Stream Cipher ll Information and Cyber Security ll Explained with Example in Hindi

Поделиться
HTML-код
  • Опубликовано: 17 окт 2024
  • Myself Shridhar Mankar a Engineer l RUclipsr l Educational Blogger l Educator l Podcaster.
    My Aim- To Make Engineering Students Life EASY.
    Website - 5minutesengine...
    5 Minutes Engineering English RUclips Channel - / @5minutesengineeringen...
    Instagram - www.instagram....
    A small donation would mean the world to me and will help me to make AWESOME videos for you.
    • UPI ID : 5minutesengineering@apl
    Playlists :
    • 5 Minutes Engineering Podcast :
    • 5 Minutes Engineering ...
    • Aptitude :
    • Aptitude
    • Machine Learning :
    • Machine Learning
    • Computer Graphics :
    • Computer Graphics
    • C Language Tutorial for Beginners :
    • C Language Tutorial fo...
    • R Tutorial for Beginners :
    • R Tutorial for Beginners
    • Python Tutorial for Beginners :
    • Python Tutorial For Be...
    • Embedded and Real Time Operating Systems (ERTOS) :
    • Embedded and Real Time...
    • Shridhar Live Talks :
    • Shridhar Live Talks
    • Welcome to 5 Minutes Engineering :
    • Welcome To 5 Minutes E...
    • Human Computer Interaction (HCI) :
    • Human Computer Interac...
    • Computer Organization and Architecture :
    • Computer Organization ...
    • Deep Learning :
    • Deep Learning
    • Genetic Algorithm :
    • Genetic Algorithm
    • Cloud Computing :
    • Cloud Computing
    • Information and Cyber Security :
    • Information And Cyber ...
    • Soft Computing and Optimization Algorithms :
    • Soft Computing And Opt...
    • Compiler Design :
    • Compiler Design
    • Operating System :
    • Operating System
    • Hadoop :
    • Hadoop
    • CUDA :
    • CUDA
    • Discrete Mathematics :
    • Discrete Mathematics
    • Theory of Computation (TOC) :
    • Theory Of Computation ...
    • Data Analytics :
    • Data Analytics
    • Software Modeling and Design :
    • Software Modeling And ...
    • Internet Of Things (IOT) :
    • Internet Of Things (IOT)
    • Database Management Systems (DBMS) :
    • Database Management Sy...
    • Computer Network (CN) :
    • Computer Networks (CN)
    • Software Engineering and Project Management :
    • Software Engineering A...
    • Design and Analysis of Algorithm :
    • Design And Analysis Of...
    • Data Mining and Warehouse :
    • Data Mining and Warehouse
    • Mobile Communication :
    • Mobile Communication
    • High Performance Computing :
    • High Performance Compu...
    • Artificial Intelligence and Robotics :
    • Artificial intelligenc...

Комментарии • 94

  • @wahajmubeen9376
    @wahajmubeen9376 2 года назад +12

    What a gem this man is! Brilliant.

  • @GalaxyRNC
    @GalaxyRNC 4 года назад +3

    Cha gaye guruji
    kya padhaate hain aap.. maza aa gaya !

  • @ZeeAas
    @ZeeAas 9 месяцев назад +1

    your method of teaching is so nice and short that everyone can easily understand

  • @ashutoshbhandari1975
    @ashutoshbhandari1975 Год назад +4

    The most comprehensive explanation! Excellent!

  • @shwetathorat4364
    @shwetathorat4364 9 месяцев назад +1

    Superb example sir... I'm trying another one. Excellent 👍

  • @swatiaryaa9268
    @swatiaryaa9268 9 месяцев назад +1

    Sir the way u explain is more impressive......❤❤

  • @sreelakshmimenon8
    @sreelakshmimenon8 5 лет назад +6

    kaafi acha aur easy way me explain kiya...thank you for uploading this video...

  • @nomansyt
    @nomansyt 2 года назад +2

    Thankyou for making videos for CSE/IT students

  • @pranavsinha1334
    @pranavsinha1334 8 месяцев назад +1

    Badhiya Video tha sir.

  • @ShoubhikSadhu
    @ShoubhikSadhu 3 года назад +1

    Sir bohot badiya tarike se explain kiye hai aap.

  • @chinmaykulkarni6656
    @chinmaykulkarni6656 5 лет назад +6

    Do does the length of key depend upon the length of the message? And the key stream generator algorithm should be the same at sender's and receiver's side?

  • @ganesh9446
    @ganesh9446 4 года назад +4

    Love you broo from Karnataka thanks for the tutorial

  • @EraserNum10
    @EraserNum10 2 года назад +1

    Great information within a 5 minutes vdo ♥️

  • @jubinrajnirmal9291
    @jubinrajnirmal9291 4 года назад +3

    Very helpful but how is the same key generated on the receiver's side? They must pre-share the key before the transmission of message right?

  • @Animalsfacts165
    @Animalsfacts165 4 года назад +1

    Love for ur effort n wellwishes from pakistan.

  • @033prateeksingh4
    @033prateeksingh4 3 года назад +2

    Bruh u are just amazing.Keep up the good work.

  • @MonojitBarua
    @MonojitBarua Год назад +1

    During decryption time you have taken the same key (like encryption). But what if the decryption-side key generator generates a key which is not the same as the encryption-side key then how come the decryption will happen?

  • @muhammadahsan7414
    @muhammadahsan7414 4 года назад +3

    Good job sir, please keep it up!.........thanks a lot for uploading such videos!!!!

  • @alihassankhanyousafzai
    @alihassankhanyousafzai 4 года назад

    Love you bro bht acha samjhaya apne.......

  • @hum__shyam
    @hum__shyam 4 года назад +4

    Sir! is that "key stream generator" generate same key for the sender and receiver?? 🤔

  • @pixelisticgaming
    @pixelisticgaming 4 года назад +1

    How key is generated? It will given already or should be generated?

    • @aisakyunhotahai8130
      @aisakyunhotahai8130 4 года назад +1

      You will be given an Initial key, which will be passed to a Key generator function, and then the stream of keys will be obtained.

  • @husnainalishah7628
    @husnainalishah7628 4 года назад

    Good love u bhai 1 bar main hi smjh agya love u

  • @muhammadahsan7414
    @muhammadahsan7414 4 года назад +1

    excuse me, sir, what is the keystream generator?? where it lies?? how does it work??

  • @ayanghosal3808
    @ayanghosal3808 3 года назад

    ekdam barabar 👍

  • @AllinOne-nj6zk
    @AllinOne-nj6zk 5 лет назад +1

    Bahot sahi explanation

  • @PournimaBhuyar-vg7cf
    @PournimaBhuyar-vg7cf Год назад

    It was really helpful sir !!

  • @chewdiepie1738
    @chewdiepie1738 Год назад

    thanks man , was very easy to understand

  • @hanishvenkat9496
    @hanishvenkat9496 5 месяцев назад

    well explained sir

  • @brijeshgaud3196
    @brijeshgaud3196 5 лет назад +2

    20k sub Congo😎😎😎

  • @ravinderpartapsingh7792
    @ravinderpartapsingh7792 5 лет назад +2

    if at the receiver side the stream key generator generate different keys which are not equal to sender side keys then what will happened ??? plz explain me

    • @my_simple_vlog
      @my_simple_vlog 5 лет назад

      I have same doubt!

    • @Vegeta_Sama311
      @Vegeta_Sama311 4 года назад

      Kis University se ho bhai?

    • @jithu1700
      @jithu1700 4 года назад

      Buddy if symmetric encryption is used then the same keys are shared between the sender and receiver. In case of asymmetric encryption the private key will be already available with the receiver. Hope it is clear now!

  • @SaileeShingare
    @SaileeShingare 3 года назад

    Nice explanation. Thank you sir

  • @rishabhraj8497
    @rishabhraj8497 5 лет назад +1

    Love you Sir😍

  • @saweranadeem2040
    @saweranadeem2040 2 года назад

    JAZAK ALLAH SIR

  • @zarasafdar7734
    @zarasafdar7734 2 года назад

    Zabrdast

  • @arpitaanasane3026
    @arpitaanasane3026 5 лет назад +1

    Pdhne m pressure nai aa rha hai sir... credit goes to u

    • @AyushSharma-fg9hm
      @AyushSharma-fg9hm 5 лет назад +1

      Pressure nai aa rha to kayam churan khaiye aa jayega😂😂😂

  • @sumitchakrawarti2116
    @sumitchakrawarti2116 5 лет назад +1

    Thanku sir you are great

  • @muhammadahsan7414
    @muhammadahsan7414 4 года назад +2

    excuse me, sir, how can we represent data in bits?? do we manually do this or there is an algorithm??

    • @cheshmashahi9182
      @cheshmashahi9182 3 года назад

      Yes I also want to know how ??

    • @akarshkumar2171
      @akarshkumar2171 2 года назад

      He is just giving an example. To convert data into bits, there can be any algorithm. Eg: Convert char or numbers into Ascii value and then do XOR at bit level and then send these bits as cipher text.

  • @AKHILDS-j3v
    @AKHILDS-j3v 5 лет назад

    You are awesome....😍😍😍thnx sir

  • @KickKraze2023
    @KickKraze2023 6 месяцев назад

    thanks for help

  • @altamassmith4402
    @altamassmith4402 4 года назад

    Very very good sir

  • @HarshPatel-uj7dh
    @HarshPatel-uj7dh 2 года назад

    Great work

  • @khilosiyakomal2874
    @khilosiyakomal2874 4 года назад

    thn youis it proved useful for me on the time...

  • @63bankardipak38
    @63bankardipak38 Год назад

    Thank you sir

  • @shrutishukla2508
    @shrutishukla2508 4 года назад

    Sir ye bit kha se ayi isme agr shridhar ki jgh koi or naam ho to ya kuch likha ho to hm ko bit ke bare me kese pta chalega ki msg ko bit me kese change krenge ?

    • @aisakyunhotahai8130
      @aisakyunhotahai8130 4 года назад

      you will be already given the binary message, no conversions will be asked😊

  • @Nova8739
    @Nova8739 26 дней назад

    Kal exam ha thank you sir😢

  • @sabashoukat5575
    @sabashoukat5575 4 года назад

    sir hr bit pa jo key apply hogi kia wo b different hogi????? ya same hogi??

    • @jithu1700
      @jithu1700 4 года назад

      It depends on the key. Usually keys are some random bits which is properly synced between sender and receiver.

  • @muslimwazaef1334
    @muslimwazaef1334 Год назад

    Thanks Sir👍

  • @ManishKumar-kx7yc
    @ManishKumar-kx7yc 3 года назад

    Great 👌

  • @ZeeAas
    @ZeeAas 9 месяцев назад

    please make more videos

  • @shashantchaudhary5636
    @shashantchaudhary5636 4 года назад

    Sir kya ap buffer overflow attack pr ek vdo bna skte hee

  • @ss8273
    @ss8273 Год назад

    thankyou sir

  • @namankumargarg4827
    @namankumargarg4827 4 года назад +1

    how does the same set of bits are generated at both the sender end and reciever end?

    • @Sahil-xo5en
      @Sahil-xo5en 2 года назад

      There is a algorithm on both sides that adds the keys or receiver Already knows the key.

  • @rockydeshmukh2943
    @rockydeshmukh2943 2 года назад

    Thanks

  • @ankitakadam8991
    @ankitakadam8991 3 года назад

    thank you

  • @muhammadahsan7414
    @muhammadahsan7414 4 года назад +3

    excuse me, sir, do we generate key bits manually?

  • @nazarmohammadziarmal3941
    @nazarmohammadziarmal3941 5 лет назад

    superb sir i am really impressed the way you explaining

  • @fixyou8526
    @fixyou8526 3 года назад

    Vai Ap kis pe ENGINEERING kiya ho?

  • @priyankabiswas7411
    @priyankabiswas7411 5 лет назад +1

    Shridhar ka binary code aya kaha se?

  • @accidentalGamer69
    @accidentalGamer69 5 лет назад

    thank you so much

  • @rajasachin5600
    @rajasachin5600 5 лет назад +1

    key generator may generate different key at receiver end, then???

    • @abhineetsagar
      @abhineetsagar 5 лет назад

      Makaut ka exam h ky? Mujhe bhi yehi doubt h

    • @jithu1700
      @jithu1700 4 года назад +1

      Buddy if symmetric encryption is used then the same keys are shared between the sender and receiver. In case of asymmetric encryption the private key will be already available with the receiver. Hope it is clear now!

  • @Signature77
    @Signature77 5 лет назад

    Thank U !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!

  • @darahaas15
    @darahaas15 2 года назад

    🔥

  • @sairayaqub6091
    @sairayaqub6091 4 года назад

    How we can generate the key in Stream Cipher?

  • @RitikSingh-xe2zj
    @RitikSingh-xe2zj Год назад

    Darmeyan word is compulsory

  • @bhataasim
    @bhataasim 6 месяцев назад

    Watch in 1.25 You will feel it

  • @muhayminuddin9368
    @muhayminuddin9368 3 года назад

    bhai rc4 banao xam hai jaldi aaj ich banao

  • @SK-mt2wb
    @SK-mt2wb Год назад

    mashallah

  • @trockskahlon
    @trockskahlon 3 года назад

    👍🏻

  • @Amisha21298
    @Amisha21298 6 месяцев назад

    ❤❤❤❤❤❤❤❤

  • @shivprajapati454
    @shivprajapati454 5 лет назад +11

    Shidhar ko binary mai encode kaise kiya WO to btaya nahi .this is the partial explaination .

    • @hirakmondal6174
      @hirakmondal6174 5 лет назад +5

      Its just an example that he has taken, if you want to convert some alphabet into binary go with *ASCI*

  • @harishkumar9180
    @harishkumar9180 3 года назад

    Looks like Rohit Sharma 🤔 hai na

  • @gagankaur8254
    @gagankaur8254 4 года назад

    Can we also use OR truth table for this type of algorithm?

    • @jithu1700
      @jithu1700 4 года назад

      No buddy. You can't use OR operation in Encryption because you won't be able to retrieve back original message!

  • @rahulojha2599
    @rahulojha2599 5 лет назад

    please sir upload compiler and hci please books are not available please.

  • @swagatochakraborty6043
    @swagatochakraborty6043 4 месяца назад

    BIT SPECIFIC
    BITWISE XOR

  • @kalaakaarai
    @kalaakaarai 5 лет назад

    Copy of technical guru ji

  • @ZeeAas
    @ZeeAas 9 месяцев назад

    thank you sir