TYPES OF CRYPTOGRAPHY | Symmetric Cryptography, Asymmetric Cryptography and Hashing

Sdílet
Vložit
  • čas přidán 7. 09. 2019
  • Hello friends! Welcome to my channel.My name is Abhishek Sharma.
    In this video, I have explained the concept of Types Of Cryptography. There are 3 types of cryptography:
    1. Symmetric Cryptography
    2. Asymmetric Cryptography
    3. Hashing Cryptography
    #abhics789
    If you learned something new do like and share this video with your friends and don't forget to subscribe to my channel :)
    #TypesOfCryptography #Symmetric #Asymmetric #hashing
    There are lectures related to different subjects on this channel.Do check them out, guys.
    Link is given below:
    computer graphics:
    • Computer Graphics
    engineering economics:
    • Engineering Economics
    Cryptography :
    • Cryptography and netwo...
    .Net C# :
    • .NET C#
    Pointers in C :
    • Pointers in C
    Linked List for Interviews :
    • Linked List for interv...
    Java Tricky videos/programs for interviews :
    • Java tricky programs/v...
    File Handling in C :
    • FILE Handling in C
    pointers playlist:
    • Pointers in C
    C Programming tips and tricks:
    • C tricky programs/videos

Komentáře • 160

  • @Utubechannel009
    @Utubechannel009 Před 2 lety +18

    Can u provide subtitles I'm know telugu and English

    • @AbhishekSharmaDit
      @AbhishekSharmaDit  Před 2 lety +4

      Some Cryptography videos in English
      czcams.com/play/PL9FuOtXibFjWY-zqhun5kRgXdR_W9cpSB.html

    • @VISHALMISHRA-rz5nv
      @VISHALMISHRA-rz5nv Před rokem

      @@AbhishekSharmaDit bro can i get all the notes in pdf format.
      im watching the series to understand the concepts but i only have 1 month for semester exam could you provide the notes in pdf format

    • @Beautifulnature7842
      @Beautifulnature7842 Před rokem

      S please

    • @mayankverma8925
      @mayankverma8925 Před rokem +1

      You can watch videos of telugu cryptographers

    • @Utubechannel009
      @Utubechannel009 Před rokem +1

      @@mayankverma8925 its 1 yr back msg😂

  • @user-pv2gr3sm6y
    @user-pv2gr3sm6y Před 6 měsíci +10

    Asymmetric and symmetric encryption are two primary techniques used to secure data. Symmetric encryption uses the same key for both encryption and decryption, while asymmetric encryption uses a pair of keys: a public key for encryption and a private key for decryption.

  • @Bobby_00l7
    @Bobby_00l7 Před 6 měsíci +9

    Today is my exam 😅

  • @amankr9093
    @amankr9093 Před 2 lety

    Awesome video lecture thankyou so much sir bahut help kiya ye video bahut se bhi jyada 🙏❤️🥰😊👍

  • @gopalkumar9804
    @gopalkumar9804 Před rokem +14

    Tomorrow my exam 🤞🏻

  • @UshaUsha-cd3oe
    @UshaUsha-cd3oe Před 2 lety

    Doubts clear ho gye apki video se amazing video

  • @believeinyourself299
    @believeinyourself299 Před 23 dny +2

    Totally appreciated❤😊, Thank you bro

  • @iragautam
    @iragautam Před 3 lety +4

    Cryptography...is a new subjevt for me now....but i sure your video will help me much...cozz you explained everything....in a nice way❤️👍🏻...thanku

  • @RohitGupta-og6ni
    @RohitGupta-og6ni Před 3 lety +1

    Bhai , you video lecture is more supportive for me . So Thanks a lot bhai .

  • @sajeedullah4583
    @sajeedullah4583 Před 3 lety +1

    thanks for making such an understandable Videos for us, you made it very easy for us.

  • @dollydewangan8964
    @dollydewangan8964 Před 3 lety +1

    Thank you so much sir it's interesting 👌👌

  • @welcomeworld1739
    @welcomeworld1739 Před 2 lety

    This is very helpful , thank you

  • @akshaymahajan4907
    @akshaymahajan4907 Před rokem

    Very Nice Explanation.

  • @mineemisha1875
    @mineemisha1875 Před 4 lety +2

    Nice explain

  • @ruksharparveen6137
    @ruksharparveen6137 Před 2 lety

    Thanks a lot for this video. It is very useful for me .

  • @user-th8yc7wk1v
    @user-th8yc7wk1v Před rokem +1

    Superrr brooo❤ well said I got full clarity on topic 😊😊😊 tq u bro

  • @yaminin5809
    @yaminin5809 Před rokem

    Good explanation sir best of luck

  • @HarshaDwivedi33
    @HarshaDwivedi33 Před 3 měsíci +1

    Thank you bhaiya ji

  • @reviewshyd1155
    @reviewshyd1155 Před 2 lety +2

    very well explained

  • @mdafroj6058
    @mdafroj6058 Před 4 měsíci

    very excellent Abhishek Bhai

  • @anishasingh3306
    @anishasingh3306 Před měsícem

    Awesome❤

  • @pranjulgupta9250
    @pranjulgupta9250 Před 3 lety +1

    Thanks a lot, it is really helping

  • @parthpatel9757
    @parthpatel9757 Před 3 lety +6

    Thanks for such a fabulous lesson and content. And if you don't mind brother Could you share your notes please?

  • @directopath4860
    @directopath4860 Před 3 lety

    Bahut badhiya samjhaya aapne sir....
    Agar aap apne ye notes provide kar dete to or achha ho jaata hamare liye....🙏🙏🙏

  • @arshsingh1218
    @arshsingh1218 Před 2 měsíci +1

    Thnx sir

  • @vinayaksharma7134
    @vinayaksharma7134 Před 2 lety +1

    thank You bhaiya!!!

  • @Virgo23
    @Virgo23 Před rokem +1

    thanks a lot

  • @asiankingofficial6579
    @asiankingofficial6579 Před 2 lety

    This is the best explanation video for me love you bhai
    Jai hind

  • @webxlo128
    @webxlo128 Před 2 lety +1

    based on advanced encryption standard if c={74} instead of c={63}in s box construction, find a value for the position 78 in the sbox

  • @lakshsinghania
    @lakshsinghania Před 6 měsíci

    bhaiya, i didnt get this point as u said asymmetric encryption keliye koi bhi "key" use kar sakte ho
    so if we use private key (A) for encryption i.e the plain text is converted to cipher text and the attacker or any 3rd party can decrypt it using public key as it known to whole world. Whats the use of this method and it doesnt make any sense?
    can u pls brief on this for clarifying it properly

  • @karanjaiswal6623
    @karanjaiswal6623 Před 4 lety +7

    DES stands for Data Encryption Standard
    please correct it

  • @ladydimitrescu1155
    @ladydimitrescu1155 Před 4 lety +1

    Thankyou so much!

  • @user-lz4le1yu6o
    @user-lz4le1yu6o Před 8 měsíci +1

    your the best person sir kindly make make course in Quantum Cryptography Complete Course please

  • @nandanisharma9045
    @nandanisharma9045 Před 2 lety

    Nice explanation 😇👍

  • @pawanbhoyar032
    @pawanbhoyar032 Před 8 měsíci

    Thank you so much sir ❤

  • @sumitsinha1506
    @sumitsinha1506 Před 3 lety +12

    Truly amazing work brother❤️, but please provide the PDFs of those notes like stuff you had in your video..
    Thank you 🔥💯

  • @lhakpasingi8780
    @lhakpasingi8780 Před 3 lety

    Very useful 😊🙏🌻

  • @anjana6898
    @anjana6898 Před 2 lety

    Helpful🙏

  • @Adventure581
    @Adventure581 Před 4 lety +1

    Superb sir👌👌

  • @Aisha-vs8vd
    @Aisha-vs8vd Před rokem

    Thanks yaar kal exam hai pr samajh nahi aa raha tha syllabus but aapke videos dekhke samajh aa rahi h Thankyou so much 👍👍👍👍

  • @YN.PICTURES
    @YN.PICTURES Před 2 lety

    Bro you're great 👏👍,

  • @aliach.8449
    @aliach.8449 Před rokem

    Thnks sir

  • @amlassalma8090
    @amlassalma8090 Před rokem

    Mashallah kaa chalatha hoo ab thanks bhai

  • @kamar1380
    @kamar1380 Před 4 lety +2

    Bro can you provide notes of this series..?
    Thnks for this awesome video...👍

  • @ejanshrestha9504
    @ejanshrestha9504 Před 4 lety

    how you capture like this ? which camera stand u use ?

  • @mshrisha15
    @mshrisha15 Před 3 měsíci +1

    Ur handwriting 😩😩was awesome ❤

  • @snehasish-bhuin
    @snehasish-bhuin Před 2 lety

    Every videos are very good 👍. If you plz share a pdf document of your notes that will be more attractive

  • @TheShubham778
    @TheShubham778 Před 2 lety

    Awesome

  • @vicky02078671
    @vicky02078671 Před 4 lety +1

    Nice job sir thank you blowwish algorithm pr vedio bnye pls

  • @meenumohan98
    @meenumohan98 Před 2 lety

    Thank you soo much😍

  • @rohitjadhav7844
    @rohitjadhav7844 Před 2 lety +1

    Tnx sir

  • @technicalcoding2710
    @technicalcoding2710 Před 3 lety +1

    Love it 🥰

  • @DrBrishnikant
    @DrBrishnikant Před 3 lety +1

    Bro mst 👌👌👌

  • @amankr9093
    @amankr9093 Před 2 lety

    Sir aisa hi video aur bhi aage bnaye ye meri request hai aapse

  • @veersharma1333
    @veersharma1333 Před 3 lety

    Good👍

  • @vijaylaxmi9849
    @vijaylaxmi9849 Před 2 lety

    Sir , u said ki
    1. public key se encryption karenge to private key se hi decrypt kar sakte h aur vice versa par fir symmetric cryptography me same key kaise use hota h fir? Ya ye rule sirf asymmetric k liye hi hai
    2.Aur symmetric cryptography me private key use krte h ya public?
    Please clear my doubt

  • @rajindernegi8280
    @rajindernegi8280 Před rokem

    Can you please share the book name you refer in your videos of cryptography

  • @sibgathassan6281
    @sibgathassan6281 Před 3 lety

    Symmetric ma jab key b internet sae share hoga . Attacker Key le k decrypt nahi karsakhta ha??

  • @2000shweta
    @2000shweta Před 4 lety +2

    message can only be encrypted using public key of receiver and decrypted by private key of receiver.

  • @saipavan1442
    @saipavan1442 Před 3 lety +1

    Super

  • @er.santoshkumargupta50

    Love you sir

  • @dineshkumawat9920
    @dineshkumawat9920 Před 2 lety

    Sir me bitcoin keys ke baare me kuch puchna chahta hu key ke type ki phle kis kis trh ki key aaya krti thi

  • @dikshachawla6451
    @dikshachawla6451 Před 3 lety

    Kindly share some videos on implementation.

  • @ronit3014
    @ronit3014 Před 2 lety

    5:26 Apni public aur *private key* kese Pta kre ye device vise hoti h ya app vise ???

  • @ss-ub6qb
    @ss-ub6qb Před 2 měsíci

    (how to attack a classical cipher using known partial plaintext? ) bhai isko explain kar do

  • @tusharpatne6863
    @tusharpatne6863 Před 3 lety

    Great content sir,
    can you please provide a pdf of these notes

  • @VikasGS-kl1sj
    @VikasGS-kl1sj Před 3 lety +1

    bro pls provide the notes in pdf format for us ...it will be very helpfull.

  • @nusrathunnisa9645
    @nusrathunnisa9645 Před 3 lety

    Can u plz explain model of conventional cryptosystem

  • @vantal4115
    @vantal4115 Před rokem

    Bro decryption ke liye A ki private key kyu use kr rahe ho...how B is getting A's private key?

  • @apoorvav7430
    @apoorvav7430 Před rokem +1

    Where can we find the pdf of ur notess
    Please reply

  • @veerannahattiholi3672
    @veerannahattiholi3672 Před 2 lety

    Sir can we get pdf of your notes ......so that it will be very much usefull for us !

  • @annubhati3442
    @annubhati3442 Před 3 lety

    Sir ,
    information systems analysis designs k notes ki vdeo bna do.

  • @zackx5200
    @zackx5200 Před 3 měsíci

    🔥🔥🔥🔥🔥🔥

  • @nikitabarediya
    @nikitabarediya Před 28 dny

    🎉

  • @Afnanali-iu5zo
    @Afnanali-iu5zo Před 4 lety

    Form where do the key 1 and key 2 come from???

  • @anildanes2807
    @anildanes2807 Před 3 lety

    Brother explain about secret key,public key and message digest.

  • @rimsha6001
    @rimsha6001 Před 2 lety +1

    Asslam u alaikum Sir
    Aik question hai kindly answer krdy
    Question:
    IT Security
    Personnel Security
    Physical Security
    Operational Security
    Into which of these would you put the following, justify your choice?
     Enforcing hard-to-guess passwords
     Encrypting your hard drive
     Looking sensitive documents in a safe
     Stationing a marine guard outside an embassy
     Assigning security clearances to staffers
     Using SSL for data transfer
     Having off-site backup of documents
    Plzzz sir i request you iska answer bta dy plzzzz

  • @user-jm1yl7nm5f
    @user-jm1yl7nm5f Před 11 měsíci

    Sir please or bhi subject pe vedio banao

  • @rakeshmd7882
    @rakeshmd7882 Před 3 lety

    Bro can u pls share the notes that u hve explained

  • @23ashobhasoni56
    @23ashobhasoni56 Před rokem

    iska encryption methode kya hoga?

  • @VivekMishra-sk4bs
    @VivekMishra-sk4bs Před 2 lety +6

    please upload the notes in pdf forms and provide the link ,your lecture are awesome ❤️❤️

    • @Knowledgeduniya1432
      @Knowledgeduniya1432 Před rokem

      @Beelzebub bas y hi engineering k chutiyapa h bhai merko smjh nhi aata jab sikhna nhi toh pd q rhe h in subjects ko kisko dikhane k liye pad re yr apn😂

    • @Knowledgeduniya1432
      @Knowledgeduniya1432 Před rokem

      @Beelzebub 😂

  • @iamsky.20
    @iamsky.20 Před rokem

    please make pdf of notes and provide a link that would be really helpful

  • @priyankagarg3891
    @priyankagarg3891 Před 2 lety

    Hey, can you provide your notes as well

  • @capturedunia8835
    @capturedunia8835 Před měsícem

    Hello Sir,
    Can you please share the pdf file for these lectures?

  • @trineshyadav4379
    @trineshyadav4379 Před 3 lety

    Rootkit aur attacker hijacking kr bare me vedio bnaye sir aap

  • @darkfox379
    @darkfox379 Před 3 lety

    Bro final year bca how to get placement bro

  • @23_h_rajatbhatt21
    @23_h_rajatbhatt21 Před 2 lety

    aapke notes provide krate hai kya

  • @035_shubhamrai2
    @035_shubhamrai2 Před 3 lety

    Hello Bhai! Can you share your notes pdf?

  • @BadalKumar-tu2wg
    @BadalKumar-tu2wg Před 2 lety

    Notes download kaise kare

  • @ujjwalsingh8105
    @ujjwalsingh8105 Před 2 lety

    can uh share your hand written notes with us???? ..😊

  • @pawankumarpandit1822
    @pawankumarpandit1822 Před 10 měsíci

    anybody have notes of this total playlist

  • @ronit3014
    @ronit3014 Před 2 lety

    5:39 Private Key device ke inbuilt hidden rhti h ya hm usko dekh skte h ???
    Dekh skte h >to> share kr skte
    Share kr skte h to *HACK bhi to kr skte h* 😛😛😛

  • @debjitpaul8580
    @debjitpaul8580 Před 4 lety +1

    Doubt: You said a msg that is encrypted by a public key can only be decrypted by using a private key and vice versa. That means two different keys are necessary, right?
    So what is use of Symmetric cryptography then? You just said I cannot use the same key for both encryption and decryption.
    Please clarify this, anyone!

    • @AbhishekSharmaDit
      @AbhishekSharmaDit  Před 4 lety +3

      That is applicable only for asymmetric key Cryptography
      " the public and private key concept "
      And in symmetric key Cryptography
      We will use the same key for Encryption and decryption

    • @debjitpaul8580
      @debjitpaul8580 Před 4 lety

      @@AbhishekSharmaDit In symmetric can it be either of public or private key? Are there any rules for that?

    • @AbhishekSharmaDit
      @AbhishekSharmaDit  Před 4 lety +1

      @@debjitpaul8580 there is no public or private key concept in symmetric key Cryprtography
      Key can be anything (generally any sequence of characters)
      Like key can be "absd@1hj"
      Or it can even be your name
      Hope doubt is clear now !!
      Follow the series
      U will get your doubts cleared

  • @factchecker1234
    @factchecker1234 Před rokem

    Can i get the notes??

  • @typhoontab2429
    @typhoontab2429 Před rokem

    Can you please give us the notes pdf

  • @swastikjoshi1125
    @swastikjoshi1125 Před rokem

    Notes upload krdo bhai!

  • @veersharma1333
    @veersharma1333 Před 3 lety

    & Sir please can you give me handwritten notes pdf ..
    .and plz reply me as soon as possible 🙏

  • @AyushGupta29164
    @AyushGupta29164 Před 3 měsíci

    pdf available hain kya

  • @bishwajeetpandey1570
    @bishwajeetpandey1570 Před 2 lety +1

    7:41 doubt : you said message will be decrypted using private key of A( sender) , but how will B (recipient) have A's private key .
    Clearify this .😐

  • @shivamsuchak5807
    @shivamsuchak5807 Před 4 lety

    hey your playlist is really good and useful, Can i have your book?