Stream Cipher ll Information and Cyber Security ll Explained with Example in Hindi
HTML-код
- Опубликовано: 17 окт 2024
- Myself Shridhar Mankar a Engineer l RUclipsr l Educational Blogger l Educator l Podcaster.
My Aim- To Make Engineering Students Life EASY.
Website - 5minutesengine...
5 Minutes Engineering English RUclips Channel - / @5minutesengineeringen...
Instagram - www.instagram....
A small donation would mean the world to me and will help me to make AWESOME videos for you.
• UPI ID : 5minutesengineering@apl
Playlists :
• 5 Minutes Engineering Podcast :
• 5 Minutes Engineering ...
• Aptitude :
• Aptitude
• Machine Learning :
• Machine Learning
• Computer Graphics :
• Computer Graphics
• C Language Tutorial for Beginners :
• C Language Tutorial fo...
• R Tutorial for Beginners :
• R Tutorial for Beginners
• Python Tutorial for Beginners :
• Python Tutorial For Be...
• Embedded and Real Time Operating Systems (ERTOS) :
• Embedded and Real Time...
• Shridhar Live Talks :
• Shridhar Live Talks
• Welcome to 5 Minutes Engineering :
• Welcome To 5 Minutes E...
• Human Computer Interaction (HCI) :
• Human Computer Interac...
• Computer Organization and Architecture :
• Computer Organization ...
• Deep Learning :
• Deep Learning
• Genetic Algorithm :
• Genetic Algorithm
• Cloud Computing :
• Cloud Computing
• Information and Cyber Security :
• Information And Cyber ...
• Soft Computing and Optimization Algorithms :
• Soft Computing And Opt...
• Compiler Design :
• Compiler Design
• Operating System :
• Operating System
• Hadoop :
• Hadoop
• CUDA :
• CUDA
• Discrete Mathematics :
• Discrete Mathematics
• Theory of Computation (TOC) :
• Theory Of Computation ...
• Data Analytics :
• Data Analytics
• Software Modeling and Design :
• Software Modeling And ...
• Internet Of Things (IOT) :
• Internet Of Things (IOT)
• Database Management Systems (DBMS) :
• Database Management Sy...
• Computer Network (CN) :
• Computer Networks (CN)
• Software Engineering and Project Management :
• Software Engineering A...
• Design and Analysis of Algorithm :
• Design And Analysis Of...
• Data Mining and Warehouse :
• Data Mining and Warehouse
• Mobile Communication :
• Mobile Communication
• High Performance Computing :
• High Performance Compu...
• Artificial Intelligence and Robotics :
• Artificial intelligenc...
What a gem this man is! Brilliant.
Cha gaye guruji
kya padhaate hain aap.. maza aa gaya !
your method of teaching is so nice and short that everyone can easily understand
The most comprehensive explanation! Excellent!
Superb example sir... I'm trying another one. Excellent 👍
Sir the way u explain is more impressive......❤❤
kaafi acha aur easy way me explain kiya...thank you for uploading this video...
Thankyou for making videos for CSE/IT students
Badhiya Video tha sir.
Sir bohot badiya tarike se explain kiye hai aap.
Do does the length of key depend upon the length of the message? And the key stream generator algorithm should be the same at sender's and receiver's side?
Love you broo from Karnataka thanks for the tutorial
Great information within a 5 minutes vdo ♥️
Very helpful but how is the same key generated on the receiver's side? They must pre-share the key before the transmission of message right?
Exactly. I'm having this same doubt
Love for ur effort n wellwishes from pakistan.
Bruh u are just amazing.Keep up the good work.
During decryption time you have taken the same key (like encryption). But what if the decryption-side key generator generates a key which is not the same as the encryption-side key then how come the decryption will happen?
Good job sir, please keep it up!.........thanks a lot for uploading such videos!!!!
Love you bro bht acha samjhaya apne.......
Sir! is that "key stream generator" generate same key for the sender and receiver?? 🤔
Yes
How key is generated? It will given already or should be generated?
You will be given an Initial key, which will be passed to a Key generator function, and then the stream of keys will be obtained.
Good love u bhai 1 bar main hi smjh agya love u
excuse me, sir, what is the keystream generator?? where it lies?? how does it work??
ekdam barabar 👍
Bahot sahi explanation
It was really helpful sir !!
thanks man , was very easy to understand
well explained sir
20k sub Congo😎😎😎
if at the receiver side the stream key generator generate different keys which are not equal to sender side keys then what will happened ??? plz explain me
I have same doubt!
Kis University se ho bhai?
Buddy if symmetric encryption is used then the same keys are shared between the sender and receiver. In case of asymmetric encryption the private key will be already available with the receiver. Hope it is clear now!
Nice explanation. Thank you sir
Love you Sir😍
JAZAK ALLAH SIR
Zabrdast
Pdhne m pressure nai aa rha hai sir... credit goes to u
Pressure nai aa rha to kayam churan khaiye aa jayega😂😂😂
Thanku sir you are great
excuse me, sir, how can we represent data in bits?? do we manually do this or there is an algorithm??
Yes I also want to know how ??
He is just giving an example. To convert data into bits, there can be any algorithm. Eg: Convert char or numbers into Ascii value and then do XOR at bit level and then send these bits as cipher text.
You are awesome....😍😍😍thnx sir
thanks for help
Very very good sir
Great work
thn youis it proved useful for me on the time...
Thank you sir
Sir ye bit kha se ayi isme agr shridhar ki jgh koi or naam ho to ya kuch likha ho to hm ko bit ke bare me kese pta chalega ki msg ko bit me kese change krenge ?
you will be already given the binary message, no conversions will be asked😊
Kal exam ha thank you sir😢
sir hr bit pa jo key apply hogi kia wo b different hogi????? ya same hogi??
It depends on the key. Usually keys are some random bits which is properly synced between sender and receiver.
Thanks Sir👍
Great 👌
please make more videos
Sir kya ap buffer overflow attack pr ek vdo bna skte hee
thankyou sir
how does the same set of bits are generated at both the sender end and reciever end?
There is a algorithm on both sides that adds the keys or receiver Already knows the key.
Thanks
thank you
excuse me, sir, do we generate key bits manually?
superb sir i am really impressed the way you explaining
Vai Ap kis pe ENGINEERING kiya ho?
Shridhar ka binary code aya kaha se?
just assumed
thank you so much
key generator may generate different key at receiver end, then???
Makaut ka exam h ky? Mujhe bhi yehi doubt h
Buddy if symmetric encryption is used then the same keys are shared between the sender and receiver. In case of asymmetric encryption the private key will be already available with the receiver. Hope it is clear now!
Thank U !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
🔥
How we can generate the key in Stream Cipher?
Same question
Darmeyan word is compulsory
Watch in 1.25 You will feel it
bhai rc4 banao xam hai jaldi aaj ich banao
mashallah
👍🏻
❤❤❤❤❤❤❤❤
Shidhar ko binary mai encode kaise kiya WO to btaya nahi .this is the partial explaination .
Its just an example that he has taken, if you want to convert some alphabet into binary go with *ASCI*
Looks like Rohit Sharma 🤔 hai na
Can we also use OR truth table for this type of algorithm?
No buddy. You can't use OR operation in Encryption because you won't be able to retrieve back original message!
please sir upload compiler and hci please books are not available please.
BIT SPECIFIC
BITWISE XOR
Copy of technical guru ji
thank you sir