ViewTube

ViewTube
Sign inSign upSubscriptions
Filters

Upload date

Type

Duration

Sort by

Features

Reset

20 results

Zach's Math Zone
Cryptography: The ADFGVX Cipher

In this video I provide an explanation of the ADFGVX cipher, including an example of how to encrypt and decrypt text using the ...

7:56
Cryptography: The ADFGVX Cipher

2,237 views

7 months ago

Security First Corp
How Does A Transposition Cipher Work? - SecurityFirstCorp.com

We will also touch on historical examples, such as the ADFGVX cipher, that combine transposition with substitution techniques.

2:59
How Does A Transposition Cipher Work? - SecurityFirstCorp.com

5 views

7 months ago

Real Estate Investment View
Cryptographic War: How Code-Breakers Changed World War I's Fate

In the shadows of World War I, cryptography emerged as a silent yet formidable force. As nations grappled with power, secret ...

1:00
Cryptographic War: How Code-Breakers Changed World War I's Fate

444 views

6 months ago

vlogize
Solving the ADFGVX Cipher: How to Read Two Letters from a String in Python

Discover how to effectively read two letters at a time from a string in Python, utilizing the ADFGVX cipher and enhancing your ...

1:40
Solving the ADFGVX Cipher: How to Read Two Letters from a String in Python

7 views

8 months ago

vlogize
Solving the ADFGVX Cipher Matrix Issue: How to Replace Zeros with Custom Characters

Learn how to successfully fill empty spaces in your ADFGVX cipher matrix with a character of your choice, allowing for a more ...

1:36
Solving the ADFGVX Cipher Matrix Issue: How to Replace Zeros with Custom Characters

3 views

7 months ago

vlogize
Creating a Matrix in Python: Filling Columns First for ADFGVX Cipher

Learn how to create a matrix in Python that fills columns first instead of rows, perfect for decoding ADFGVX ciphers. --- This video ...

1:31
Creating a Matrix in Python: Filling Columns First for ADFGVX Cipher

3 views

7 months ago

RISHABH BABU 66
papa meri papa Yr tttyu vgf #bollywood #hindisong #love
0:06
papa meri papa Yr tttyu vgf #bollywood #hindisong #love

76,309 views

5 months ago

Jessie’s CyberVault
The History of Cryptography

The Evolution of Cryptography: From Ancient Ciphers to Quantum Security Explore the journey of cryptography, from ancient ...

8:58
The History of Cryptography

34 views

11 months ago

Military History HQ
How Was Cryptography Used In World War 1? - Military History HQ

This video will highlight the significance of specific codes and ciphers, including trench codes and the infamous ADFGVX cipher, ...

3:39
How Was Cryptography Used In World War 1? - Military History HQ

43 views

10 months ago

Strategic Horizon
WWI's Secret Language #WWI #Codebreaking

Amidst the chaos of World War I, a secret language emerged as a crucial tool for communication and deception: coded messages.

0:28
WWI's Secret Language #WWI #Codebreaking

622 views

2 months ago

Skite innit
Black Ops 3 Zombies Revelations Cipher Breakthrough in 2025

BO3 Zombies Revelations Cipher Progress Has Finally Been Made 9 Years Later - Easter Eggs are still being solved - Playfair ...

12:37
Black Ops 3 Zombies Revelations Cipher Breakthrough in 2025

96,359 views

2 months ago

Duniakagyan - Explore the World
How the Indian Army's Messages are UNBREAKABLE #armyact #indiansoldiers #shorts

How does the Indian Army keep its messages safe when the enemy is always listening? In this video, we uncover the high-tech ...

0:56
How the Indian Army's Messages are UNBREAKABLE #armyact #indiansoldiers #shorts

863 views

2 months ago

Monitoria FMCC2 - Aelson
Criptografia ADFGVX - Parte 1
6:34
Criptografia ADFGVX - Parte 1

9 views

2 months ago

Monitoria FMCC2 - Aelson
Criptografia ADFGVX - Parte 2
5:34
Criptografia ADFGVX - Parte 2

3 views

2 months ago

Khetz Tutorials
Playfair Cipher Python Code | Cryptography | Khetz Tutorials

Then we are going to now form the cipher text out of these so the cipher text would be formed by us going down so still the same ...

35:29
Playfair Cipher Python Code | Cryptography | Khetz Tutorials

841 views

10 months ago

Monitoria FMCC2 - Aelson
Criptografia RSA
4:56
Criptografia RSA

7 views

2 months ago

All Sorts Podcast
WWI Espionage: How Secret Codes Shaped the Battlefield.

During World War I, communication was key—but so was secrecy. 🕵️‍♂️ Soldiers, spies, and strategists used secret code ...

25:00
WWI Espionage: How Secret Codes Shaped the Battlefield.

76 views

9 months ago

Ciberseguridad Para Humanos podcast
Capítulo 23 (Historia de la criptografía 3. 20 millones de dólares para quien descifre este código)

Este es el capítulo 23 del podcast "Ciberseguridad para humanos" un espacio donde trataremos temas de Ciberseguridad, ...

18:34
Capítulo 23 (Historia de la criptografía 3. 20 millones de dólares para quien descifre este código)

16 views

3 months ago

凪
ポリュビオスの謎と暗号

ポリュビオスの謎と暗号 #notebook.

7:37
ポリュビオスの謎と暗号

16 views

6 months ago

vlogize
Replace Pointer in keysquare with Letters in a String

Learn how to easily replace pointers in a keysquare with letters from a string, using Python's itertools. This guide explains the ...

1:59
Replace Pointer in keysquare with Letters in a String

1 view

8 months ago