Caesar Cipher Explained with Solved Example ll Information and Cyber Security Course in Hindi
Vložit
- čas přidán 2. 03. 2019
- Myself Shridhar Mankar a Engineer l CZcamsr l Educational Blogger l Educator l Podcaster.
My Aim- To Make Engineering Students Life EASY.
Website - 5minutesengineering.com
5 Minutes Engineering English CZcams Channel - / @5minutesengineeringen...
Instagram - 5minuteseng...
A small donation would mean the world to me and will help me to make AWESOME videos for you.
• UPI ID : 5minutesengineering@apl
Playlists :
• 5 Minutes Engineering Podcast :
• 5 Minutes Engineering ...
• Aptitude :
• Aptitude
• Machine Learning :
• Machine Learning
• Computer Graphics :
• Computer Graphics
• C Language Tutorial for Beginners :
• C Language Tutorial fo...
• R Tutorial for Beginners :
• R Tutorial for Beginners
• Python Tutorial for Beginners :
• Python Tutorial For Be...
• Embedded and Real Time Operating Systems (ERTOS) :
• Embedded and Real Time...
• Shridhar Live Talks :
• Shridhar Live Talks
• Welcome to 5 Minutes Engineering :
• Welcome To 5 Minutes E...
• Human Computer Interaction (HCI) :
• Human Computer Interac...
• Computer Organization and Architecture :
• Computer Organization ...
• Deep Learning :
• Deep Learning
• Genetic Algorithm :
• Genetic Algorithm
• Cloud Computing :
• Cloud Computing
• Information and Cyber Security :
• Information And Cyber ...
• Soft Computing and Optimization Algorithms :
• Soft Computing And Opt...
• Compiler Design :
• Compiler Design
• Operating System :
• Operating System
• Hadoop :
• Hadoop
• CUDA :
• CUDA
• Discrete Mathematics :
• Discrete Mathematics
• Theory of Computation (TOC) :
• Theory Of Computation ...
• Data Analytics :
• Data Analytics
• Software Modeling and Design :
• Software Modeling And ...
• Internet Of Things (IOT) :
• Internet Of Things (IOT)
• Database Management Systems (DBMS) :
• Database Management Sy...
• Computer Network (CN) :
• Computer Networks (CN)
• Software Engineering and Project Management :
• Software Engineering A...
• Design and Analysis of Algorithm :
• Design And Analysis Of...
• Data Mining and Warehouse :
• Data Mining and Warehouse
• Mobile Communication :
• Mobile Communication
• High Performance Computing :
• High Performance Compu...
• Artificial Intelligence and Robotics :
• Artificial intelligenc...
Was trying to understand through books since days, understood by watching this video once. Subscribed!
us bro us !!
EVERYTHING is TEMPORARY... but "AAJ KA VIDEO WAQAI BDA KAMAL KA HONE WALA H" is PERMANENT 😁😁
Hai bhi Kamal ka
For my exams? I am a developer and i wanted to learn more about cipher and this video helped me alot bro. Not only students, professionals got help from this video too.
Pure CZcams par aap jaisa koi nahi bataya love you sir
Amazing way of teaching. At first it was little a bit complicated but after the half of the video it literally get adjusted in my mind.
Hey bro wanted some suggestions is this playlist sufficient enough for college exams or neso academy or gate Smasher playlist is better
couldn't ask for a better explaination 🙏🏼🙏🏼
thank u sir aapka videos dekh kar hi main apna saara exam clear kiya hu
Amazing lectures...🔥🔥🔥
Good Explanation by 5 min Engineering.
Nice video Sir. I want to implement key rotation policy in AES algorithm. How can this be done. Please help.
Where deep explanation thank you sir 💯
Best way to explain 👍, thanku sir🙏
Well done sir good work 👍👍👍👍👍👌👌👌👌👌
i have my exams tomorrow and you helped me a lot, thank you very much, Jai Shree Sita Ram
2 lakhs subscriber sukriya sir ji👍
thanks a ton
blessing for cbse boards
Thank u sir u r great 👏👏 your videos helps alot love from kashmir
Mankar Saheb Dhanyawad
bahot pyara laga vedio
Thankyou sir this is really helpful🙏
great video.
Sir, Cloud Computing Please
Great effort sir
You are the best sir ❤️🙏
Great explanation
Naad re bhava tuz 🔥
Very helpful vdo..
Thank you Bro!!!
Nice explanation
Great job sir thanks
very well explained sir
Thank you sir 💕
THANKS A LOT SIR👍👍👍
Sir plz make videos on HCI & RTOS also.
Sir hm 4 bb seleck kar saktya hy kya....... Encryption perform karnya ka liya
thnx a lot sir g
Great....
thank you sir
you have "internal telont" to increase video length... btw good video
Sir you are best 🥺
Thank You !!!!!!
Amaizing
Sir please clarify my dought: which encryption algorithms comes in which type? (Symmetric or asymmetric encryption)
dude epic🔥🔥🔥🔥
I love this video
thanks
Subscribed!!.👍
Thank you
Sir ap bohat beautiful hain and ap ka teaching way bohat acha ha
czcams.com/video/j-uwRJwyZHk/video.html
Great sir
Jabardast
sir kamal ho app
Thanks Sir :)
thank you sir.... can you apply the formula on decrypting???
Thank YOU SO MUCH SIR
Thank You Sir
thanks sir
Thank you,
Which cipher methods are used in https/padlock enabled websites being used now a days? Pls reply as it's most important for my exam.
Thnks sir..
Si isme hm 3 hi q value lenge 2 nhi le skte ky
Thank you soo much sir
thanks brother
Sir this tutorial blew my mind. I spent 3 hours just understanding this technique and you taught me in just five minutes. Amazing, 1000 views will be from me. HEHE
Aatankwadi mulle aajkal padhai bhi karne lage hain....wah....lol
@@raghav5074 APJ Abdul Kalam nam sune ho?
@@AnkitKumar-sz5wu Samajdaar aadmi.....APJ Abdul Kalam ki biography padhio....Woh Geeta Padhta tha, na ki Quran. Agar quran padhi hoti to voh bhi aatankvaadi hi banta
@@AnkitKumar-sz5wu Aur haan.....kalam ke ilawa ek mulla aur accha bta de
@@raghav5074 sal khan
Nice
what does it mean agar likha hai k write your name with shift of 12 ? shift of 12 kya matlb ?
I have a question. If we write Z in plain text.. Then what? Z+3=?
C
C because after z series ends.
You didnt talk about key ,sir .
thanx sir
is mod 26 required? since n mod 26 = n where n = 0 to 26
Beautiful
Hey, I have read in a book that the plain text is generally represented by small lettered alphabets while the cipher text is represented by capital lettered alphabets. Correct me if I am wrong.
U are right . I have read that too.
czcams.com/video/j-uwRJwyZHk/video.html
Bro, that is the general definition to represent this formula :-
Like for a plain text 'p' and the key 'k' the encryption algorithm applied E gives cipher text C.
E(p,k) = C.
thanqu sir
sir cloud computing ke banao na
Yes sir
Sir is mai key bhi use hoti hai
aapne sikhaya thik hai but agar situation change hua to exam me 3 ke jagah pe dusra no. diya to kya karne ka or mod me 25 se jyada no. aaya to kaise apna text malum padega
sir kindly aik complete tutorail bana lein crytography pr
Attacker padh lega toh wo bhi subscribe kar lega 🤣
High level of security ✌🏼
Actually, these techniques are obsolete.
Hardly koi use karta hai
Acha g
Bhai ERTOS ke bhi video banao na
Ty sir
What will be computer in encription text.
Sir kindly kasiski method k bary me shortly aik video samjhady
Kya caesar cipher me k=3 ke jagah pe koi numbers jaise 1,2,4,5,6.....se replace kiya ja Sakta hai?
Yes
👍👍
What is mod 26 ?
Op sirr
Sir mujse decryption vala nhi hua.kya ek bar aap bta dege
Agar 0-3 mod 26 aya to kya ans hoga?
Amazing explaination!!!!
Mod 26 ku lahk rhy sath?
ceaser cipher values fix or not
Bhai sb theek hai ap please mic use kiya kren echo ata hai apki videos me
💚
How to find key ?
What's your key sir To write the cipher text ??
czcams.com/video/j-uwRJwyZHk/video.html
Op sir
Ak choti se mistake h sir N=13=q
Apne "g" likh dia h thankx
it's a small 'Q'
@@chintan_147 end me dekh
@@kratozeus6358 it's a small 'q'
Watching before 20 hour of exam
Sir inki playlist Link de do na
But why we only add 3 in cipher text