Cryptography

Поделиться
HTML-код
  • Опубликовано: 7 сен 2024
  • Network Security: Cryptography
    Topics discussed:
    1) Introduction to cryptography and the role of cryptography in security.
    2) Formal definition of cryptography and explanation with example.
    3) Need for encryption and decryption in cryptography with real-world examples.
    4) Importance of keys in cryptography.
    5) Types of cryptography for example.
    6) Symmetric cipher model and explanation.
    7) Explanation of unconditionally secure and computationally secure encryption schemes.
    Follow Neso Academy on Instagram: @nesoacademy (bit.ly/2XP63OE)
    Contribute: www.nesoacademy...
    Memberships: bit.ly/2U7YSPI
    Books: www.nesoacademy...
    Website ► www.nesoacademy...
    Forum ► forum.nesoacad...
    Facebook ► goo.gl/Nt0PmB
    Twitter ► / nesoacademy
    Music:
    Axol x Alex Skrindo - You [NCS Release]
    #NetworkSecurityByNeso #Cryptography #NetworkSecurity

Комментарии • 83

  • @BcaWalaAli
    @BcaWalaAli 4 месяца назад +33

    People are saying not repeating the same step will save viewer's time, but not everyone is as smart as you guys.... some people need different perspective to understand the concept..... grow upp guys and appreciate the creator instead of finding silly problems in this video

  • @pulse5863
    @pulse5863 3 года назад +55

    These lectures are amazingly helpful. Thank you so much sir 😩

  • @riteshsharma9838
    @riteshsharma9838 Год назад +5

    Note : {cryptography deals with the Alot of mathematical terminology. The underlying mathematics is more important. So the keys are generated by the mathematical algorithms in order to deal with the cryptographic technique.}

  • @carmimweemba1907
    @carmimweemba1907 Год назад +6

    Powerful lesson you've opened it up for me now i can understand this topic

  • @amrilsan9299
    @amrilsan9299 5 месяцев назад

    that's more clear than my lecture does, thanks a lot sir

  • @DeepakKumar-nk3cv
    @DeepakKumar-nk3cv 3 года назад +20

    I don't no why you not uploading data structure lectures.........

  • @learninginstudentscafe7284
    @learninginstudentscafe7284 3 года назад +3

    Very informative

  • @michaelkamuyu5307
    @michaelkamuyu5307 3 года назад +4

    Very well put

  • @ViperDZac
    @ViperDZac 2 года назад +6

    Loved the explaination! Thank you.

  • @gurunath71
    @gurunath71 2 года назад +3

    @nesoacademy admin,
    “ How RSA can defeat ‘ man in the middle attack’ you can use following scenario: Imagine a sender S wants to share a secret key K to the receiver R. What exactly the sender S has to send to the receiver R?

  • @learninginstudentscafe7284
    @learninginstudentscafe7284 3 года назад +2

    Excellent

  • @TECHTUBERRj
    @TECHTUBERRj 3 года назад +4

    Sir plz complete entire course lecture.. As soon as possible.... Because sir we in 6th SEM and only watching your playlist.. Of whole video series..

  • @shashiraj1977
    @shashiraj1977 2 года назад +1

    best explanation

  • @souradeepchakraborty7969
    @souradeepchakraborty7969 Месяц назад

    too good!

  • @TECHTUBERRj
    @TECHTUBERRj 3 года назад +2

    Plz sir complete this course as soon as possible.. 🙏🙏

  • @TECHTUBERRj
    @TECHTUBERRj 3 года назад +1

    Your All lectures are more informative

  • @Dr.Briefcase
    @Dr.Briefcase Год назад +2

    Great lecture thank you

  • @bishwajeetpandey1570
    @bishwajeetpandey1570 2 года назад +4

    How does the secret key distributed between sender and receiver.

  • @RajuKumar-jn1rd
    @RajuKumar-jn1rd 3 года назад +5

    Sir can u make videos on object oriented programming

  • @kunjpatel2450
    @kunjpatel2450 3 года назад +2

    informative video

  • @aniltodakar6449
    @aniltodakar6449 6 месяцев назад

    Thanks for this video.

  • @malireddymanikumar1228
    @malireddymanikumar1228 Год назад

    Good explain..... Keep it up and gain users

  • @prernaarora2746
    @prernaarora2746 2 года назад +2

    Thanks a lot sir ❤️

  • @shubhamjamdade7890
    @shubhamjamdade7890 Год назад +1

    Thank you sir 😊

    • @Danielle2_
      @Danielle2_ Год назад

      👆👆👆👆
      DM me for guidance and support

  • @avejessi4175
    @avejessi4175 2 года назад +10

    Starts at 0:40

  • @sivakrishnagowrabathina5840
    @sivakrishnagowrabathina5840 3 года назад +1

    Superb

  • @GeekyMan
    @GeekyMan 3 года назад +24

    Presentation was very informative and well explained, but it was too much repetitive. For ex. the first 4mins of the video.

  • @aliyumuhammad-nurudeen9259
    @aliyumuhammad-nurudeen9259 10 месяцев назад

    Thank you for the lecture

  • @manmohan_pundir
    @manmohan_pundir 3 года назад +1

    Thnkyu

  • @anveshatagore542
    @anveshatagore542 3 года назад +12

    Please complete the DATA STRUCTURES lectures plz..

    • @rsingh6216
      @rsingh6216 3 года назад

      Sir said , stacks and queue are to be uploaded

    • @anveshatagore542
      @anveshatagore542 3 года назад

      @@rsingh6216 yes bro..But when ? They are saying the same to everyone. Its ok if they are not able to..cz i knw it takes a lot of time for them to do all these videos. I respect them. Just we can wait now..thats all we can do..

    • @rsingh6216
      @rsingh6216 3 года назад

      @@anveshatagore542 it's in my 2nd semester ,so only 3-4 months left for exam. I hope neso will upload all videos till that time.

    • @anveshatagore542
      @anveshatagore542 3 года назад

      @@rsingh6216 Hope so bro..

    • @rsingh6216
      @rsingh6216 3 года назад

      @@anveshatagore542 ok bro👍

  • @Andrea-i9f
    @Andrea-i9f 11 дней назад

    Thanks for the analysis! Could you help me with something unrelated: I have a SafePal wallet with USDT, and I have the seed phrase. (air carpet target dish off jeans toilet sweet piano spoil fruit essay). Could you explain how to move them to Binance?

  • @ssudha2737
    @ssudha2737 2 года назад +7

    Sir/ mam it's really our pleasure to have such kind of who teaches super than our college faculty
    But a graduate students we have so many topics in the syllabus ehy don't you refer B. Tech (4-1) syllabus for this subject . Please do it so make more videos on various topics which are related to student's syllabus
    I hope you understand !!!

  • @karthilogan7547
    @karthilogan7547 2 года назад +1

    Nice bro

  • @karthikraja3795
    @karthikraja3795 Год назад

    Well lectures thanks for ur explanation. ❤

  • @Anime_gaming2
    @Anime_gaming2 Год назад

    My my bro amazing 😍

  • @aishwaryadhandapani5435
    @aishwaryadhandapani5435 Год назад

    thanks a lot sir

  • @technisaiharn2440
    @technisaiharn2440 Год назад

    thanks alot it helpful

    • @Danielle2_
      @Danielle2_ Год назад

      👆👆👆👆
      Dm me for guidance and support

  • @mildredmandawala1140
    @mildredmandawala1140 Год назад

    Very helpful

    • @Danielle2_
      @Danielle2_ Год назад

      👆👆👆👆👆
      Dm me for guidance and support

  • @apratheep9140
    @apratheep9140 Год назад

    Use of Problems Project Use Through the Same Problems Levels Engryption Decryption

  • @devlarktech7762
    @devlarktech7762 Год назад

    thank

  • @PPVideos19
    @PPVideos19 3 года назад +1

    can you make video on mitre ck and att

  • @riteshsharma9838
    @riteshsharma9838 Год назад

    you mean sender uses receiver's public key to encrypt the message and that encryption is only decrypted by receiver's private key

  • @bhagyarajubheemala343
    @bhagyarajubheemala343 11 месяцев назад

    nice...

  • @williamonwona6356
    @williamonwona6356 26 дней назад

    I need lecture notes on infrastructure network .

  • @gamerbijaygupta9698
    @gamerbijaygupta9698 Год назад +1

    Very hard

  • @1UniverseGames
    @1UniverseGames 3 года назад +1

    Don't have any programming based video for this explanation?

  • @5c1_ganesh5
    @5c1_ganesh5 Год назад

    I passed my exam brother Tanq so much

    • @Danielle2_
      @Danielle2_ Год назад

      👆👆👆👆
      Dm me for guidance and support

  • @apratheep9140
    @apratheep9140 Год назад

    Brain's 🧠🧠🧠 are heated

  • @musasalaudeen9116
    @musasalaudeen9116 7 месяцев назад

    Please who can guide on how to write cryptography algorithm?

  • @pranayjitmahata841
    @pranayjitmahata841 7 месяцев назад

    Key range and key size?

  • @sjsjiwii3129
    @sjsjiwii3129 2 года назад

    Luv u ❤

  • @anjankumar8687
    @anjankumar8687 Год назад

    Watching the day before exam🥲

  • @shrutibadgujar8925
    @shrutibadgujar8925 9 месяцев назад +1

    Can I get the ppt

    • @nesoacademy
      @nesoacademy  9 месяцев назад

      www.nesoacademy.org/cs/11-cryptography-and-network-security/ppts

  • @aryangoel4893
    @aryangoel4893 Год назад +1

    Unconditionally and computationally secure not clear.

  • @anushravishankar9741
    @anushravishankar9741 Год назад +1

    Video length can be made shorter if the same topic is'nt repeated 15 times

    • @Danielle2_
      @Danielle2_ Год назад

      👆👆👆👆👆
      Dm me for guidance and support

  • @sayumisooriyaarachchi4847
    @sayumisooriyaarachchi4847 2 года назад

    Voice 🤩🤩🤩🤩🤩

  • @user-xk9qw5gj8t
    @user-xk9qw5gj8t 4 месяца назад

    🙏🙏🙏🙏

  • @VoteOne-vw4eb
    @VoteOne-vw4eb 10 месяцев назад

    DAMN❤❤

  • @apratheep9140
    @apratheep9140 Год назад

    Schedule Scheme

  • @rishuuup
    @rishuuup Год назад +1

    today is my mid sem exam😂😂🙂

  • @laroycejordan3454
    @laroycejordan3454 9 месяцев назад

    I DidntKnow That.

  • @dhananjaybharati
    @dhananjaybharati Год назад

    Man... You need to "really" study before you start making tutorial videos. I can't imagine how many viewers have left I'll informed after learning from this video.

  • @apratheep9140
    @apratheep9140 Год назад +3

    Input 🔣🔠🔣 Output

  • @x2ak
    @x2ak Год назад

    bro why you shouting at me 🤣

  • @keerthan657
    @keerthan657 2 года назад +1

    too much repeated concepts, just get to the point plz

  • @chiragsharma5835
    @chiragsharma5835 10 месяцев назад +1

    you could have done better 😐

  • @nitinoza8392
    @nitinoza8392 Год назад

    Very poor content and only repetition of content