Symmetric Key Cryptography Vs Asymmetric Key Cryptography Explained in Hindi
Vložit
- čas přidán 1. 03. 2019
- Myself Shridhar Mankar a Engineer l CZcamsr l Educational Blogger l Educator l Podcaster.
My Aim- To Make Engineering Students Life EASY.
Website - 5minutesengineering.com
5 Minutes Engineering English CZcams Channel - / @5minutesengineeringen...
Instagram - 5minuteseng...
A small donation would mean the world to me and will help me to make AWESOME videos for you.
• UPI ID : 5minutesengineering@apl
Playlists :
• 5 Minutes Engineering Podcast :
• 5 Minutes Engineering ...
• Aptitude :
• Aptitude
• Machine Learning :
• Machine Learning
• Computer Graphics :
• Computer Graphics
• C Language Tutorial for Beginners :
• C Language Tutorial fo...
• R Tutorial for Beginners :
• R Tutorial for Beginners
• Python Tutorial for Beginners :
• Python Tutorial For Be...
• Embedded and Real Time Operating Systems (ERTOS) :
• Embedded and Real Time...
• Shridhar Live Talks :
• Shridhar Live Talks
• Welcome to 5 Minutes Engineering :
• Welcome To 5 Minutes E...
• Human Computer Interaction (HCI) :
• Human Computer Interac...
• Computer Organization and Architecture :
• Computer Organization ...
• Deep Learning :
• Deep Learning
• Genetic Algorithm :
• Genetic Algorithm
• Cloud Computing :
• Cloud Computing
• Information and Cyber Security :
• Information And Cyber ...
• Soft Computing and Optimization Algorithms :
• Soft Computing And Opt...
• Compiler Design :
• Compiler Design
• Operating System :
• Operating System
• Hadoop :
• Hadoop
• CUDA :
• CUDA
• Discrete Mathematics :
• Discrete Mathematics
• Theory of Computation (TOC) :
• Theory Of Computation ...
• Data Analytics :
• Data Analytics
• Software Modeling and Design :
• Software Modeling And ...
• Internet Of Things (IOT) :
• Internet Of Things (IOT)
• Database Management Systems (DBMS) :
• Database Management Sy...
• Computer Network (CN) :
• Computer Networks (CN)
• Software Engineering and Project Management :
• Software Engineering A...
• Design and Analysis of Algorithm :
• Design And Analysis Of...
• Data Mining and Warehouse :
• Data Mining and Warehouse
• Mobile Communication :
• Mobile Communication
• High Performance Computing :
• High Performance Compu...
• Artificial Intelligence and Robotics :
• Artificial intelligenc...
Sir, we need teachers like you in our college too .....Keep going, Sir
Respect Sir,
I've seen your channel grow and am really proud of u.
Keep up the good work..
Thanks for supporting my engineering....:)
your mind blowing sir such a great teacher, and i,m expecting to see of your course with hands on lab as well if you can it will help us alot to learn from you.
stay blessed and wish you a very good health
Sir ,your behaviour is very good.And thank you provide this video
Sir bhut he top ke videos hai
Thank you sir , please also upload AES & DES algorithms
Thank you so much .. you're great
Useful video👌
bhai tum ho to 2 saal se ek din mai pdhkr ache marks aa rhe hai mere.
kal exam hai and raat ko start kr rha hu pr tum pr poora bharosa hai ki sab smjh aa hi jaega.
thanks dil se
amazing !! salute your teaching
Thank you sir!
Thnx sir 🌺🌺 wonderful knowledge 🙏🙏
Very very helpful video sir ji
Thankyou sir
You are a life saver💙💙
sir your teaching skill power full and easy to understand awsm sir .....Keep going, Sir
Thank you sir aapne bahut help kiya
Perfect 🤩💕
Helpful
Good job
Awesome .....Superb...... Outstanding 🔥👏👏🔥👏🎉💝❣️❣️💝💖💖
Thank You sir! ❤🥀
thank you sir for making video
Sir aap bahut aacha padhate hai
Sir good work but explain it very deeply😊😊😊😊
Thnx bro 👍
Thnx u sir so much
thanks
Thanks sir
thank u 🤔😍
Bhai you are a lifesaver in exams🙏😇
mast
Please make video on honeypots..
Advantages and disadvantages k baray may bataya
jordar
Sir please add more videos
make a video on diffie hellman key exchange algorithm
good one sir but explaination of DES,AES and RES etc. i think you forgot to teach
i love you sir
why diffie-hellman is asymmetric. Insted it is used to compute a symmetric key, for a symmetric crypto algo. So, it is basically a way to exchange the keys, which is asymmetric in nature
.
Watch this tooczcams.com/video/rYyBNP5BeDw/video.html
Sir ap ki coaching kaha chalti h
Shouldn't the last point be interchanged. Public key of the receiver is available to everyone, then what is the need to securely transfer it. Please clear my doubt. Thank you. : )
👌👌👌👌👌👌👌👌👌👌👌👌👌👌
🌺🌼🌻🌷🌸👏🙌
Equally hai
Ek bat samjh me nhi aayi ki ek slower h aur ek fast h to fir barabar kaise hua😉😉.
Watch this czcams.com/video/rYyBNP5BeDw/video.html too
Diffie helman is symmetric key cryptography
No
Deffie Hellman
Kya naam rakhte hain yeh log smjh hi nhi aata 😂
Rohit sharma 😂
Bhai sun ... Screenshot nikal ne ke liye video me ek baar full board dikha diya kr
3:34 thoda dimag bhi laga liya karo
@@krunalkp1032 aree dimag daar ... It'll be convenient if he tells the viewers that now you can take ss and move A-side for some sec ...like the other channels do ... Just for his improvement
Watch this czcams.com/video/rYyBNP5BeDw/video.html too
Abe tu order Dene wala hota kon h be...gadhe
Respectfully baat krna sikh...
Thank you sir , please also upload AES & DES algorithms