I can't believe myself!! You just tought me a NEW unique language in just 19 minutes video. Love your knowledge and the simplest way you explained it. Just WOW.... Please accept my gratitude... God bless you sir 🙌 👍
Omg thanks for this explanation! I'm following a course at university and they recommended us a book to read wich explains the Playfair Cipher in the most horrible unclear way... This is so much clearer! I'm putting this video in my bookmarks! Thanks again
@@humairasher2000 I believe in this case you'd want to replace the second occurance of a repeated letter with a sort of placeholder, such as X or Z, that way all pairs of letters are unique
They mentioned the play fair cipher in National Treasure 2, so I was curious what it was and so I came to this video. Really good job! I loved how detailed you were with it. I will definitely be using this to send secret messages to my friends.
I was trying to play the game cryptogram but I didn't understand how to play it so came on yt for help but instead of writing cryptogram I wrote cryptography and found myself here and I have apparently learned how to code and decode playfair cipher now... Boy the way you were able to explain to someone who knew nothing about it and yet they managed to learn. You got a special talent! You were funny too so it wasn't even boring 💜👏🤗
Wow thanks for this.. some people did videos on this yet unable to explain or demonstrate. You are a good teacher. i understood it flawlessly. i would be glad if you can upload RSA, DIFFE HELLMAN, HMAC, DES, AES AND TRIPLE DES algorithms. then i know for sure i have passed my exams. Thanks once again you are a life saver. already subscribed!
He is super calm 😂❤ That's help the understanding process in the brain meats 😂❤ This will help me pass my exam tomorrow, god bless you so very much teacher ❤
This was an incredible and thorough explanation - thank you! I feel like I could now teach others about this cipher based solely on your explanation. Great job!
@@Metrious yeah but you could just not write down the repeated letters when making the grid. So if the word has for example two A’s you could just write the word the way it is but leave out the second a
@@billjoe5991 Whereas you are correct it is easier to remember with no repeated letters. Otherwise you have to remember how you spelled it without the repeated letters. Other than that you are perfectly correct.
This is a phenomenal video, as are your 2 paper Enigma videos. However, I want to mention a couple things when using the Playfair cipher. First when keying the Playfair cipher, you really should use an RNG to scramble the 5x5 grid. The threat model is an adversary that knows you're just using key words to key the Playfair cipher, and as such, writes a computer program to brute force search 5x5 grids based on simple key words. However there are 25 unique letters in Playfair, which means there are 25! (25 factorial) possible grids. In terms of computer security, this is about 83.68 bits of security (2^83.68 ~= 25!). 83 bits is robust enough to prevent an adversary from doing a successful brute force search. Second, no two messages should ever be encrypted with the same 5x5 grid. As a mathematician, you should be able to appreciate the mathematics behind using two ciphertexts encrypted with the same symmetric key, do determine the key itself, and as such, decrypt future ciphertexts. Every Playfair key should be ephemeral. This is why code books handed out in WWI and WWII. Field agents would encrypt the message with a key out of the code book, then destroy the key. This isn't unique to one-time pads either. It's the case in modern cryptography with AES, was the case with the German Enigma, and should be the case with any symmetric cipher design. A code book for a 5x5 Playfair grid could look something like: 1. BIUXZGOHERAWLYPDVQTMCKNSF 2. YDISTKQPUXZFCRHVGLOEBMWNA 3. ZAQCVTYOWBEHMDISRPKUXFLNG 4. GSEFXVQTHLPWKUMRYDNZIBACO 5. CEPGIRKLAZXFQBOSWDTYNUHVM 6. BWKSHOTZNYIMRGUCEDFLPQAXV 7. XWBFGTRMUDKCLOEVQASYHPNIZ 8. KYZCLETDXBOVWGAIHFURQSPMN 9. SFMLTKONVCPYXIBWHZEAQUDRG 10. FXNWMOEPDVBQCGSLYHTKAURIZ Two field agents would have identical code books. The person encrypting the message would use key 1, then destroy the key. Next time they wish to encrypt a message, they would use key 2, then destroy that key, etc. Write the grid out left-to-right, five characters at a time, and you have your Playfair grid.
Everyone’s saying what a great video (totally true) but I’m over here just watching him write with that nice hand writhing. It looks like a typing font
Check out Martin Gardner's book "Codes, Ciphers, And Secret Writing" for his version of the Playfair Cipher, which does use a grid of randomly placed letters and digits!
Wait how do you know when to move left or right in a row? For example: Earlier you said within a row, to the right of the letter your interested in At 3:13 HK. You move to the right with H and K wraps around to F. But then at 12:56 OP, you move to the left to get NO. Why don't you wrap around to the right that time to make it PL? As I am looking at the rest of the comments, it seems that everyone else understands it, so maybe I missed something in the video. Do you think you or someone else could clarify for me?
I love ciphers and codes, but I have no use for them... non of my friends are into them... can someone suggest a use? I want to use them for fun, but where do I start?
Greetings sad milk, Don't think of it as going clockwise or counter-clockwise. When two letters appear on the corners of a box, encode them with the letters opposite the corners horizontally. Always move horizontally either left or right. Does that make sense? Kevin
Sometimes you go clockwise and other times you go counterclockwise when doing boxes (is it simply back and forth between the two every time you come across it?).
Greetings Lisa, I don't see why not. Because the Turkish alphabet contains 29 letters, I would suggest using a 7 x 4 grid and leaving off a little-used letter as I did here in choosing to leave off J.
What if i add 4 imaginary meaningless character or numbers and make it 6x6, to solve the missing character problem.. I think it should work! 🤔 what do you think?
Thank you so much! I was able to decrypt the code from the beginning of National Treasure: Book of Secrets just for fun. Also, I've heard of people having the letter 'J' occupy the same square as 'I' instead of fully omitting it , do you think that's acceptable?
You're quite welcome. I'm delighted you found it useful. Certainly you could do that, but I don't think you will find it unnecessary. No one would mistake ionathan, ianuary, or iuniper for anything other than Jonathan, January, of Juniper
Thank you D. S. Personally, I use an i. No one would mistake ianuary, iury, or iaguar for anything but January, jury, or jaguar. But of course, you can use an X or any agreed upon letter. Another option would be to instead omit the letter Q, and use kw whenever it is needed as in kwick, kwit, or kwiet.
Hi kevin. I just want to share what i was thought in school, with regard to your "balloon" example.. From what i was thought, repeated letters should be placed with a null (X) in the middle. So balloon should be : ba lx lo on? just sharing... Thanks
You are quite right, Annaliza. Some people do as I have shown, others break apart all double letters as you were taught, and still others break only double letters that appear as a pair. Thank you for your comment.
@@videosbykevin2938 Potentially similar question, but what is to safeguard from palindrome words? Like noon, boob, etc. Say it was the word 'noon'. Could you put an x after the first n then do the double letter together then do the final N with the 5th letter and continue like that? I have my own workaround but I want to get the right system down first
Hello good sir, I was wondering if I got this correct, I was doing the thing you did with lizard but instead used the word zodiac and removed the letter k, and for the balloon I used Y an example being LY OY NY. So what I got for doing that was GO NW AV MX I was wondering if I was correct on this or do I need to do it again
Good day Sansaboy, It looks like you've got a good handle on it, but if I understood your description right, I get GO NW AV TA. The last two letters, NY, are both in the fifth vertical column, so encode them using the letters directly below them. N goes to T and Y wraps around to the top to become A. Hope that helps. Do let me know if I have misunderstood your question in any way. Thank you for watching, Kevin
What if the letter I skipped occurs in my text? Suppose that I was using the second grid you explained with and I want to encrypt January. So what will be the substitution for J? We don't have J in the grid. So what shall we replace it with? Or shall we just leave it as J?
Greetings Geeth, Typically one would use i; no one would mistake ianuary for anything other than January. Also, presumably the receiver of your coded message would be aware of the particular limitation with the letter J and decode accordingly. I might also recommend skipping Q and encode qu as kw if needed: kwit, kwiet, kwalify, etc. Thank you for watching, Kevin
Hello Aly, Technically, no. It is understood that we always work horizontally in boxes, so M would map to O and Y would map to W, and when deciphering, O would map back to M and W back to Y. That being said, of course you and your fellow code writers could agree beforehand that you will work vertically in boxes, but the Playfair code as designed works horizontally.
Pretty sure this is a bit wrong but it just may be another version of the playfair cipher, however the way i learned is that you divide balloon into ba lx lo on not replacing letters just adding an x
Greetings Blink, Typically one would use i; no one would mistake ianuary for anything other than January. Also, presumably the receiver of your coded message would be aware of the particular limitation with the letter J and decode accordingly. One could also skip Q instead and encode qu as kw if needed: kwit, kwiet, kwalify, etc. Thank you for watching, Kevin
Great video and well explained. Thanks a lot ! However, as you deliberately left out the “J”, I would like to know how I would send a “J” if I wanted to send a coded word like “ JUST “ or “ JUMP “ etc. I hope you will reply. Thanks again.
Greetings JustMe, Typically one would substitute I for J when needed. Few people would confuse IUST, IUMP, or IANuARY for anything but JUST, JUMP, or JANUARY. However, as long as you and your recipient agree beforehand, you can leave out any letter you wish. I chose J because that's what the original crafter of the cipher did and because it has an easy substitution in the letter I. Thank you for you kind praise, Kevin
@@videosbykevin2938 thanks for your answer and taking time to reply. it's really a good way to keep private information for oneself, like passwords or bank details. thanks again.
Greetings Kaivan, Typically one does not include spaces in the encrypted message in order to make any attempts at unauthorized decryption more difficult. However, if you needed a space, you and the recipient would agree beforehand on a letter, usually X, to represent a space.
Good day Ivan, There are many fine books on ciphers, but for the most in depth understanding, I would recommend you find a math textbook on Number Theory. It will be quite math-heavy and contain gads of information on many other topics, but the chapters on ciphers will be quite detailed with plenty of examples on both encoding and decoding. Thank you for watching, Kevin
This is awesome. I've watched many videos but this is so well explained.... I think I finally got it. But... I may be daft... In the example HK, move to the right becomes IF. And in the reply of the spy NP, move to the left becomes MO and not OL. What did I miss? I'm sorry for asking. Can anybody explain it to me? 😟 Thank you!
Greetings Natalie, Your reasoning is spot on. As you say, HK becomes IF because we move to the right when encoding, but when the spy sends a response we decode the message by moving to the left, so NP becomes MO. If we were encoding NP instead of decoding, it would be encoded as OL because we move to the right. Do please let me know if that clears up any confusion. Thank you for your kind praise. Kevin
Greetings Indra, Because the grid can only hold 25 letters, a letter has to be sacrificed. You can choose any letter you like, but I choose to omit J and replace it in any messages with the letter I. No one would confuse Ianuary, Ioseph or iungle for anything but January, Joseph, and jungle. I discuss the need for skipping a letter in the video here: th-cam.com/video/-KjFbTK1IIw/w-d-xo.html Thanks for watching, Kevin
Ah ok. Ardent Alien Power Lizard Mourn Planet Viper Range Laser Laso Idaho Its like one of those super special passphrase chains that are generated for you when something is super encrypted.
Greetings Rohith and xLady, Typically one would use i; for example, no one would mistake ianuary for anything other than January. Also, presumably the receiver of your coded message would be aware of the particular limitation with the letter J and decode accordingly. If J is especially dear to you, you might instead skip Q and encode qu as kw if needed: kwit, kwiet, kwalify, etc. Kevin
For the person decoding it would have a very hard time.... Im talking about the person the message is ment for.... If they dont know what letter to use The letter next to it or under it or a big box or a square? I DONT GET IT?
Depends on the pair. If the two letters create a box or if they are on the same line. If they are on the same line vertically or horizontally then they use the one next to it (horizontally) or under it (vertically) But if they are diagonal (like not on the same line at all) then it’s a square and you go to the opposite side. It’s explained well at the beginning try rewatching it you may understand it if you rewatch it
First I thought 20 min, that's long. I ended up enjoying every second of it. Thank you!
Not my first video to try to understand this, but my last - awesome explanation! thank you!
I can't believe myself!!
You just tought me a NEW unique language in just 19 minutes video.
Love your knowledge and the simplest way you explained it. Just WOW.... Please accept my gratitude...
God bless you sir 🙌 👍
Omg thanks for this explanation! I'm following a course at university and they recommended us a book to read wich explains the Playfair Cipher in the most horrible unclear way... This is so much clearer! I'm putting this video in my bookmarks! Thanks again
You are very welcome, Mathieu. I'm glad I could help.
lol i'm reading the same book. It uses complicated equations that make it so much more difficult to understand
what carrer
🏅 First time I've ever commented on a video. This is THE best explanation video hands down. Thank you!
Thank you, Emma. I am genuinely honored.
@@videosbykevin2938 sir how to decrypt a message if pair is identical (consist of same letter)
@@humairasher2000 I believe in this case you'd want to replace the second occurance of a repeated letter with a sort of placeholder, such as X or Z, that way all pairs of letters are unique
@@thehaigu321 thanks
@@humairasher2000 no prob mate
I feel smart now.
Literally saved me soo much time, I’ve wrote a whole assignment using the information provided and made my own examples whilst following yours!
They mentioned the play fair cipher in National Treasure 2, so I was curious what it was and so I came to this video. Really good job! I loved how detailed you were with it. I will definitely be using this to send secret messages to my friends.
I was trying to play the game cryptogram but I didn't understand how to play it so came on yt for help but instead of writing cryptogram I wrote cryptography and found myself here and I have apparently learned how to code and decode playfair cipher now... Boy the way you were able to explain to someone who knew nothing about it and yet they managed to learn. You got a special talent! You were funny too so it wasn't even boring 💜👏🤗
Wow thanks for this.. some people did videos on this yet unable to explain or demonstrate. You are a good teacher. i understood it flawlessly. i would be glad if you can upload RSA, DIFFE HELLMAN, HMAC, DES, AES AND TRIPLE DES algorithms. then i know for sure i have passed my exams. Thanks once again you are a life saver. already subscribed!
You know a triple des video would be like 8 hours long to explain
Kevin: MEETMEATNOON = Meet me at noon
me: meet meat noon
ZTAso Lol, so relatable
Hehe, Food lovers ❤️
I got MEET MEAT NO ON
😂
Same
No Kevin it is meat me at noon, not meet. lol
He is super calm 😂❤
That's help the understanding process in the brain meats 😂❤
This will help me pass my exam tomorrow, god bless you so very much teacher ❤
What do you study
@@anooshfatima3001
Computer science
Are u done
finally! someone on youtube that knows how to explain stuff ! thanks
This was an incredible and thorough explanation - thank you! I feel like I could now teach others about this cipher based solely on your explanation. Great job!
Brilliantly explained, well done. Just watched National Treasure 2 for the umteanth time and understood the code!!
Who is here watching just for fun and not for school or anything?
Yane Lane yeah just finished watching National treasure 😂
I’m trying to figure out a clue in a book I’m reading all by myself 😅
I'm watching this out of interest. I just had to study some cryptography for school but now I'm interested in learning more!
Definitely
Us
That's a very good explanation i have been searching for understanding this topic. Thanks a lot Buddy
You are most welcome, 5H13LD 5P1KY.
Best video I've watched, Easy to understand thank to you!
Youve literally saved my semesterrrr..God Blesss you
"Uncopyrightable" and "dermatoglyphics" are two of the longest words that don't repeat a letter. Great keywords.
Antidisestablishmenterianism
@@vedran3775 yes that is the longest word, but it has repeated letters. The two I noted above have no repeated letters.
@@Metrious yeah but you could just not write down the repeated letters when making the grid. So if the word has for example two A’s you could just write the word the way it is but leave out the second a
@@billjoe5991 Whereas you are correct it is easier to remember with no repeated letters. Otherwise you have to remember how you spelled it without the repeated letters. Other than that you are perfectly correct.
Maybe I missed the explanation but what if you need the letter that you are skipping? In this example it was the “J”. Would you use the “X”?
You are a phenomenal teacher
I owe you big time
You're quite welcome. Thank you for watching.
This is a phenomenal video, as are your 2 paper Enigma videos. However, I want to mention a couple things when using the Playfair cipher.
First when keying the Playfair cipher, you really should use an RNG to scramble the 5x5 grid. The threat model is an adversary that knows you're just using key words to key the Playfair cipher, and as such, writes a computer program to brute force search 5x5 grids based on simple key words. However there are 25 unique letters in Playfair, which means there are 25! (25 factorial) possible grids. In terms of computer security, this is about 83.68 bits of security (2^83.68 ~= 25!). 83 bits is robust enough to prevent an adversary from doing a successful brute force search.
Second, no two messages should ever be encrypted with the same 5x5 grid. As a mathematician, you should be able to appreciate the mathematics behind using two ciphertexts encrypted with the same symmetric key, do determine the key itself, and as such, decrypt future ciphertexts. Every Playfair key should be ephemeral. This is why code books handed out in WWI and WWII. Field agents would encrypt the message with a key out of the code book, then destroy the key. This isn't unique to one-time pads either. It's the case in modern cryptography with AES, was the case with the German Enigma, and should be the case with any symmetric cipher design.
A code book for a 5x5 Playfair grid could look something like:
1. BIUXZGOHERAWLYPDVQTMCKNSF
2. YDISTKQPUXZFCRHVGLOEBMWNA
3. ZAQCVTYOWBEHMDISRPKUXFLNG
4. GSEFXVQTHLPWKUMRYDNZIBACO
5. CEPGIRKLAZXFQBOSWDTYNUHVM
6. BWKSHOTZNYIMRGUCEDFLPQAXV
7. XWBFGTRMUDKCLOEVQASYHPNIZ
8. KYZCLETDXBOVWGAIHFURQSPMN
9. SFMLTKONVCPYXIBWHZEAQUDRG
10. FXNWMOEPDVBQCGSLYHTKAURIZ
Two field agents would have identical code books. The person encrypting the message would use key 1, then destroy the key. Next time they wish to encrypt a message, they would use key 2, then destroy that key, etc. Write the grid out left-to-right, five characters at a time, and you have your Playfair grid.
Very informative thank you :)
Sometimes people just use code words then go alphabetically
e.g. CODEABFGHIKLMNPQRSTUVWXYZ
SOR”TI”E
THE MEN OF GUNNERSIDE COULD BE PRAYING WITH DYNAMITE
Page1-100-C •
ANDRAE NORDSKOG
“the frauds has my grandfathers original Boulder Dam in the Light of the Owens Valley Fraud. ©️2022 by Adam Nordskog”
It says to go with V0C. #1
My new favorite cipher.
You r grt , your explaination is lit! Please make more videos
Everyone’s saying what a great video (totally true) but I’m over here just watching him write with that nice hand writhing. It looks like a typing font
Thank you so much for your explanation !!
I love to make this things !!!
😎👌
I'm from Brazil !!
If you add the numbers you can use all letters and numbers in a 6x6 table. With the bennefit of encoding numbers as well
Check out Martin Gardner's book "Codes, Ciphers, And Secret Writing" for his version of the Playfair Cipher, which does use a grid of randomly placed letters and digits!
does he explain the "back up" thingy in the code he gave us? because i rewatched the first 10 minutes twice and i never heard such thing
Wait how do you know when to move left or right in a row? For example:
Earlier you said within a row, to the right of the letter your interested in
At 3:13 HK. You move to the right with H and K wraps around to F.
But then at 12:56 OP, you move to the left to get NO. Why don't you wrap around to the right that time to make it PL?
As I am looking at the rest of the comments, it seems that everyone else understands it, so maybe I missed something in the video. Do you think you or someone else could clarify for me?
If you are ciphering you go on the right
If you are decoding you go on the left (because the code was made by going on the right)
@@christodoulosstylianides6477 Oh I see. Wow that makes it even cooler! Thanks so much!
@@partlycloudy4664 :)
Thank you for watching Alicia, and thank you Christodoulos for answering her question. If you any further questions, I'll keep an eye out.
Kevin
@@videosbykevin2938 thank you for such an amazing video!!
I love ciphers and codes, but I have no use for them... non of my friends are into them... can someone suggest a use? I want to use them for fun, but where do I start?
Apotheoic you can make a puzzle type event and find a online community that is into codes
Very nice. Thank you for the upload.
Im a little confused on the direction of the square. How come for " ME" you went clockwise and for "ET" you went counterclockwise?
Greetings sad milk,
Don't think of it as going clockwise or counter-clockwise. When two letters appear on the corners of a box, encode them with the letters opposite the corners horizontally. Always move horizontally either left or right.
Does that make sense?
Kevin
@@videosbykevin2938 yes it makes more sense... so going clockwise or counterclockwise is not the goal
Sometimes you go clockwise and other times you go counterclockwise when doing boxes (is it simply back and forth between the two every time you come across it?).
Greetings Carl,
No, you go clockwise when you are encoding, counter clockwise when you decode. Thank for watching.
what happens if you have to use the missing letter do u include it ?
The letters I and J can be counted as the same so instead of writing I in the box we write I/J
Can I ask you question? Can I find another languages the this code ? For example :in turkish
Greetings Lisa,
I don't see why not. Because the Turkish alphabet contains 29 letters, I would suggest using a 7 x 4 grid and leaving off a little-used letter as I did here in choosing to leave off J.
Saved my time, thanks
Great explanation 💖❤️
You deserve a subscribe,Thank you so much man!!!
You're most welcome, kichq. Thank you for watching.
What if i add 4 imaginary meaningless character or numbers and make it 6x6, to solve the missing character problem.. I think it should work! 🤔 what do you think?
great video with simple explanation, thanks so much!
You're very welcome!
What if you have a key word that has similar letters? (Example)
But I have a problem, what if my sentence is something like *the quick brown fox jumps over the lazy dog*?
What if there is an alone x at the end? I'm trying to encode "Orange Box" But have a leftover x at the end.
Decoding this would yield “ORANGEBOXX” which is still understandably “Orange Box.” The lone ‘x’ changes nothing.
@@terrydarhk Thanks!
@@SomeBrainiacRBLX 😁
This is so fun damn i started this class at the uni and iam so hyped to learn all of this
Thank you so much! I was able to decrypt the code from the beginning of National Treasure: Book of Secrets just for fun. Also, I've heard of people having the letter 'J' occupy the same square as 'I' instead of fully omitting it , do you think that's acceptable?
You're quite welcome. I'm delighted you found it useful.
Certainly you could do that, but I don't think you will find it unnecessary. No one would mistake ionathan, ianuary, or iuniper for anything other than Jonathan, January, of Juniper
wouldn't it be clever to use the letter you skipped in the grid and use it for double letters, or strings that end with a single letter?
but it's not on the grid so you don't have a letter to swap it with
Great explanation! But what happens if the letter j shows up in our plaintext.. do we subsitute it with an x maybe?
Thank you D. S. Personally, I use an i. No one would mistake ianuary, iury, or iaguar for anything but January, jury, or jaguar. But of course, you can use an X or any agreed upon letter. Another option would be to instead omit the letter Q, and use kw whenever it is needed as in kwick, kwit, or kwiet.
Hi kevin. I just want to share what i was thought in school, with regard to your "balloon" example.. From what i was thought, repeated letters should be placed with a null (X) in the middle. So balloon should be : ba lx lo on? just sharing... Thanks
You are quite right, Annaliza. Some people do as I have shown, others break apart all double letters as you were taught, and still others break only double letters that appear as a pair. Thank you for your comment.
@@videosbykevin2938 Potentially similar question, but what is to safeguard from palindrome words? Like noon, boob, etc. Say it was the word 'noon'. Could you put an x after the first n then do the double letter together then do the final N with the 5th letter and continue like that? I have my own workaround but I want to get the right system down first
What if you had a word with a j? Would u put for e.g. x?
can we use numbers grid to code message?
Can you have a code word like Tibia? Or does it have to be single letters that don't repeat
Hi Frank,
It must be a word that contains no repeated letters, PENCIL, BIRTHDAY, etc.
@@videosbykevin2938 You actually CAN use double letter words like BEEKEEPER, but you skip the letters, so the alphabet starts with B E K P R A C D...
Best explanation ever
what if we have double xx ?
what to do if you encouter the letter you skipped
Hello good sir, I was wondering if I got this correct, I was doing the thing you did with lizard but instead used the word zodiac and removed the letter k, and for the balloon I used Y an example being LY OY NY. So what I got for doing that was GO NW AV MX I was wondering if I was correct on this or do I need to do it again
Good day Sansaboy,
It looks like you've got a good handle on it, but if I understood your description right, I get GO NW AV TA. The last two letters, NY, are both in the fifth vertical column, so encode them using the letters directly below them. N goes to T and Y wraps around to the top to become A.
Hope that helps. Do let me know if I have misunderstood your question in any way.
Thank you for watching, Kevin
Thank you so much! I really need that for school but there was no German speaking video. Great job :)
Bitte schön. Danke fürs Zuschauen.
What would happen I you put all the letters (in the grid ) in a random order ?
That would be perfectly fine as long as your recipient knows what order you used.
I love your channel sir
Thanks for the video! This is gonna help me a lot.
What if the letter I skipped occurs in my text? Suppose that I was using the second grid you explained with and I want to encrypt January. So what will be the substitution for J? We don't have J in the grid. So what shall we replace it with? Or shall we just leave it as J?
Greetings Geeth,
Typically one would use i; no one would mistake ianuary for anything other than January. Also, presumably the receiver of your coded message would be aware of the particular limitation with the letter J and decode accordingly. I might also recommend skipping Q and encode qu as kw if needed: kwit, kwiet, kwalify, etc.
Thank you for watching,
Kevin
Very well explained, thank you.
Thanks alot......It really help me to do mine school project
I have a question.. Could MY in the first example be WO instead of OW?
Hello Aly,
Technically, no. It is understood that we always work horizontally in boxes, so M would map to O and Y would map to W, and when deciphering, O would map back to M and W back to Y. That being said, of course you and your fellow code writers could agree beforehand that you will work vertically in boxes, but the Playfair code as designed works horizontally.
@@videosbykevin2938 Ok thank you so much
Pretty sure this is a bit wrong but it just may be another version of the playfair cipher, however the way i learned is that you divide balloon into ba lx lo on not replacing letters just adding an x
What abut words with J?
how will you decode word containing the letter you discarded? in your case any word with J in it
Greetings Blink,
Typically one would use i; no one would mistake ianuary for anything other than January. Also, presumably the receiver of your coded message would be aware of the particular limitation with the letter J and decode accordingly. One could also skip Q instead and encode qu as kw if needed: kwit, kwiet, kwalify, etc.
Thank you for watching,
Kevin
@@videosbykevin2938 thanks tilte....dep3
Great video and well explained. Thanks a lot ! However, as you deliberately left out the “J”, I would like to know how I would send a “J” if I wanted to send a coded word like “ JUST “ or “ JUMP “ etc. I hope you will reply. Thanks again.
Greetings JustMe,
Typically one would substitute I for J when needed. Few people would confuse IUST, IUMP, or IANuARY for anything but JUST, JUMP, or JANUARY. However, as long as you and your recipient agree beforehand, you can leave out any letter you wish. I chose J because that's what the original crafter of the cipher did and because it has an easy substitution in the letter I.
Thank you for you kind praise, Kevin
@@videosbykevin2938 thanks for your answer and taking time to reply. it's really a good way to keep private information for oneself, like passwords or bank details. thanks again.
Why should we skip J? My name is Suraj how could I write the letter J? Please answer me
Great explanation! Helped me a lot! Thank you! ;)
You are most welcome. Thank you for watching.
If the encrypted message is a sentence.. then how can a space be identified at decryption side?
Greetings Kaivan, Typically one does not include spaces in the encrypted message in order to make any attempts at unauthorized decryption more difficult. However, if you needed a space, you and the recipient would agree beforehand on a letter, usually X, to represent a space.
Hello. Great video. Could you recommend a cipher book? thanks
Good day Ivan,
There are many fine books on ciphers, but for the most in depth understanding, I would recommend you find a math textbook on Number Theory. It will be quite math-heavy and contain gads of information on many other topics, but the chapters on ciphers will be quite detailed with plenty of examples on both encoding and decoding.
Thank you for watching, Kevin
Sir, if we have removed the letter J, then how should we encrypt a word with J ?
th-cam.com/video/2HWAqoDttU4/w-d-xo.html
Such good explanation 💯
You're so underrated.
This is awesome. I've watched many videos but this is so well explained.... I think I finally got it. But... I may be daft... In the example HK, move to the right becomes IF. And in the reply of the spy NP, move to the left becomes MO and not OL. What did I miss? I'm sorry for asking. Can anybody explain it to me? 😟 Thank you!
Greetings Natalie,
Your reasoning is spot on. As you say, HK becomes IF because we move to the right when encoding, but when the spy sends a response we decode the message by moving to the left, so NP becomes MO.
If we were encoding NP instead of decoding, it would be encoded as OL because we move to the right.
Do please let me know if that clears up any confusion.
Thank you for your kind praise.
Kevin
Thanks needed this for school.
I like your profile picture lol
AnimePabu Thanks I like yours
The Playfair cipher is one of the easiest to break.
Why not skip e?
Thanks for the explanation…give a clear idea how to make a simple program in C,,, how I can manipulate los arrays for (i,j).. It’s very simple..thanks
It’s a nice example that give me a clear idea how I can do it in C or assembler program..chao
Awezome Explanation !! =)
What about "this"
SIHT
Not quite bud
this is really helpful thank you so much
Wow! very helpful.
Excuse me, I want ask. Where is "J" in your box ? Thanks. Correction me if I'm wrong...
Greetings Indra,
Because the grid can only hold 25 letters, a letter has to be sacrificed. You can choose any letter you like, but I choose to omit J and replace it in any messages with the letter I. No one would confuse Ianuary, Ioseph or iungle for anything but January, Joseph, and jungle.
I discuss the need for skipping a letter in the video here: th-cam.com/video/-KjFbTK1IIw/w-d-xo.html
Thanks for watching, Kevin
Thank you very much for explained the answer sir 😊👍
Thank you soooooooo much 🙏
Please help me understand why You missed out your Alphabet letter after I we have J not K
Good one dude.. Well said ❤
Hey can you help me with a coded message i'm trying to solve now for weeks? I'm desperate, and close to losing my mind lol
How about J?
THANKS MAN! LOVE U!!!!!!!!!!
Why is j missing
Does anyone have experience with a 16x16 Fairplay by chance
Great explanation!
so good would fly to the moon for this
0:08 I waited for Vsauce music...
Ah ok.
Ardent Alien Power Lizard Mourn Planet Viper Range Laser Laso Idaho
Its like one of those super special passphrase chains that are generated for you when something is super encrypted.
If we have to send a Massage with letter of 'J' Then what
Yes, that's what I'm worried about too
Greetings Rohith and xLady,
Typically one would use i; for example, no one would mistake ianuary for anything other than January. Also, presumably the receiver of your coded message would be aware of the particular limitation with the letter J and decode accordingly. If J is especially dear to you, you might instead skip Q and encode qu as kw if needed: kwit, kwiet, kwalify, etc.
Kevin
or you can get fancy and use another language that spells their word with different letters, but has the same meaning
For the person decoding it would have a very hard time....
Im talking about the person the message is ment for....
If they dont know what letter to use
The letter next to it or under it or a big box or a square?
I DONT GET IT?
Depends on the pair. If the two letters create a box or if they are on the same line. If they are on the same line vertically or horizontally then they use the one next to it (horizontally) or under it (vertically) But if they are diagonal (like not on the same line at all) then it’s a square and you go to the opposite side. It’s explained well at the beginning try rewatching it you may understand it if you rewatch it
Man oh man. This is some John Nash shit. Beautiful Mind.