You explain really well, just reduce the number of advertisements in between please, it breaks the concentration. Maybe you can put then all in the beginning and in the end
Thanks a ton for these lectures. It is helping me to understand the concept in a clear way. My university is following the book "Security in Computing" 5th edition by Charles P.Pfleeger. They are recommending us to read the book, which is really a boring thing for me. I am confused about which book you have followed and ignoring reading the suggested book from my university. Is it ok to just follow your lectures for exam preparation? I believe you can advise me in a better way. I just want to avoid reading books and still want to have good preparation by following your videos. Thank you. :)
Man, the video are very good, even a person from a different area can understand this clearly, and can you recommand me a good book on this topic of cryptography
Hey bro can you explain me the same thing given in the 7th edition there i have doubt in their orignal sequence number I m student from the same book but of 7th edition
Asslam u alaikum Sir Aik question hai kindly answer krdy Question: IT Security Personnel Security Physical Security Operational Security Into which of these would you put the following, justify your choice? Enforcing hard-to-guess passwords Encrypting your hard drive Looking sensitive documents in a safe Stationing a marine guard outside an embassy Assigning security clearances to staffers Using SSL for data transfer Having off-site backup of documents Plzzz sir i request you iska answer bta dy plzzzz
Key will not be given like this But if it happens then you can give more priority to that alphabet which occurs first in your word Example AXCC will become 1423
I think this is wrong because order should be according to key and you are taking cipher text as 1,2,3.....7 which is totally wrong. Cipher text must be as key order like-4(aodw) 3(tsuo) and so on. Please look into it otherwise students will get it wrong.
Hi , I love your teaching , is there any way to get then notes in pdf ??? would help immensely
Keep it up thanx for help in my mid term exam...
very well explained
You explain really well, just reduce the number of advertisements in between please, it breaks the concentration. Maybe you can put then all in the beginning and in the end
Tq bro.....all of your videos helped me a lot....God bless🙏🏻
Gud presentation
Awesome explaination
Thanks a ton for these lectures. It is helping me to understand the concept in a clear way. My university is following the book "Security in Computing" 5th edition by Charles P.Pfleeger. They are recommending us to read the book, which is really a boring thing for me. I am confused about which book you have followed and ignoring reading the suggested book from my university. Is it ok to just follow your lectures for exam preparation? I believe you can advise me in a better way. I just want to avoid reading books and still want to have good preparation by following your videos.
Thank you. :)
Do you have notes of these lectures can you pls share them if you have
@@neghatnazir1668 yes
@@vickymishra7908 notes ho to do
Pdf
Big Thanks brother ...🙏🙏🙏🙏
I love your teaching idea
Please explain decryption technique for these transposition techniques
In a row transportation what is interger value of key Aabhi..? number should not repeat right..?
Life savior 🙏
Nice explaination
much informative well done
Sir, we have to leave 1 space after each word in rail fence technique
thanks abhishek so helpful
Bro you are the best 🙌
Too good man ❤️
very nice video
Man, the video are very good, even a person from a different area can understand this clearly, and can you recommand me a good book on this topic of cryptography
I am referring Cryprtography and network security by Behrouz A Forouzan
And
Cryptography and network security by William Stallings
what about decryption process?
Separate video
Kyu maje le raha hai 😃😏
bhai cryptography ka playlist hai cryptanalysis ka nhi
Just reverse the word simple
I mean to say reverse the all the step you do
Great explanations
sir in the integer value, key: if the letters are repeated how are they numbered? as you said numbers cannot be repeated
i guess you wont get a key with same characters
thank you sir 😍😇
Hey bro can you explain me the same thing given in the 7th edition there i have doubt in their orignal sequence number I m student from the same book but of 7th edition
Asslam u alaikum Sir
Aik question hai kindly answer krdy
Question:
IT Security
Personnel Security
Physical Security
Operational Security
Into which of these would you put the following, justify your choice?
Enforcing hard-to-guess passwords
Encrypting your hard drive
Looking sensitive documents in a safe
Stationing a marine guard outside an embassy
Assigning security clearances to staffers
Using SSL for data transfer
Having off-site backup of documents
Plzzz sir i request you iska answer bta dy plzzzz
Which book you are using? Can you pls tell?
we do not need any key in in rail fence cipher right?
decryption bhi bata dete guruji to achha hota
Nice explanation....
Excellent
Key kaise likhe ho (integer) pls reply
Sir which book should be best, which includes entire subject topic of CNS
Cryptography and Network Security by Behrouz A. Forouzan
Great sir
Thank you
🔥
What if the key in row transposition has same alphabets eg: HELLO instead of CRYPTO
What is a letter with 2 same letter need to be encryoted for row transposition ? For eg ‘need’ , how to give values ?
While explaining row transformation how you decide to take key?
bhaiya decrypt kr ke original line kaise laye??
Bhai yeh notes pdf me share bhi krdete toh bht accha rhta.
Did you get the notes or you made yourself..?
For which exams will it be helpful??
Colleges exams and any competitive exam in which u have Cryprtography as a subject
@@AbhishekSharmaDit Can we get your notes pleaseeeeeeeee? :)
@@Mr_SSKhave you got the notes or you made?
@@Kk_2072 Yaar, ye sab na yaad dilao, vul chuka hoon mai ye sab boht mushkil se...
which book you are using?
I have a question. What is the difference between row transposition and columnar transposition?
both are same just different name I think..
It is also known as block transposition
In sab techniques ki decryption kha ha???
Abhishek Sharma is here man
what if key is like striipe so we will take same value for both i?
How to many real fence depth we can use
Bhai rotor machine pa bhi ak video bna dain
Bhai Isme.... discription process kaise hoga
I am studying this subject through your video not from my teacher , please upload the notes pdf.
How to solve if in the given key an alphabet is repeated in row transposition cipher?
Key will not be given like this
But if it happens then you can give more priority to that alphabet which occurs first in your word
Example AXCC will become 1423
Bro can you gives use the notes pdf...
This so helpfull for as...
If the key is stripes so what repition???
Respect sir university Student kindly make more course in Hindi in Urdu in Post Quantum Cryptography Please sir
Hello sir, In row transposition cipher why we get only 7 columns. Why not get the 6, 8 or 5.
Yes, I have same doubt?
What if we have 2 same letters in the key for ex key = CRACK in which there are 2 C's.
Or this is not possible n key will always have diff letters ?
In this case priority will be given to repeated alphabet that comes first like in this case CRACK will become 25134.
hi sir, how can we get your notes also, kindly give these notes for exam preparation it will help a lot
Have you got the pdf or you made notes..?
Treat due, if I passed in my upcoming semester exam
Bhaiya I need your advice.
Mere syllabus me DES topic se start hua hai to kya hum Substitution and transpositions technique skip kar de .
Karlo to better rahega
Warna jaha b substitution and transposition use hoga waha clear ni hoga ache se
@@AbhishekSharmaDit ok thanks for the advice
Hi Sir,
Can you please share pdfs of these notes. That will be really appreciated.
Thanks
Have you got the pdf or you made notes..?
Bro deception kaise. Hoga.
attack postponed by two hour? broken enigma ! || IMITATION GAME
Sir may I take your notes in PDF from
learn 2024 for mid term exam
If you have notes of all these lectures. Please share
bro mujhe bhi chahiye notes!!! tere paas ye notes hai toh bhej sakta hai pls🙏🙏🙏🙏
bro can you share notes if you have of crypto
i would be thankful of you
Which Book You will Be Used in this Lecture ?
sir can you please share notes ??
Please send your written notes also
Can you provide notes...
please give the notes than we understand better
book ka name batao bro.
Bro sare text ka ek PDF banaker send Kar do
Sir notes kii PDF bii chye sir
How to decrypt it
Book name? Jo video ma ha...
Cryptography and network security by behrouz a forouzan
Can you share written notes with us ?
Did you get the notes or you made yourself?
@@Kk_2072bro I cleared exam and got the job also 1.5 years of experience I have this is good channel you can make a notes by watching this videos
I have same book as u used😅😅
Which book?
please upload those notes T-T
Bhai notes hoto pdf me to discrimination link dedo
pls can you share the notes pls bro
i would be thankful of you
Bro Please Send the Notes
can i get your notes pdf
There is no information about hill cipher
We have a dedicated video on this topic. Check the cryptography playlist
Notes?
hey bro...plz share the notes pdf...
Did you get notes ? If yes can you please share
with me also🙏🙏🙏🙏
@@adityapatole9691did you make notes ?
please snap the notes by mob and upload it to drive
Did you get notes ? If yes can you please share
Did you get notes ? If yes can you please share with me also🙏🙏🙏🙏
Nooo
OWP+++
If you are not going to speak in english, please point out that in the title. You waste people's time.
You can find thousands of videos in English, but these all lectures only for Hindi or nearest language...
I think this is wrong because order should be according to key and you are taking cipher text as 1,2,3.....7 which is totally wrong. Cipher text must be as key order like-4(aodw) 3(tsuo) and so on.
Please look into it otherwise students will get it wrong.
How to decrypt