TYPES OF CRYPTOGRAPHY | Symmetric Cryptography, Asymmetric Cryptography and Hashing

Поделиться
HTML-код
  • Опубликовано: 7 сен 2019
  • Hello friends! Welcome to my channel.My name is Abhishek Sharma.
    In this video, I have explained the concept of Types Of Cryptography. There are 3 types of cryptography:
    1. Symmetric Cryptography
    2. Asymmetric Cryptography
    3. Hashing Cryptography
    #abhics789
    If you learned something new do like and share this video with your friends and don't forget to subscribe to my channel :)
    #TypesOfCryptography #Symmetric #Asymmetric #hashing
    There are lectures related to different subjects on this channel.Do check them out, guys.
    Link is given below:
    computer graphics:
    • Computer Graphics
    engineering economics:
    • Engineering Economics
    Cryptography :
    • Cryptography and netwo...
    .Net C# :
    • .NET C#
    Pointers in C :
    • Pointers in C
    Linked List for Interviews :
    • Linked List for interv...
    Java Tricky videos/programs for interviews :
    • Java tricky programs/v...
    File Handling in C :
    • FILE Handling in C
    pointers playlist:
    • Pointers in C
    C Programming tips and tricks:
    • C tricky programs/videos

Комментарии • 159

  • @Utubechannel009
    @Utubechannel009 2 года назад +18

    Can u provide subtitles I'm know telugu and English

    • @AbhishekSharmaDit
      @AbhishekSharmaDit  2 года назад +4

      Some Cryptography videos in English
      ruclips.net/p/PL9FuOtXibFjWY-zqhun5kRgXdR_W9cpSB

    • @VISHALMISHRA-rz5nv
      @VISHALMISHRA-rz5nv Год назад

      @@AbhishekSharmaDit bro can i get all the notes in pdf format.
      im watching the series to understand the concepts but i only have 1 month for semester exam could you provide the notes in pdf format

    • @Beautifulnature7842
      @Beautifulnature7842 Год назад

      S please

    • @mayankverma8925
      @mayankverma8925 Год назад +1

      You can watch videos of telugu cryptographers

    • @Utubechannel009
      @Utubechannel009 Год назад +1

      @@mayankverma8925 its 1 yr back msg😂

  • @user-pv2gr3sm6y
    @user-pv2gr3sm6y 7 месяцев назад +10

    Asymmetric and symmetric encryption are two primary techniques used to secure data. Symmetric encryption uses the same key for both encryption and decryption, while asymmetric encryption uses a pair of keys: a public key for encryption and a private key for decryption.

  • @amankr9093
    @amankr9093 2 года назад

    Awesome video lecture thankyou so much sir bahut help kiya ye video bahut se bhi jyada 🙏❤️🥰😊👍

  • @Bobby_00l7
    @Bobby_00l7 6 месяцев назад +9

    Today is my exam 😅

  • @UshaUsha-cd3oe
    @UshaUsha-cd3oe 2 года назад

    Doubts clear ho gye apki video se amazing video

  • @iragautam
    @iragautam 3 года назад +4

    Cryptography...is a new subjevt for me now....but i sure your video will help me much...cozz you explained everything....in a nice way❤️👍🏻...thanku

  • @gopalkumar9804
    @gopalkumar9804 Год назад +14

    Tomorrow my exam 🤞🏻

  • @RohitGupta-og6ni
    @RohitGupta-og6ni 3 года назад +1

    Bhai , you video lecture is more supportive for me . So Thanks a lot bhai .

  • @believeinyourself299
    @believeinyourself299 Месяц назад +2

    Totally appreciated❤😊, Thank you bro

  • @sajeedullah4583
    @sajeedullah4583 3 года назад +1

    thanks for making such an understandable Videos for us, you made it very easy for us.

  • @user-th8yc7wk1v
    @user-th8yc7wk1v Год назад +1

    Superrr brooo❤ well said I got full clarity on topic 😊😊😊 tq u bro

  • @dollydewangan8964
    @dollydewangan8964 3 года назад +1

    Thank you so much sir it's interesting 👌👌

  • @parthpatel9757
    @parthpatel9757 3 года назад +6

    Thanks for such a fabulous lesson and content. And if you don't mind brother Could you share your notes please?

  • @welcomeworld1739
    @welcomeworld1739 2 года назад

    This is very helpful , thank you

  • @technicalcoding2710
    @technicalcoding2710 3 года назад +1

    Love it 🥰

  • @ruksharparveen6137
    @ruksharparveen6137 2 года назад

    Thanks a lot for this video. It is very useful for me .

  • @anishasingh3306
    @anishasingh3306 2 месяца назад

    Awesome❤

  • @HarshaDwivedi33
    @HarshaDwivedi33 3 месяца назад +1

    Thank you bhaiya ji

  • @pranjulgupta9250
    @pranjulgupta9250 3 года назад +1

    Thanks a lot, it is really helping

  • @ladydimitrescu1155
    @ladydimitrescu1155 4 года назад +1

    Thankyou so much!

  • @directopath4860
    @directopath4860 3 года назад

    Bahut badhiya samjhaya aapne sir....
    Agar aap apne ye notes provide kar dete to or achha ho jaata hamare liye....🙏🙏🙏

  • @mineemisha1875
    @mineemisha1875 4 года назад +2

    Nice explain

  • @Adventure581
    @Adventure581 4 года назад +1

    Superb sir👌👌

  • @akshaymahajan4907
    @akshaymahajan4907 Год назад

    Very Nice Explanation.

  • @karanjaiswal6623
    @karanjaiswal6623 4 года назад +7

    DES stands for Data Encryption Standard
    please correct it

  • @mdafroj6058
    @mdafroj6058 4 месяца назад

    very excellent Abhishek Bhai

  • @Aisha-vs8vd
    @Aisha-vs8vd Год назад

    Thanks yaar kal exam hai pr samajh nahi aa raha tha syllabus but aapke videos dekhke samajh aa rahi h Thankyou so much 👍👍👍👍

  • @reviewshyd1155
    @reviewshyd1155 2 года назад +2

    very well explained

  • @vinayaksharma7134
    @vinayaksharma7134 2 года назад +1

    thank You bhaiya!!!

  • @mshrisha15
    @mshrisha15 3 месяца назад +1

    Ur handwriting 😩😩was awesome ❤

  • @sumitsinha1506
    @sumitsinha1506 3 года назад +12

    Truly amazing work brother❤️, but please provide the PDFs of those notes like stuff you had in your video..
    Thank you 🔥💯

  • @webxlo128
    @webxlo128 2 года назад +1

    based on advanced encryption standard if c={74} instead of c={63}in s box construction, find a value for the position 78 in the sbox

  • @Fit_medico_brishnikant
    @Fit_medico_brishnikant 3 года назад +1

    Bro mst 👌👌👌

  • @user-lz4le1yu6o
    @user-lz4le1yu6o 8 месяцев назад +1

    your the best person sir kindly make make course in Quantum Cryptography Complete Course please

  • @kamar1380
    @kamar1380 4 года назад +2

    Bro can you provide notes of this series..?
    Thnks for this awesome video...👍

  • @yaminin5809
    @yaminin5809 2 года назад

    Good explanation sir best of luck

  • @anjana6898
    @anjana6898 2 года назад

    Helpful🙏

  • @asiankingofficial6579
    @asiankingofficial6579 2 года назад

    This is the best explanation video for me love you bhai
    Jai hind

  • @lhakpasingi8780
    @lhakpasingi8780 3 года назад

    Very useful 😊🙏🌻

  • @snehasish-bhuin
    @snehasish-bhuin 2 года назад

    Every videos are very good 👍. If you plz share a pdf document of your notes that will be more attractive

  • @pawanbhoyar032
    @pawanbhoyar032 8 месяцев назад

    Thank you so much sir ❤

  • @er.santoshkumargupta50
    @er.santoshkumargupta50 4 года назад

    Love you sir

  • @amlassalma8090
    @amlassalma8090 Год назад

    Mashallah kaa chalatha hoo ab thanks bhai

  • @YN.PICTURES
    @YN.PICTURES 2 года назад

    Bro you're great 👏👍,

  • @nandanisharma9045
    @nandanisharma9045 2 года назад

    Nice explanation 😇👍

  • @TheShubham778
    @TheShubham778 2 года назад

    Awesome

  • @meenumohan98
    @meenumohan98 2 года назад

    Thank you soo much😍

  • @arshsingh1218
    @arshsingh1218 2 месяца назад +1

    Thnx sir

  • @2000shweta
    @2000shweta 4 года назад +2

    message can only be encrypted using public key of receiver and decrypted by private key of receiver.

  • @Virgo23
    @Virgo23 Год назад +1

    thanks a lot

  • @veersharma1333
    @veersharma1333 3 года назад

    Good👍

  • @rohitjadhav7844
    @rohitjadhav7844 2 года назад +1

    Tnx sir

  • @vicky02078671
    @vicky02078671 4 года назад +1

    Nice job sir thank you blowwish algorithm pr vedio bnye pls

  • @tusharpatne6863
    @tusharpatne6863 3 года назад

    Great content sir,
    can you please provide a pdf of these notes

  • @zackx5200
    @zackx5200 4 месяца назад

    🔥🔥🔥🔥🔥🔥

  • @saipavan1442
    @saipavan1442 3 года назад +1

    Super

  • @ejanshrestha9504
    @ejanshrestha9504 4 года назад

    how you capture like this ? which camera stand u use ?

  • @VikasGS-kl1sj
    @VikasGS-kl1sj 3 года назад +1

    bro pls provide the notes in pdf format for us ...it will be very helpfull.

  • @lakshsinghania
    @lakshsinghania 7 месяцев назад

    bhaiya, i didnt get this point as u said asymmetric encryption keliye koi bhi "key" use kar sakte ho
    so if we use private key (A) for encryption i.e the plain text is converted to cipher text and the attacker or any 3rd party can decrypt it using public key as it known to whole world. Whats the use of this method and it doesnt make any sense?
    can u pls brief on this for clarifying it properly

  • @amankr9093
    @amankr9093 2 года назад

    Sir aisa hi video aur bhi aage bnaye ye meri request hai aapse

  • @VivekMishra-sk4bs
    @VivekMishra-sk4bs 2 года назад +6

    please upload the notes in pdf forms and provide the link ,your lecture are awesome ❤️❤️

    • @Knowledgeduniya1432
      @Knowledgeduniya1432 Год назад

      @Beelzebub bas y hi engineering k chutiyapa h bhai merko smjh nhi aata jab sikhna nhi toh pd q rhe h in subjects ko kisko dikhane k liye pad re yr apn😂

    • @Knowledgeduniya1432
      @Knowledgeduniya1432 Год назад

      @Beelzebub 😂

  • @dikshachawla6451
    @dikshachawla6451 3 года назад

    Kindly share some videos on implementation.

  • @nusrathunnisa9645
    @nusrathunnisa9645 3 года назад

    Can u plz explain model of conventional cryptosystem

  • @rimsha6001
    @rimsha6001 2 года назад +1

    Asslam u alaikum Sir
    Aik question hai kindly answer krdy
    Question:
    IT Security
    Personnel Security
    Physical Security
    Operational Security
    Into which of these would you put the following, justify your choice?
     Enforcing hard-to-guess passwords
     Encrypting your hard drive
     Looking sensitive documents in a safe
     Stationing a marine guard outside an embassy
     Assigning security clearances to staffers
     Using SSL for data transfer
     Having off-site backup of documents
    Plzzz sir i request you iska answer bta dy plzzzz

  • @sibgathassan6281
    @sibgathassan6281 3 года назад

    Symmetric ma jab key b internet sae share hoga . Attacker Key le k decrypt nahi karsakhta ha??

  • @vijaylaxmi9849
    @vijaylaxmi9849 2 года назад

    Sir , u said ki
    1. public key se encryption karenge to private key se hi decrypt kar sakte h aur vice versa par fir symmetric cryptography me same key kaise use hota h fir? Ya ye rule sirf asymmetric k liye hi hai
    2.Aur symmetric cryptography me private key use krte h ya public?
    Please clear my doubt

  • @rajindernegi8280
    @rajindernegi8280 Год назад

    Can you please share the book name you refer in your videos of cryptography

  • @ronit3014
    @ronit3014 3 года назад

    5:26 Apni public aur *private key* kese Pta kre ye device vise hoti h ya app vise ???

  • @dineshkumawat9920
    @dineshkumawat9920 2 года назад

    Sir me bitcoin keys ke baare me kuch puchna chahta hu key ke type ki phle kis kis trh ki key aaya krti thi

  • @Ghosttitan-S141
    @Ghosttitan-S141 4 года назад

    Form where do the key 1 and key 2 come from???

  • @annubhati3442
    @annubhati3442 3 года назад

    Sir ,
    information systems analysis designs k notes ki vdeo bna do.

  • @veerannahattiholi3672
    @veerannahattiholi3672 2 года назад

    Sir can we get pdf of your notes ......so that it will be very much usefull for us !

  • @nikitabarediya
    @nikitabarediya Месяц назад

    🎉

  • @ss-ub6qb
    @ss-ub6qb 2 месяца назад

    (how to attack a classical cipher using known partial plaintext? ) bhai isko explain kar do

  • @rakeshmd7882
    @rakeshmd7882 3 года назад

    Bro can u pls share the notes that u hve explained

  • @anildanes2807
    @anildanes2807 3 года назад

    Brother explain about secret key,public key and message digest.

  • @23ashobhasoni56
    @23ashobhasoni56 Год назад

    iska encryption methode kya hoga?

  • @priyankagarg3891
    @priyankagarg3891 2 года назад

    Hey, can you provide your notes as well

  • @nomansyt
    @nomansyt 2 года назад +1

    My college professor has 18 years of experience, still you are far better then him. I respect him too

    • @mackmenezes4912
      @mackmenezes4912 Год назад

      The longer you teach the more you realise the pain suffering and coldness the teachers in college feel ,they are so bored ,and the smart students in class are even more idiotic that the don't share how they do the work,it's not the smart students fault as well ,they were born and raised up in FACTORIES

  • @apoorvav7430
    @apoorvav7430 Год назад +1

    Where can we find the pdf of ur notess
    Please reply

  • @trineshyadav4379
    @trineshyadav4379 3 года назад

    Rootkit aur attacker hijacking kr bare me vedio bnaye sir aap

  • @iamsky.20
    @iamsky.20 Год назад

    please make pdf of notes and provide a link that would be really helpful

  • @ronit3014
    @ronit3014 3 года назад

    5:39 Private Key device ke inbuilt hidden rhti h ya hm usko dekh skte h ???
    Dekh skte h >to> share kr skte
    Share kr skte h to *HACK bhi to kr skte h* 😛😛😛

  • @shivamsuchak5807
    @shivamsuchak5807 4 года назад

    hey your playlist is really good and useful, Can i have your book?

    • @AbhishekSharmaDit
      @AbhishekSharmaDit  4 года назад +7

      Cryptography and network security by Behrouz A Forouzan

  • @binod9988
    @binod9988 Год назад +1

    DES=Data Encryption Standard(not system)

  • @user-jm1yl7nm5f
    @user-jm1yl7nm5f 11 месяцев назад

    Sir please or bhi subject pe vedio banao

  • @vantal4115
    @vantal4115 Год назад

    Bro decryption ke liye A ki private key kyu use kr rahe ho...how B is getting A's private key?

  • @darkfox379
    @darkfox379 3 года назад

    Bro final year bca how to get placement bro

  • @ronit3014
    @ronit3014 3 года назад

    *Public key aur Private key* me relation HOTA hoga tabhi to Private key public key se *encrypted* msg ko *decrypt* kr pati h 🤫🤫🤫
    To hm public key se *Private Key* drive nhi kr skte kya ? 🤘🤘🤘

  • @035_shubhamrai2
    @035_shubhamrai2 3 года назад

    Hello Bhai! Can you share your notes pdf?

  • @pawankumarpandit1822
    @pawankumarpandit1822 11 месяцев назад

    anybody have notes of this total playlist

  • @debjitpaul8580
    @debjitpaul8580 4 года назад +1

    Doubt: You said a msg that is encrypted by a public key can only be decrypted by using a private key and vice versa. That means two different keys are necessary, right?
    So what is use of Symmetric cryptography then? You just said I cannot use the same key for both encryption and decryption.
    Please clarify this, anyone!

    • @AbhishekSharmaDit
      @AbhishekSharmaDit  4 года назад +3

      That is applicable only for asymmetric key Cryptography
      " the public and private key concept "
      And in symmetric key Cryptography
      We will use the same key for Encryption and decryption

    • @debjitpaul8580
      @debjitpaul8580 4 года назад

      @@AbhishekSharmaDit In symmetric can it be either of public or private key? Are there any rules for that?

    • @AbhishekSharmaDit
      @AbhishekSharmaDit  4 года назад +1

      @@debjitpaul8580 there is no public or private key concept in symmetric key Cryprtography
      Key can be anything (generally any sequence of characters)
      Like key can be "absd@1hj"
      Or it can even be your name
      Hope doubt is clear now !!
      Follow the series
      U will get your doubts cleared

  • @BadalKumar-tu2wg
    @BadalKumar-tu2wg 2 года назад

    Notes download kaise kare

  • @nishikantshirke273
    @nishikantshirke273 4 года назад

    Agr A side se public(A) key se message encrypt kiya to B ke end pe private (A) key se message decrypt karna hoga...but private key to A ke pass hi rahegi...fir B kaise decrypt karega?

    • @AbhishekSharmaDit
      @AbhishekSharmaDit  4 года назад +2

      A apni nahi
      B ki public key se Encryption karega
      So that B apni private key ko use karke info decryption kar sake
      Baki if you will follow my playlist
      U will get everything
      Sab doubts apne aap clear ho jayenge
      So i would recommend playlist follow karo
      Sab bahot ache se samajh aa jayega 😊

    • @nishikantshirke273
      @nishikantshirke273 4 года назад +1

      Now it's perfect 😊👍

  • @23_h_rajatbhatt21
    @23_h_rajatbhatt21 2 года назад

    aapke notes provide krate hai kya

  • @typhoontab2429
    @typhoontab2429 Год назад

    Can you please give us the notes pdf

  • @sachinduhan3022
    @sachinduhan3022 3 года назад +3

    can you share the pdf of notes
    thanks in advance
    great content

  • @capturedunia8835
    @capturedunia8835 2 месяца назад

    Hello Sir,
    Can you please share the pdf file for these lectures?

  • @maneeshgeed2258
    @maneeshgeed2258 3 года назад +3

    Sir Can you please provide the handwritten pdf of whole lecture.

    • @mackmenezes4912
      @mackmenezes4912 Год назад

      Write it on paper,why troubling sir?🤬

    • @bablubhatt22
      @bablubhatt22 11 месяцев назад

      Oy help milti h usme troubling ni khte h ... Pdf provide krne m ky ho ra h
      ... Pdf hmehsa kam aaate h

  • @SahIl-jc4os
    @SahIl-jc4os 2 года назад

    Can you see? yes you can see 😂👍