TYPES OF CRYPTOGRAPHY | Symmetric Cryptography, Asymmetric Cryptography and Hashing
Vložit
- čas přidán 7. 09. 2019
- Hello friends! Welcome to my channel.My name is Abhishek Sharma.
In this video, I have explained the concept of Types Of Cryptography. There are 3 types of cryptography:
1. Symmetric Cryptography
2. Asymmetric Cryptography
3. Hashing Cryptography
#abhics789
If you learned something new do like and share this video with your friends and don't forget to subscribe to my channel :)
#TypesOfCryptography #Symmetric #Asymmetric #hashing
There are lectures related to different subjects on this channel.Do check them out, guys.
Link is given below:
computer graphics:
• Computer Graphics
engineering economics:
• Engineering Economics
Cryptography :
• Cryptography and netwo...
.Net C# :
• .NET C#
Pointers in C :
• Pointers in C
Linked List for Interviews :
• Linked List for interv...
Java Tricky videos/programs for interviews :
• Java tricky programs/v...
File Handling in C :
• FILE Handling in C
pointers playlist:
• Pointers in C
C Programming tips and tricks:
• C tricky programs/videos
Can u provide subtitles I'm know telugu and English
Some Cryptography videos in English
czcams.com/play/PL9FuOtXibFjWY-zqhun5kRgXdR_W9cpSB.html
@@AbhishekSharmaDit bro can i get all the notes in pdf format.
im watching the series to understand the concepts but i only have 1 month for semester exam could you provide the notes in pdf format
S please
You can watch videos of telugu cryptographers
@@mayankverma8925 its 1 yr back msg😂
Asymmetric and symmetric encryption are two primary techniques used to secure data. Symmetric encryption uses the same key for both encryption and decryption, while asymmetric encryption uses a pair of keys: a public key for encryption and a private key for decryption.
Today is my exam 😅
Awesome video lecture thankyou so much sir bahut help kiya ye video bahut se bhi jyada 🙏❤️🥰😊👍
Tomorrow my exam 🤞🏻
Doubts clear ho gye apki video se amazing video
Totally appreciated❤😊, Thank you bro
Cryptography...is a new subjevt for me now....but i sure your video will help me much...cozz you explained everything....in a nice way❤️👍🏻...thanku
Bhai , you video lecture is more supportive for me . So Thanks a lot bhai .
thanks for making such an understandable Videos for us, you made it very easy for us.
Thank you so much sir it's interesting 👌👌
This is very helpful , thank you
Very Nice Explanation.
Nice explain
Thanks a lot for this video. It is very useful for me .
Superrr brooo❤ well said I got full clarity on topic 😊😊😊 tq u bro
Good explanation sir best of luck
Thank you bhaiya ji
very well explained
very excellent Abhishek Bhai
Awesome❤
Thanks a lot, it is really helping
Thanks for such a fabulous lesson and content. And if you don't mind brother Could you share your notes please?
Bahut badhiya samjhaya aapne sir....
Agar aap apne ye notes provide kar dete to or achha ho jaata hamare liye....🙏🙏🙏
Thnx sir
thank You bhaiya!!!
thanks a lot
This is the best explanation video for me love you bhai
Jai hind
based on advanced encryption standard if c={74} instead of c={63}in s box construction, find a value for the position 78 in the sbox
bhaiya, i didnt get this point as u said asymmetric encryption keliye koi bhi "key" use kar sakte ho
so if we use private key (A) for encryption i.e the plain text is converted to cipher text and the attacker or any 3rd party can decrypt it using public key as it known to whole world. Whats the use of this method and it doesnt make any sense?
can u pls brief on this for clarifying it properly
DES stands for Data Encryption Standard
please correct it
Thankyou so much!
your the best person sir kindly make make course in Quantum Cryptography Complete Course please
Nice explanation 😇👍
Thank you so much sir ❤
Truly amazing work brother❤️, but please provide the PDFs of those notes like stuff you had in your video..
Thank you 🔥💯
Very useful 😊🙏🌻
Helpful🙏
Superb sir👌👌
Thanks yaar kal exam hai pr samajh nahi aa raha tha syllabus but aapke videos dekhke samajh aa rahi h Thankyou so much 👍👍👍👍
Bro you're great 👏👍,
Thnks sir
Mashallah kaa chalatha hoo ab thanks bhai
Bro can you provide notes of this series..?
Thnks for this awesome video...👍
how you capture like this ? which camera stand u use ?
Ur handwriting 😩😩was awesome ❤
Every videos are very good 👍. If you plz share a pdf document of your notes that will be more attractive
Awesome
Nice job sir thank you blowwish algorithm pr vedio bnye pls
Thank you soo much😍
Tnx sir
Love it 🥰
Bro mst 👌👌👌
Sir aisa hi video aur bhi aage bnaye ye meri request hai aapse
Good👍
Sir , u said ki
1. public key se encryption karenge to private key se hi decrypt kar sakte h aur vice versa par fir symmetric cryptography me same key kaise use hota h fir? Ya ye rule sirf asymmetric k liye hi hai
2.Aur symmetric cryptography me private key use krte h ya public?
Please clear my doubt
Can you please share the book name you refer in your videos of cryptography
Symmetric ma jab key b internet sae share hoga . Attacker Key le k decrypt nahi karsakhta ha??
message can only be encrypted using public key of receiver and decrypted by private key of receiver.
Super
Love you sir
Sir me bitcoin keys ke baare me kuch puchna chahta hu key ke type ki phle kis kis trh ki key aaya krti thi
Kindly share some videos on implementation.
5:26 Apni public aur *private key* kese Pta kre ye device vise hoti h ya app vise ???
(how to attack a classical cipher using known partial plaintext? ) bhai isko explain kar do
Great content sir,
can you please provide a pdf of these notes
bro pls provide the notes in pdf format for us ...it will be very helpfull.
Can u plz explain model of conventional cryptosystem
Bro decryption ke liye A ki private key kyu use kr rahe ho...how B is getting A's private key?
Where can we find the pdf of ur notess
Please reply
Sir can we get pdf of your notes ......so that it will be very much usefull for us !
Sir ,
information systems analysis designs k notes ki vdeo bna do.
🔥🔥🔥🔥🔥🔥
🎉
Form where do the key 1 and key 2 come from???
Brother explain about secret key,public key and message digest.
Asslam u alaikum Sir
Aik question hai kindly answer krdy
Question:
IT Security
Personnel Security
Physical Security
Operational Security
Into which of these would you put the following, justify your choice?
Enforcing hard-to-guess passwords
Encrypting your hard drive
Looking sensitive documents in a safe
Stationing a marine guard outside an embassy
Assigning security clearances to staffers
Using SSL for data transfer
Having off-site backup of documents
Plzzz sir i request you iska answer bta dy plzzzz
Sir please or bhi subject pe vedio banao
Bro can u pls share the notes that u hve explained
iska encryption methode kya hoga?
please upload the notes in pdf forms and provide the link ,your lecture are awesome ❤️❤️
@Beelzebub bas y hi engineering k chutiyapa h bhai merko smjh nhi aata jab sikhna nhi toh pd q rhe h in subjects ko kisko dikhane k liye pad re yr apn😂
@Beelzebub 😂
please make pdf of notes and provide a link that would be really helpful
Hey, can you provide your notes as well
Hello Sir,
Can you please share the pdf file for these lectures?
Rootkit aur attacker hijacking kr bare me vedio bnaye sir aap
Bro final year bca how to get placement bro
aapke notes provide krate hai kya
Hello Bhai! Can you share your notes pdf?
Notes download kaise kare
can uh share your hand written notes with us???? ..😊
anybody have notes of this total playlist
5:39 Private Key device ke inbuilt hidden rhti h ya hm usko dekh skte h ???
Dekh skte h >to> share kr skte
Share kr skte h to *HACK bhi to kr skte h* 😛😛😛
Doubt: You said a msg that is encrypted by a public key can only be decrypted by using a private key and vice versa. That means two different keys are necessary, right?
So what is use of Symmetric cryptography then? You just said I cannot use the same key for both encryption and decryption.
Please clarify this, anyone!
That is applicable only for asymmetric key Cryptography
" the public and private key concept "
And in symmetric key Cryptography
We will use the same key for Encryption and decryption
@@AbhishekSharmaDit In symmetric can it be either of public or private key? Are there any rules for that?
@@debjitpaul8580 there is no public or private key concept in symmetric key Cryprtography
Key can be anything (generally any sequence of characters)
Like key can be "absd@1hj"
Or it can even be your name
Hope doubt is clear now !!
Follow the series
U will get your doubts cleared
Can i get the notes??
Can you please give us the notes pdf
Notes upload krdo bhai!
& Sir please can you give me handwritten notes pdf ..
.and plz reply me as soon as possible 🙏
pdf available hain kya
7:41 doubt : you said message will be decrypted using private key of A( sender) , but how will B (recipient) have A's private key .
Clearify this .😐
This is incorrect... Private key of reciever tht is b
hey your playlist is really good and useful, Can i have your book?
Cryptography and network security by Behrouz A Forouzan