TYPES OF CRYPTOGRAPHY | Symmetric Cryptography, Asymmetric Cryptography and Hashing
HTML-код
- Опубликовано: 7 сен 2019
- Hello friends! Welcome to my channel.My name is Abhishek Sharma.
In this video, I have explained the concept of Types Of Cryptography. There are 3 types of cryptography:
1. Symmetric Cryptography
2. Asymmetric Cryptography
3. Hashing Cryptography
#abhics789
If you learned something new do like and share this video with your friends and don't forget to subscribe to my channel :)
#TypesOfCryptography #Symmetric #Asymmetric #hashing
There are lectures related to different subjects on this channel.Do check them out, guys.
Link is given below:
computer graphics:
• Computer Graphics
engineering economics:
• Engineering Economics
Cryptography :
• Cryptography and netwo...
.Net C# :
• .NET C#
Pointers in C :
• Pointers in C
Linked List for Interviews :
• Linked List for interv...
Java Tricky videos/programs for interviews :
• Java tricky programs/v...
File Handling in C :
• FILE Handling in C
pointers playlist:
• Pointers in C
C Programming tips and tricks:
• C tricky programs/videos
Can u provide subtitles I'm know telugu and English
Some Cryptography videos in English
ruclips.net/p/PL9FuOtXibFjWY-zqhun5kRgXdR_W9cpSB
@@AbhishekSharmaDit bro can i get all the notes in pdf format.
im watching the series to understand the concepts but i only have 1 month for semester exam could you provide the notes in pdf format
S please
You can watch videos of telugu cryptographers
@@mayankverma8925 its 1 yr back msg😂
Asymmetric and symmetric encryption are two primary techniques used to secure data. Symmetric encryption uses the same key for both encryption and decryption, while asymmetric encryption uses a pair of keys: a public key for encryption and a private key for decryption.
Awesome video lecture thankyou so much sir bahut help kiya ye video bahut se bhi jyada 🙏❤️🥰😊👍
Today is my exam 😅
Doubts clear ho gye apki video se amazing video
Cryptography...is a new subjevt for me now....but i sure your video will help me much...cozz you explained everything....in a nice way❤️👍🏻...thanku
Tomorrow my exam 🤞🏻
Bhai , you video lecture is more supportive for me . So Thanks a lot bhai .
Totally appreciated❤😊, Thank you bro
thanks for making such an understandable Videos for us, you made it very easy for us.
Superrr brooo❤ well said I got full clarity on topic 😊😊😊 tq u bro
Thank you so much sir it's interesting 👌👌
Thanks for such a fabulous lesson and content. And if you don't mind brother Could you share your notes please?
This is very helpful , thank you
Love it 🥰
Thanks a lot for this video. It is very useful for me .
Awesome❤
Thank you bhaiya ji
Thanks a lot, it is really helping
Thankyou so much!
Bahut badhiya samjhaya aapne sir....
Agar aap apne ye notes provide kar dete to or achha ho jaata hamare liye....🙏🙏🙏
Nice explain
Superb sir👌👌
Very Nice Explanation.
DES stands for Data Encryption Standard
please correct it
very excellent Abhishek Bhai
Thanks yaar kal exam hai pr samajh nahi aa raha tha syllabus but aapke videos dekhke samajh aa rahi h Thankyou so much 👍👍👍👍
very well explained
thank You bhaiya!!!
Ur handwriting 😩😩was awesome ❤
Truly amazing work brother❤️, but please provide the PDFs of those notes like stuff you had in your video..
Thank you 🔥💯
based on advanced encryption standard if c={74} instead of c={63}in s box construction, find a value for the position 78 in the sbox
Bro mst 👌👌👌
your the best person sir kindly make make course in Quantum Cryptography Complete Course please
Bro can you provide notes of this series..?
Thnks for this awesome video...👍
Good explanation sir best of luck
Helpful🙏
This is the best explanation video for me love you bhai
Jai hind
Very useful 😊🙏🌻
Every videos are very good 👍. If you plz share a pdf document of your notes that will be more attractive
Thank you so much sir ❤
Love you sir
Mashallah kaa chalatha hoo ab thanks bhai
Bro you're great 👏👍,
Nice explanation 😇👍
Awesome
Thank you soo much😍
Thnx sir
message can only be encrypted using public key of receiver and decrypted by private key of receiver.
thanks a lot
Good👍
Tnx sir
Nice job sir thank you blowwish algorithm pr vedio bnye pls
Great content sir,
can you please provide a pdf of these notes
🔥🔥🔥🔥🔥🔥
Super
how you capture like this ? which camera stand u use ?
bro pls provide the notes in pdf format for us ...it will be very helpfull.
bhaiya, i didnt get this point as u said asymmetric encryption keliye koi bhi "key" use kar sakte ho
so if we use private key (A) for encryption i.e the plain text is converted to cipher text and the attacker or any 3rd party can decrypt it using public key as it known to whole world. Whats the use of this method and it doesnt make any sense?
can u pls brief on this for clarifying it properly
Sir aisa hi video aur bhi aage bnaye ye meri request hai aapse
please upload the notes in pdf forms and provide the link ,your lecture are awesome ❤️❤️
@Beelzebub bas y hi engineering k chutiyapa h bhai merko smjh nhi aata jab sikhna nhi toh pd q rhe h in subjects ko kisko dikhane k liye pad re yr apn😂
@Beelzebub 😂
Kindly share some videos on implementation.
Can u plz explain model of conventional cryptosystem
Asslam u alaikum Sir
Aik question hai kindly answer krdy
Question:
IT Security
Personnel Security
Physical Security
Operational Security
Into which of these would you put the following, justify your choice?
Enforcing hard-to-guess passwords
Encrypting your hard drive
Looking sensitive documents in a safe
Stationing a marine guard outside an embassy
Assigning security clearances to staffers
Using SSL for data transfer
Having off-site backup of documents
Plzzz sir i request you iska answer bta dy plzzzz
Symmetric ma jab key b internet sae share hoga . Attacker Key le k decrypt nahi karsakhta ha??
Sir , u said ki
1. public key se encryption karenge to private key se hi decrypt kar sakte h aur vice versa par fir symmetric cryptography me same key kaise use hota h fir? Ya ye rule sirf asymmetric k liye hi hai
2.Aur symmetric cryptography me private key use krte h ya public?
Please clear my doubt
Can you please share the book name you refer in your videos of cryptography
5:26 Apni public aur *private key* kese Pta kre ye device vise hoti h ya app vise ???
Sir me bitcoin keys ke baare me kuch puchna chahta hu key ke type ki phle kis kis trh ki key aaya krti thi
Form where do the key 1 and key 2 come from???
Sir ,
information systems analysis designs k notes ki vdeo bna do.
Sir can we get pdf of your notes ......so that it will be very much usefull for us !
🎉
(how to attack a classical cipher using known partial plaintext? ) bhai isko explain kar do
Bro can u pls share the notes that u hve explained
Brother explain about secret key,public key and message digest.
iska encryption methode kya hoga?
Hey, can you provide your notes as well
My college professor has 18 years of experience, still you are far better then him. I respect him too
The longer you teach the more you realise the pain suffering and coldness the teachers in college feel ,they are so bored ,and the smart students in class are even more idiotic that the don't share how they do the work,it's not the smart students fault as well ,they were born and raised up in FACTORIES
Where can we find the pdf of ur notess
Please reply
Rootkit aur attacker hijacking kr bare me vedio bnaye sir aap
please make pdf of notes and provide a link that would be really helpful
5:39 Private Key device ke inbuilt hidden rhti h ya hm usko dekh skte h ???
Dekh skte h >to> share kr skte
Share kr skte h to *HACK bhi to kr skte h* 😛😛😛
hey your playlist is really good and useful, Can i have your book?
Cryptography and network security by Behrouz A Forouzan
DES=Data Encryption Standard(not system)
Sir please or bhi subject pe vedio banao
Bro decryption ke liye A ki private key kyu use kr rahe ho...how B is getting A's private key?
Bro final year bca how to get placement bro
*Public key aur Private key* me relation HOTA hoga tabhi to Private key public key se *encrypted* msg ko *decrypt* kr pati h 🤫🤫🤫
To hm public key se *Private Key* drive nhi kr skte kya ? 🤘🤘🤘
Hello Bhai! Can you share your notes pdf?
anybody have notes of this total playlist
Doubt: You said a msg that is encrypted by a public key can only be decrypted by using a private key and vice versa. That means two different keys are necessary, right?
So what is use of Symmetric cryptography then? You just said I cannot use the same key for both encryption and decryption.
Please clarify this, anyone!
That is applicable only for asymmetric key Cryptography
" the public and private key concept "
And in symmetric key Cryptography
We will use the same key for Encryption and decryption
@@AbhishekSharmaDit In symmetric can it be either of public or private key? Are there any rules for that?
@@debjitpaul8580 there is no public or private key concept in symmetric key Cryprtography
Key can be anything (generally any sequence of characters)
Like key can be "absd@1hj"
Or it can even be your name
Hope doubt is clear now !!
Follow the series
U will get your doubts cleared
Notes download kaise kare
Agr A side se public(A) key se message encrypt kiya to B ke end pe private (A) key se message decrypt karna hoga...but private key to A ke pass hi rahegi...fir B kaise decrypt karega?
A apni nahi
B ki public key se Encryption karega
So that B apni private key ko use karke info decryption kar sake
Baki if you will follow my playlist
U will get everything
Sab doubts apne aap clear ho jayenge
So i would recommend playlist follow karo
Sab bahot ache se samajh aa jayega 😊
Now it's perfect 😊👍
aapke notes provide krate hai kya
Can you please give us the notes pdf
can you share the pdf of notes
thanks in advance
great content
Hello Sir,
Can you please share the pdf file for these lectures?
Sir Can you please provide the handwritten pdf of whole lecture.
Write it on paper,why troubling sir?🤬
Oy help milti h usme troubling ni khte h ... Pdf provide krne m ky ho ra h
... Pdf hmehsa kam aaate h
Can you see? yes you can see 😂👍