Cryptography
HTML-код
- Опубликовано: 7 сен 2024
- Network Security: Cryptography
Topics discussed:
1) Introduction to cryptography and the role of cryptography in security.
2) Formal definition of cryptography and explanation with example.
3) Need for encryption and decryption in cryptography with real-world examples.
4) Importance of keys in cryptography.
5) Types of cryptography for example.
6) Symmetric cipher model and explanation.
7) Explanation of unconditionally secure and computationally secure encryption schemes.
Follow Neso Academy on Instagram: @nesoacademy (bit.ly/2XP63OE)
Contribute: www.nesoacademy...
Memberships: bit.ly/2U7YSPI
Books: www.nesoacademy...
Website ► www.nesoacademy...
Forum ► forum.nesoacad...
Facebook ► goo.gl/Nt0PmB
Twitter ► / nesoacademy
Music:
Axol x Alex Skrindo - You [NCS Release]
#NetworkSecurityByNeso #Cryptography #NetworkSecurity
People are saying not repeating the same step will save viewer's time, but not everyone is as smart as you guys.... some people need different perspective to understand the concept..... grow upp guys and appreciate the creator instead of finding silly problems in this video
These lectures are amazingly helpful. Thank you so much sir 😩
Note : {cryptography deals with the Alot of mathematical terminology. The underlying mathematics is more important. So the keys are generated by the mathematical algorithms in order to deal with the cryptographic technique.}
Powerful lesson you've opened it up for me now i can understand this topic
that's more clear than my lecture does, thanks a lot sir
I don't no why you not uploading data structure lectures.........
Very informative
Very well put
Loved the explaination! Thank you.
@nesoacademy admin,
“ How RSA can defeat ‘ man in the middle attack’ you can use following scenario: Imagine a sender S wants to share a secret key K to the receiver R. What exactly the sender S has to send to the receiver R?
Excellent
Sir plz complete entire course lecture.. As soon as possible.... Because sir we in 6th SEM and only watching your playlist.. Of whole video series..
best explanation
too good!
Plz sir complete this course as soon as possible.. 🙏🙏
You can also see more videos on my channel also
Your All lectures are more informative
Great lecture thank you
How does the secret key distributed between sender and receiver.
Sir can u make videos on object oriented programming
informative video
Thanks for this video.
Good explain..... Keep it up and gain users
Thanks a lot sir ❤️
Thank you sir 😊
👆👆👆👆
DM me for guidance and support
Starts at 0:40
Superb
Presentation was very informative and well explained, but it was too much repetitive. For ex. the first 4mins of the video.
Thank you for the lecture
Thnkyu
Please complete the DATA STRUCTURES lectures plz..
Sir said , stacks and queue are to be uploaded
@@rsingh6216 yes bro..But when ? They are saying the same to everyone. Its ok if they are not able to..cz i knw it takes a lot of time for them to do all these videos. I respect them. Just we can wait now..thats all we can do..
@@anveshatagore542 it's in my 2nd semester ,so only 3-4 months left for exam. I hope neso will upload all videos till that time.
@@rsingh6216 Hope so bro..
@@anveshatagore542 ok bro👍
Thanks for the analysis! Could you help me with something unrelated: I have a SafePal wallet with USDT, and I have the seed phrase. (air carpet target dish off jeans toilet sweet piano spoil fruit essay). Could you explain how to move them to Binance?
Sir/ mam it's really our pleasure to have such kind of who teaches super than our college faculty
But a graduate students we have so many topics in the syllabus ehy don't you refer B. Tech (4-1) syllabus for this subject . Please do it so make more videos on various topics which are related to student's syllabus
I hope you understand !!!
Nice bro
Well lectures thanks for ur explanation. ❤
My my bro amazing 😍
thanks a lot sir
thanks alot it helpful
👆👆👆👆
Dm me for guidance and support
Very helpful
👆👆👆👆👆
Dm me for guidance and support
Use of Problems Project Use Through the Same Problems Levels Engryption Decryption
thank
can you make video on mitre ck and att
you mean sender uses receiver's public key to encrypt the message and that encryption is only decrypted by receiver's private key
nice...
I need lecture notes on infrastructure network .
Very hard
No
Don't have any programming based video for this explanation?
I passed my exam brother Tanq so much
👆👆👆👆
Dm me for guidance and support
Brain's 🧠🧠🧠 are heated
Please who can guide on how to write cryptography algorithm?
Key range and key size?
Luv u ❤
Watching the day before exam🥲
Can I get the ppt
www.nesoacademy.org/cs/11-cryptography-and-network-security/ppts
Unconditionally and computationally secure not clear.
Video length can be made shorter if the same topic is'nt repeated 15 times
👆👆👆👆👆
Dm me for guidance and support
Voice 🤩🤩🤩🤩🤩
😅
🙏🙏🙏🙏
DAMN❤❤
Schedule Scheme
today is my mid sem exam😂😂🙂
I DidntKnow That.
Man... You need to "really" study before you start making tutorial videos. I can't imagine how many viewers have left I'll informed after learning from this video.
Input 🔣🔠🔣 Output
bro why you shouting at me 🤣
too much repeated concepts, just get to the point plz
you could have done better 😐
Very poor content and only repetition of content