Cryptography

Sdílet
Vložit
  • čas přidán 16. 04. 2021
  • Network Security: Cryptography
    Topics discussed:
    1) Introduction to cryptography and the role of cryptography in security.
    2) Formal definition of cryptography and explanation with example.
    3) Need for encryption and decryption in cryptography with real-world examples.
    4) Importance of keys in cryptography.
    5) Types of cryptography for example.
    6) Symmetric cipher model and explanation.
    7) Explanation of unconditionally secure and computationally secure encryption schemes.
    Follow Neso Academy on Instagram: @nesoacademy (bit.ly/2XP63OE)
    Contribute: www.nesoacademy.org/donate
    Memberships: bit.ly/2U7YSPI
    Books: www.nesoacademy.org/recommende...
    Website ► www.nesoacademy.org/
    Forum ► forum.nesoacademy.org/
    Facebook ► goo.gl/Nt0PmB
    Twitter ► / nesoacademy
    Music:
    Axol x Alex Skrindo - You [NCS Release]
    #NetworkSecurityByNeso #Cryptography #NetworkSecurity

Komentáře • 81

  • @PlayWithAliiii
    @PlayWithAliiii Před 3 měsíci +19

    People are saying not repeating the same step will save viewer's time, but not everyone is as smart as you guys.... some people need different perspective to understand the concept..... grow upp guys and appreciate the creator instead of finding silly problems in this video

  • @pulse5863
    @pulse5863 Před 3 lety +53

    These lectures are amazingly helpful. Thank you so much sir 😩

  • @carmimweemba1907
    @carmimweemba1907 Před rokem +6

    Powerful lesson you've opened it up for me now i can understand this topic

  • @ViperDZac
    @ViperDZac Před 2 lety +6

    Loved the explaination! Thank you.

  • @TECHTUBERRj
    @TECHTUBERRj Před 3 lety +1

    Your All lectures are more informative

  • @Dr.Briefcase
    @Dr.Briefcase Před rokem +2

    Great lecture thank you

  • @michaelkamuyu5307
    @michaelkamuyu5307 Před 3 lety +4

    Very well put

  • @amrilsan9299
    @amrilsan9299 Před 4 měsíci

    that's more clear than my lecture does, thanks a lot sir

  • @karthikraja3795
    @karthikraja3795 Před rokem

    Well lectures thanks for ur explanation. ❤

  • @aliyumuhammad-nurudeen9259
    @aliyumuhammad-nurudeen9259 Před 9 měsíci

    Thank you for the lecture

  • @learninginstudentscafe7284

    Excellent

  • @malireddymanikumar1228

    Good explain..... Keep it up and gain users

  • @aniltodakar6449
    @aniltodakar6449 Před 5 měsíci

    Thanks for this video.

  • @learninginstudentscafe7284

    Very informative

  • @prernaarora2746
    @prernaarora2746 Před 2 lety +2

    Thanks a lot sir ❤️

  • @riteshsharma9838
    @riteshsharma9838 Před rokem +5

    Note : {cryptography deals with the Alot of mathematical terminology. The underlying mathematics is more important. So the keys are generated by the mathematical algorithms in order to deal with the cryptographic technique.}

  • @kunjpatel2450
    @kunjpatel2450 Před 3 lety +2

    informative video

  • @shashiraj1977
    @shashiraj1977 Před 2 lety +1

    best explanation

  • @sivakrishnagowrabathina5840

    Superb

  • @aishwaryadhandapani5435

    thanks a lot sir

  • @souradeepchakraborty7969

    too good!

  • @Anime_gaming2
    @Anime_gaming2 Před rokem

    My my bro amazing 😍

  • @karthilogan7547
    @karthilogan7547 Před 2 lety +1

    Nice bro

  • @avejessi4175
    @avejessi4175 Před 2 lety +10

    Starts at 0:40

  • @manmohan_pundir
    @manmohan_pundir Před 3 lety +1

    Thnkyu

  • @TECHTUBERRj
    @TECHTUBERRj Před 3 lety +4

    Sir plz complete entire course lecture.. As soon as possible.... Because sir we in 6th SEM and only watching your playlist.. Of whole video series..

  • @bishwajeetpandey1570
    @bishwajeetpandey1570 Před 2 lety +4

    How does the secret key distributed between sender and receiver.

  • @RajuKumar-jn1rd
    @RajuKumar-jn1rd Před 3 lety +5

    Sir can u make videos on object oriented programming

  • @DeepakKumar-nk3cv
    @DeepakKumar-nk3cv Před 3 lety +19

    I don't no why you not uploading data structure lectures.........

  • @TECHTUBERRj
    @TECHTUBERRj Před 3 lety +2

    Plz sir complete this course as soon as possible.. 🙏🙏

  • @bhagyarajubheemala343
    @bhagyarajubheemala343 Před 10 měsíci

    nice...

  • @shubhamjamdade7890
    @shubhamjamdade7890 Před rokem +1

    Thank you sir 😊

    • @Danielle2_
      @Danielle2_ Před rokem

      👆👆👆👆
      DM me for guidance and support

  • @technisaiharn2440
    @technisaiharn2440 Před rokem

    thanks alot it helpful

    • @Danielle2_
      @Danielle2_ Před rokem

      👆👆👆👆
      Dm me for guidance and support

  • @mildredmandawala1140
    @mildredmandawala1140 Před rokem

    Very helpful

    • @Danielle2_
      @Danielle2_ Před rokem

      👆👆👆👆👆
      Dm me for guidance and support

  • @devlarktech7762
    @devlarktech7762 Před rokem

    thank

  • @sjsjiwii3129
    @sjsjiwii3129 Před 2 lety

    Luv u ❤

  • @1UniverseGames
    @1UniverseGames Před 3 lety +1

    Don't have any programming based video for this explanation?

  • @PPVideos19
    @PPVideos19 Před 3 lety +1

    can you make video on mitre ck and att

  • @apratheep9140
    @apratheep9140 Před rokem

    Brain's 🧠🧠🧠 are heated

  • @ssudha2737
    @ssudha2737 Před 2 lety +7

    Sir/ mam it's really our pleasure to have such kind of who teaches super than our college faculty
    But a graduate students we have so many topics in the syllabus ehy don't you refer B. Tech (4-1) syllabus for this subject . Please do it so make more videos on various topics which are related to student's syllabus
    I hope you understand !!!

  • @5c1_ganesh5
    @5c1_ganesh5 Před rokem

    I passed my exam brother Tanq so much

    • @Danielle2_
      @Danielle2_ Před rokem

      👆👆👆👆
      Dm me for guidance and support

  • @anjankumar8687
    @anjankumar8687 Před rokem

    Watching the day before exam🥲

  • @apratheep9140
    @apratheep9140 Před rokem

    Use of Problems Project Use Through the Same Problems Levels Engryption Decryption

  • @VoteOne-vw4eb
    @VoteOne-vw4eb Před 8 měsíci

    DAMN❤❤

  • @pranayjitmahata841
    @pranayjitmahata841 Před 6 měsíci

    Key range and key size?

  • @anveshatagore542
    @anveshatagore542 Před 3 lety +12

    Please complete the DATA STRUCTURES lectures plz..

    • @rsingh6216
      @rsingh6216 Před 3 lety

      Sir said , stacks and queue are to be uploaded

    • @anveshatagore542
      @anveshatagore542 Před 3 lety

      @@rsingh6216 yes bro..But when ? They are saying the same to everyone. Its ok if they are not able to..cz i knw it takes a lot of time for them to do all these videos. I respect them. Just we can wait now..thats all we can do..

    • @rsingh6216
      @rsingh6216 Před 3 lety

      @@anveshatagore542 it's in my 2nd semester ,so only 3-4 months left for exam. I hope neso will upload all videos till that time.

    • @anveshatagore542
      @anveshatagore542 Před 3 lety

      @@rsingh6216 Hope so bro..

    • @rsingh6216
      @rsingh6216 Před 3 lety

      @@anveshatagore542 ok bro👍

  • @musasalaudeen9116
    @musasalaudeen9116 Před 6 měsíci

    Please who can guide on how to write cryptography algorithm?

  • @sayumisooriyaarachchi4847

    Voice 🤩🤩🤩🤩🤩

  • @gamerbijaygupta9698
    @gamerbijaygupta9698 Před rokem +1

    Very hard

  • @user-xk9qw5gj8t
    @user-xk9qw5gj8t Před 3 měsíci

    🙏🙏🙏🙏

  • @riteshsharma9838
    @riteshsharma9838 Před rokem

    you mean sender uses receiver's public key to encrypt the message and that encryption is only decrypted by receiver's private key

  • @shrutibadgujar8925
    @shrutibadgujar8925 Před 7 měsíci +1

    Can I get the ppt

    • @nesoacademy
      @nesoacademy  Před 7 měsíci

      www.nesoacademy.org/cs/11-cryptography-and-network-security/ppts

  • @gurunath71
    @gurunath71 Před 2 lety +3

    @nesoacademy admin,
    “ How RSA can defeat ‘ man in the middle attack’ you can use following scenario: Imagine a sender S wants to share a secret key K to the receiver R. What exactly the sender S has to send to the receiver R?

  • @aryangoel4893
    @aryangoel4893 Před rokem +1

    Unconditionally and computationally secure not clear.

  • @GeekyMan
    @GeekyMan Před 3 lety +23

    Presentation was very informative and well explained, but it was too much repetitive. For ex. the first 4mins of the video.

  • @apratheep9140
    @apratheep9140 Před rokem

    Schedule Scheme

  • @rishuuup
    @rishuuup Před rokem +1

    today is my mid sem exam😂😂🙂

  • @anushravishankar9741
    @anushravishankar9741 Před rokem +1

    Video length can be made shorter if the same topic is'nt repeated 15 times

    • @Danielle2_
      @Danielle2_ Před rokem

      👆👆👆👆👆
      Dm me for guidance and support

  • @laroycejordan3454
    @laroycejordan3454 Před 8 měsíci

    I DidntKnow That.

  • @x2ak
    @x2ak Před rokem

    bro why you shouting at me 🤣

  • @dhananjaybharati
    @dhananjaybharati Před rokem

    Man... You need to "really" study before you start making tutorial videos. I can't imagine how many viewers have left I'll informed after learning from this video.

  • @chiragsharma5835
    @chiragsharma5835 Před 9 měsíci +1

    you could have done better 😐

  • @keerthan657
    @keerthan657 Před rokem +1

    too much repeated concepts, just get to the point plz

  • @nitinoza8392
    @nitinoza8392 Před rokem

    Very poor content and only repetition of content

  • @apratheep9140
    @apratheep9140 Před rokem +2

    Input 🔣🔠🔣 Output