ytimg.com/vi/j1fQh5mkaa0/default.jpg)
![My Cryptologic Highlights of 2020](https://i.ytimg.com/vi/RqDoUxn0iSg/default.jpg)
![Crypto Challenge Contest – Video 1](https://i.ytimg.com/vi/CnkCFSrEr_4/default.jpg)
![Basics of Cryptology – Part 2 (Cryptanalysis – Terminology & Classical Ciphers)](https://i.ytimg.com/vi/X9ujhcmGgqk/default.jpg)
![Enigma Machine – Part 1 of 2 – How does it work?](https://i.ytimg.com/vi/FG59my_HLtI/default.jpg)
![Basics of Cryptology – Part 20 (Cryptanalysis – Cost & Fitness Functions - Language Models)](https://i.ytimg.com/vi/19_6qWYPo8I/default.jpg)
![Digital File Signatures – How Do They Protect Your Computer?](https://i.ytimg.com/vi/lvPfXie_K-Q/default.jpg)
![What is New in the CrypTool 2 Release 2020.1?](https://i.ytimg.com/vi/lap3dBtG0TU/default.jpg)
![Basics of Cryptology – Part 22 (Cryptography – Kerckhoffs' Principle & Modern Cryptographic Goals)](https://i.ytimg.com/vi/2A1tZIg6Cts/default.jpg)
![Let's Decipher a Letter of the Silent Film Star Mary Miles Minter That Lead to a Scandal](https://i.ytimg.com/vi/P0katKMm_mg/default.jpg)
![Basics of Cryptology – Part 9 (Modern Cryptography – Block Ciphers – Feistel Ciphers & SDES)](https://i.ytimg.com/vi/wVm7mANbdgw/default.jpg)
![The Straddling Checkerboard Cipher Explained](https://i.ytimg.com/vi/q8CByEr2VwE/default.jpg)
![Let's Decipher Two Encrypted English Postcards – Secret Messages From the Past Revealed](https://i.ytimg.com/vi/SfH9Rs-phP0/default.jpg)
![Let's Break My Self-Made Cryptographic Challenges From HistoCrypt 2019](https://i.ytimg.com/vi/PArQj_nVCGs/default.jpg)
![Basics of Cryptology – Part 23 (Cryptography – Modern Hybrid Encryption)](https://i.ytimg.com/vi/V28o6Rsh9JU/default.jpg)
![Break an Encrypted Letter of a Child Killer](https://i.ytimg.com/vi/J8tiCt7tAYo/default.jpg)
![Basics of Cryptology – Part 17 (Cryptography/Cryptanalysis – Keyspace and Keyspace Size)](https://i.ytimg.com/vi/1CKillJcNzI/default.jpg)
![An Encrypted Description of a Secret Magic Machine in an 18th Century Alchemy Book](https://i.ytimg.com/vi/IDT6yUd68G8/default.jpg)
![Let's Program a Hash Preimage Searcher to Break Passwords](https://i.ytimg.com/vi/MQc5j7tJSBI/default.jpg)