1 - Cryptography Basics

Поделиться
HTML-код
  • Опубликовано: 4 янв 2025

Комментарии • 13

  • @amirtamang1488
    @amirtamang1488 4 месяца назад +3

    plz do not stop uploading videos.

  • @tasapornvisawameteekul6045
    @tasapornvisawameteekul6045 2 года назад +5

    Thanks for this great series. All videos illustrate the basic very well. Help me a lot for my cybersecurity class.

    • @srushtibhagwat4690
      @srushtibhagwat4690 11 месяцев назад

      Which cyber security class do you join? And do you get a job after completing it ?

  • @helloparviz
    @helloparviz Месяц назад

    superb! concise & fluent. thank you.

  • @raihanz867
    @raihanz867 5 месяцев назад +1

    good course, this is a rare course in youtube

  • @satishkarki3020
    @satishkarki3020 4 года назад +1

    Great Content!!!!!

  • @iamacoder8331
    @iamacoder8331 Год назад +1

    good content

  • @raiden631
    @raiden631 4 месяца назад +1

    Very informative ! Thank you very much ! :)

  • @FrancoisHarnist
    @FrancoisHarnist 8 месяцев назад

    Thank you for this course!

  • @mmnahian
    @mmnahian Год назад

    great

  • @blenderbottle382
    @blenderbottle382 2 года назад +1

    Really nice video. In HMAC, why do you need to hash both the key and the message? I thought about it and if you just hashed the key, then you can't verify the integrity of the message, and if you just hashed the message, you don't know if the message came from Alice. Is that correct? What if someone had the key in this symmetric algorithm? then they could still send a message hashing both their message and the key and the recipient wouldn't really know who it came from because this hacker had the same key and the recipient wouldn't know what the sender wanted to send originally.

    • @_uvop_
      @_uvop_ 7 месяцев назад

      i guess pgp can be code for strings but for files i guess RSA,AES are the best for files(correct me if am wrong)

  • @lakshanchamod1208
    @lakshanchamod1208 5 месяцев назад