S-DES Encryption || Simplified data encryption standard(S-DES) || - Encryption & Decryption

Sdรญlet
Vloลพit
  • ฤas pล™idรกn 11. 07. 2019
  • S-DES Encryption || Simplified data encryption standard(S-DES) || - Encryption Algorithm explained with an example
    1] s-DES Key Generation: โ€ข S-DES Encryption || Si...
    2] s-DES Encryption : โ€ข S-DES Encryption || Si...
    3] s-DES Decryption : โ€ข S - DES Decryption ||...
    #Cryptography #SDES #Encryption #Decryption #SDES #DataEncryptionStandard #sBox #Confusion #Diffusion #Cipher #SymmetricCipher #cybersecurity
    Thanks for watching.
    Do like , share and subscribe
    ๐Ÿ”ธ๐Ÿ”น๐Ÿ”ธ๐Ÿ”น๐Ÿ”ธ๐Ÿ”น๐Ÿ”ธ๐Ÿ”น๐Ÿ”ธ๐Ÿ”น๐Ÿ”ธ๐Ÿ”น๐Ÿ”ธ๐Ÿ”น๐Ÿ”ธ๐Ÿ”น๐Ÿ”ธ๐Ÿ”น๐Ÿ”ธ๐Ÿ”น๐Ÿ”ธ๐Ÿ”น๐Ÿ”ธ๐Ÿ”น๐Ÿ”ธ๐Ÿ”น๐Ÿ”ธ๐Ÿ”น
    ๐๐จ๐จ๐ค๐ฌ ๐ˆ ๐ก๐š๐ฏ๐ž ๐š๐ฎ๐ญ๐ก๐จ๐ซ๐ž๐:
    ๐๐ก๐š๐ซ๐š๐ญ๐ข๐ฒ๐š ๐Š๐š๐ญ๐ก๐š ๐•๐š๐ข๐›๐ก๐š๐ฏ๐š - ๐•๐จ๐ฅ ๐Ÿ , ๐Ÿ , ๐Ÿ‘ , ๐Ÿ’
    ๐…๐จ๐ซ ๐›๐ฎ๐ฅ๐ค ๐จ๐ซ๐๐ž๐ซ๐ฌ ๐š๐ง๐ ๐๐ข๐ฌ๐œ๐จ๐ฎ๐ง๐ญ๐ฌ ๐ƒ๐Œ
    ๐„๐ฆ๐š๐ข๐ฅ : ๐ž๐๐ฎ๐ฆ๐ข๐ญ๐ซ๐Ÿ’๐ฎ@๐ ๐ฆ๐š๐ข๐ฅ.๐œ๐จ๐ฆ
    ๐“๐จ ๐›๐ฎ๐ฒ ๐›๐จ๐จ๐ค๐ฌ ๐จ๐ง ๐€๐ฆ๐š๐ณ๐จ๐ง:
    Volume 1: tinyurl.com/2nrajajs
    Volume 2: tinyurl.com/yckkrwn3
    Volume 3: tinyurl.com/mrbf2unr
    Volume 4: tinyurl.com/2s4ckyz9
    ๐Ÿ”ธ๐Ÿ”น๐Ÿ”ธ๐Ÿ”น๐Ÿ”ธ๐Ÿ”น๐Ÿ”ธ๐Ÿ”น๐Ÿ”ธ๐Ÿ”น๐Ÿ”ธ๐Ÿ”น๐Ÿ”ธ๐Ÿ”น๐Ÿ”ธ๐Ÿ”น๐Ÿ”ธ๐Ÿ”น๐Ÿ”ธ๐Ÿ”น๐Ÿ”ธ๐Ÿ”น๐Ÿ”ธ๐Ÿ”น๐Ÿ”ธ๐Ÿ”น๐Ÿ”ธ๐Ÿ”น
    ๐Œ๐ฒ ๐’๐จ๐œ๐ข๐š๐ฅ ๐Œ๐ž๐๐ข๐š ๐‡๐š๐ง๐๐ฅ๐ž๐ฌ
    Facebook Page: profile.php?...
    Telegram (Engineering) : t.me/EnggEduSDK
    Telegram (Class 10) : t.me/MathsFor10Std
    Instagram (Education) : / edumitr4u
    Instagram (Hinduism & Spirituality) : / bharatiya__samskruti
    Blog : naadopaasana.wordpress.com/
    CZcams Channel (Hinduism & Spirituality) : / @naadopaasana-musicisd...
    ๐Ÿ”ธ๐Ÿ”น๐Ÿ”ธ๐Ÿ”น๐Ÿ”ธ๐Ÿ”น๐Ÿ”ธ๐Ÿ”น๐Ÿ”ธ๐Ÿ”น๐Ÿ”ธ๐Ÿ”น๐Ÿ”ธ๐Ÿ”น๐Ÿ”ธ๐Ÿ”น๐Ÿ”ธ๐Ÿ”น๐Ÿ”ธ๐Ÿ”น๐Ÿ”ธ๐Ÿ”น๐Ÿ”ธ๐Ÿ”น๐Ÿ”ธ๐Ÿ”น๐Ÿ”ธ๐Ÿ”น
    ๐Ÿ“š ๐ˆ๐ฆ๐ฉ๐จ๐ซ๐ญ๐š๐ง๐ญ ๐‚๐จ๐ฎ๐ซ๐ฌ๐ž ๐๐ฅ๐š๐ฒ๐ฅ๐ข๐ฌ๐ญ ๐Ÿ“š
    ๐Ÿ] ๐‚๐ซ๐ฒ๐ฉ๐ญ๐จ๐ ๐ซ๐š๐ฉ๐ก๐ฒ : tinyurl.com/3pjs2tnd
    ๐Ÿ] ๐ƒ๐ข๐ ๐ข๐ญ๐š๐ฅ ๐„๐ฅ๐ž๐œ๐ญ๐ซ๐จ๐ง๐ข๐œ๐ฌ : tinyurl.com/bdfwbsrk
    ๐Ÿ‘] ๐„๐ฅ๐ž๐œ๐ญ๐ซ๐จ๐ง๐ข๐œ๐ฌ (๐Ÿ๐ฌ๐ญ ๐˜๐ž๐š๐ซ - ๐๐š๐ฌ๐ข๐œ) : tinyurl.com/3vduy32b
    ๐Ÿ’] ๐„๐ซ๐ซ๐จ๐ซ ๐‚๐จ๐ง๐ญ๐ซ๐จ๐ฅ ๐‚๐จ๐๐ข๐ง๐  : tinyurl.com/4wpr8dew
    ๐Ÿ“] ๐ƒ๐ข๐ฌ๐œ๐ซ๐ž๐ญ๐ž ๐Œ๐š๐ญ๐ก๐ž๐ฆ๐š๐ญ๐ข๐œ๐ฌ : tinyurl.com/2p94dyr2
    ๐Ÿ”] ๐‚๐ฅ๐š๐ฌ๐ฌ ๐Ÿ๐ŸŽ - [๐‚๐๐’๐„/๐๐‚๐„๐‘๐“] ๐Œ๐š๐ญ๐ก๐ž๐ฆ๐š๐ญ๐ข๐œ๐ฌ: tinyurl.com/kbdb5syw
    ๐Ÿ•] ๐’๐ข๐ ๐ง๐š๐ฅ๐ฌ ๐š๐ง๐ ๐’๐ฒ๐ฌ๐ญ๐ž๐ฆ๐ฌ : tinyurl.com/2p8bkpf9
    ๐Ÿ–] ๐‚๐จ๐ง๐ญ๐ซ๐จ๐ฅ ๐’๐ฒ๐ฌ๐ญ๐ž๐ฆ๐ฌ : tinyurl.com/2p9hbn6m
    ๐Ÿ—] ๐‹๐ข๐ง๐ž๐š๐ซ ๐€๐ฅ๐ ๐ž๐›๐ซ๐š : tinyurl.com/2p8nswjw
    ๐Ÿ๐ŸŽ] ๐‚๐ฅ๐š๐ฌ๐ฌ ๐Ÿ๐Ÿ - ๐Œ๐š๐ญ๐ก๐ž๐ฆ๐š๐ญ๐ข๐œ๐ฌ : tinyurl.com/3asa62c8
    ๐Ÿ”ธ๐Ÿ”น๐Ÿ”ธ๐Ÿ”น๐Ÿ”ธ๐Ÿ”น๐Ÿ”ธ๐Ÿ”น๐Ÿ”ธ๐Ÿ”น๐Ÿ”ธ๐Ÿ”น๐Ÿ”ธ๐Ÿ”น๐Ÿ”ธ๐Ÿ”น๐Ÿ”ธ๐Ÿ”น๐Ÿ”ธ๐Ÿ”น๐Ÿ”ธ๐Ÿ”น๐Ÿ”ธ๐Ÿ”น๐Ÿ”ธ๐Ÿ”น๐Ÿ”ธ๐Ÿ”น
    ---------------------------------------------------------------------------------
    Blowfish Algorithm : โ€ข BLOWFISH ALGORITHM in ...
    Elliptical Curve Cryptography - 1 : โ€ข Elliptic Curve Cryptog...
    Brute force Attack : โ€ข Brute force attack in ...
    Avalanche Effect in Cryptography : โ€ข Avalanche Effect in Cr...
    Double & Triple DES : โ€ข Double DES and Triple...
    Steganography / Cryptography Differences: โ€ข Steganography and Cryp...
    Four Square Cipher : โ€ข Four Square Cipher - S...
    Route Cipher : โ€ข Route Cipher - Transpo...
    Fiestel Cipher Structure: โ€ข Feistel Cipher Structu...
    Network Security - Attacks : โ€ข Network Security - Att...
    Network Security - Authentication using Message Encryption : โ€ข Network Security - Au...
    Fiestel Cipher Structure: โ€ข Feistel Cipher Structu...
    Diffie Hellman Key Exchange: โ€ข Network Security - Dif...
    Euler's Totient Function [Euler's Phi Function]: โ€ข Euler's Totient Functi...
    Fermat's Theorem - Explanation with example: โ€ข Fermat's Theorem - Exp...
    s DES - Key Generation : โ€ข S-DES Encryption || Si...
    Differences between s-DES and DES: โ€ข Differences between s-...
    Primitive Root : โ€ข Primitive Root - Crypt...
    -----------------------------------------------------------------------

Komentรกล™e • 89

  • @lecturesbyshreedarshank8977

    I have published " Bharatiya Katha Vaibhava Vol 1 and Vol 2" books for children. For details, orders check the telegram link:
    t.me/joinchat/bv4e2-mQrCtkZjI9

  • @madhurjyadeka5569
    @madhurjyadeka5569 Pล™ed 2 lety

    A very concise and standard explanation.
    Thank you

  • @asdfghjklzxc2222
    @asdfghjklzxc2222 Pล™ed 2 lety +1

    เค…เคœเฅเคžเคพเคจ เคคเคฟเคฎเคฟเคฐเคพเคจเฅเคงเคธเฅเคฏ เคœเฅเคžเคพเคจเคพเคžเฅเคœเคจ เคถเคฒเคพเค•เคฏเคพ เฅค เคšเค•เฅเคทเฅเคฐเฅเคจเฅเคฎเฅ€เคฒเคฟเคคเค‚ เคฏเฅ‡เคจ เคคเคธเฅเคฎเฅˆ เคถเฅเคฐเฅ€ เค—เฅเคฐเคตเฅ‡ เคจเคฎเคƒ เฅฅ
    Thanks sir for your valuable efforts!

  • @swarnas2313
    @swarnas2313 Pล™ed 3 lety

    Nice explanation sir. Thank you very much !!

  • @smashinu2
    @smashinu2 Pล™ed 3 lety +3

    you're an encryption god, thanks a lot for helping me understand this concept. subscribed.

  • @_prof.paradox_
    @_prof.paradox_ Pล™ed 3 lety +3

    Clear explanation. A really good lecture. Thank you, Sir.

  • @bhavikjinjala980
    @bhavikjinjala980 Pล™ed 2 lety

    nice explanation

  • @eichikionizuka6773
    @eichikionizuka6773 Pล™ed 3 lety

    T CHO MEC ! Merci

  • @user-lt8eg8eb4q
    @user-lt8eg8eb4q Pล™ed 2 lety

    ะžั‚ ะดัƒัˆะธ, ะผัƒะถะธะบ

  • @ayeshaali903
    @ayeshaali903 Pล™ed 4 lety +6

    Sir, Thank you so much for part 1 and 2. Thanking you is just not enough honestly! Super amazing explanation!

  • @samayakmalhotra3040
    @samayakmalhotra3040 Pล™ed 4 lety +1

    Lovely Explanation

  • @koushiksarma2613
    @koushiksarma2613 Pล™ed 9 mฤ›sรญci

    Thanks a lot sir !

  • @robertnyirenda64
    @robertnyirenda64 Pล™ed 4 lety +2

    Thank you so much you really helped

  • @omaewamushinderu
    @omaewamushinderu Pล™ed 2 lety +3

    big thnx from russia, i will to write exam tomorrow, u helped me

  • @programmers8245
    @programmers8245 Pล™ed 2 lety +1

    You are the best thanks alot

  • @saurabhpatil2529
    @saurabhpatil2529 Pล™ed rokem +1

    Thank You sir

  • @jitenkhatri8001
    @jitenkhatri8001 Pล™ed 2 lety

    Thank you so much sir

  • @manmohan_pundir_shorts
    @manmohan_pundir_shorts Pล™ed 2 lety +1

    Great๐Ÿค—

  • @sripriyasrinivasan3796
    @sripriyasrinivasan3796 Pล™ed 4 lety +2

    Great explaination! Thanks!!

  • @nitish7764
    @nitish7764 Pล™ed 2 lety

    Thank you ๐Ÿ’•

  • @rahulsingh40g
    @rahulsingh40g Pล™ed 3 lety +3

    Video quality was excellent in terms of understanding the concept. Thankyou so much sir,
    But kindly improve over sound and video quality, it's much needed.

    • @lecturesbyshreedarshank8977
      @lecturesbyshreedarshank8977  Pล™ed 3 lety

      True.. the later videos are much better ..Thanks for the feedback.. These were the first set of video lectures.. check out the Decryption for s-DES done recently.. czcams.com/video/HDg9qxCfj3c/video.html

  • @saharshithasa
    @saharshithasa Pล™ed 2 lety

    ๐Ÿ”ฅ๐Ÿ”ฅ๐Ÿ”ฅ๐Ÿ”ฅ

  • @geshbenrewand1778
    @geshbenrewand1778 Pล™ed 3 lety +1

    God bless you

  • @vishalparmar988
    @vishalparmar988 Pล™ed 4 lety +1

    Nice Explanation Sir ,, Keep doing it ,, and make more videos ๐Ÿ™๐Ÿ‘Œ

  • @brucemclaren-
    @brucemclaren- Pล™ed 2 lety +1

    This video just saved my ass negl

  • @lakshitpardeshi4382
    @lakshitpardeshi4382 Pล™ed 4 mฤ›sรญci +1

    In round 2 won't the left and right bits swap?

  • @lecturesbyshreedarshank8977
    @lecturesbyshreedarshank8977  Pล™ed 3 lety +6

    I am delighted to inform you all that i have authored a book of stories for children titled: " Bharatiya Katha Vaibhava -1".
    The book was released for Deepavali.
    This book features 25 unique and popular short Stories with beautiful illustrations from our Epics, and from the life of our Saints, Sages, and Rulers...
    This is indeed a wonderful gift for children especially to be given as a prize for competitions! You can order in bulk too. Orders are welcome for libraries, schools etc..
    Please note that Ebook kindle versions and paperback versions [B&W illustrations] can be bought online..
    Find the links..
    Zorba Store:- www.zorbabooks.com/store/children/bharatiya-katha-vaibhava-1-stories-for-children/
    Amazon (outside India) : www.amazon.com/Bharatiya-Katha-Vaibhava-SHREEDARSHAN-K-ebook/dp/B08N53PM3B/
    Amazon Kindle:- www.amazon.in/dp/B08N53PM3B
    Note: To buy the full colour version book (paperback with colour illustrations) please contact the author , as they are only being printed at the author's request. The discounted price of the full colour version book is Rs 300/-.
    Those who wish to avail of this offer, please contact/message me.(Especially if you want a full colour version book, please inform at the earliest..)
    For bulk orders and discounts on B&W version and for colour version books you can contact ...
    Email: shreedarshan@gmail.com
    / naadopaasana18@gmail.com
    Regards,
    Shreedarshan K (Author)

  • @rishabhsharma8499
    @rishabhsharma8499 Pล™ed 2 lety +1

    do we skip swap in fk2?

  • @hafsafarooqi9022
    @hafsafarooqi9022 Pล™ed 2 lety +2

    From where we get the values of S0 and S1 matrix? Are they given?

  • @darrirro
    @darrirro Pล™ed 2 lety +2

    I wish my teacher taught like this

  • @aisakyunhotahai8130
    @aisakyunhotahai8130 Pล™ed 3 lety

    Sir, in the last row of S-box 0, we have no zero, is that a mistake or it is like this only?

  • @saibalaji4713
    @saibalaji4713 Pล™ed 3 lety +1

    Hello sir what should I do if the key given in question is 8 bit instead of 10 bit

    • @lecturesbyshreedarshank8977
      @lecturesbyshreedarshank8977  Pล™ed 3 lety

      Then they would have given the sub keys k1 and k2 .. you can continue with encryption/decryption directly...

  • @nadegecadorin2507
    @nadegecadorin2507 Pล™ed 3 lety +1

    Hey, I have to encrypt and decrypt with S-DES the letter A, but I don't understand how. Can you explain please ? Thank you

    • @lecturesbyshreedarshank8977
      @lecturesbyshreedarshank8977  Pล™ed 3 lety +1

      One way is to consider ASCII code for A and it's equivalent 8 bit binary representation... Use any 10 bit key and perform Encryption and Decryption...

    • @nadegecadorin2507
      @nadegecadorin2507 Pล™ed 3 lety

      @@lecturesbyshreedarshank8977 Okay I did the encryption thank you !! But i don't know how to do the descryption... :/

    • @lecturesbyshreedarshank8977
      @lecturesbyshreedarshank8977  Pล™ed 3 lety

      @@nadegecadorin2507 Please watch my video on s-DES decryption.. czcams.com/video/HDg9qxCfj3c/video.html

  • @sumanpatil88
    @sumanpatil88 Pล™ed 2 lety

    Wheather IP Inverse is given in the question? If not how to calculate?

  • @mihirkumar3805
    @mihirkumar3805 Pล™ed 3 lety +3

    Hey! You forgot to swap on case of round two

  • @v.deepthisree4844
    @v.deepthisree4844 Pล™ed 4 lety +2

    is the s0 and s1 box fixed?how did we get those values in the boxes

  • @abhisheks9906
    @abhisheks9906 Pล™ed 4 lety +4

    at 18:30 min. , swapping is not done .Is it right ..?, Please explain

    • @lecturesbyshreedarshank8977
      @lecturesbyshreedarshank8977  Pล™ed 4 lety +4

      Yes absolutely... After fk2, there is no swapping... Swapping is done only once after the 1st round of operation fk1. Hope it clears your doubt...

  • @kavanamgowda879
    @kavanamgowda879 Pล™ed 3 lety +1

    Can I get the algorithm of this sir , please

  • @saqlainramzan6640
    @saqlainramzan6640 Pล™ed 3 lety +1

    will IP given in question ?

  • @pokemongo8317
    @pokemongo8317 Pล™ed 3 lety +1

    Sir perform decryption also sir there is no video regarding decryption ๐Ÿ˜ข

  • @syedeshaa695
    @syedeshaa695 Pล™ed 3 lety

    Very well explained. But where is decryption process?

    • @lecturesbyshreedarshank8977
      @lecturesbyshreedarshank8977  Pล™ed 3 lety +1

      The process of decryption is the reverse of encryption where the subkeys are used in reverse order...

  • @ravikiranmutta1124
    @ravikiranmutta1124 Pล™ed 3 lety +1

    how r value taken

  • @srivyshnavi6271
    @srivyshnavi6271 Pล™ed 4 lety

    Please explain decryption

  • @abdifatahmohamed8600
    @abdifatahmohamed8600 Pล™ed 4 lety

    This sequences are chosen randomly or are like never to be changed?

    • @lecturesbyshreedarshank8977
      @lecturesbyshreedarshank8977  Pล™ed 4 lety

      Which sequences?
      U mean Permutation P sequences?

    • @abdifatahmohamed8600
      @abdifatahmohamed8600 Pล™ed 4 lety

      @@lecturesbyshreedarshank8977 Yah.... like 26314857 and 41232341 and the others

    • @lecturesbyshreedarshank8977
      @lecturesbyshreedarshank8977  Pล™ed 4 lety

      @@abdifatahmohamed8600 they are fixed ! ... These sequences are chosen while designing the algorithm such that encryption and decryption are absolutely reversible...

    • @abdifatahmohamed8600
      @abdifatahmohamed8600 Pล™ed 4 lety +1

      @@lecturesbyshreedarshank8977 Thank you... You've cleared all my doubts

    • @prabuddhadurge4114
      @prabuddhadurge4114 Pล™ed 3 lety

      @@lecturesbyshreedarshank8977 Then it should not be called as Permutation, it should be called arrangement! isn't it Sir. correct me if I am going wrong.

  • @nan6962
    @nan6962 Pล™ed 3 lety

    did not cover decryption?

  • @soldierdeepika
    @soldierdeepika Pล™ed 2 lety +1

    The number sequence you are taking was fixed like 2 6 3 1 4 8 5 7 or we can change sir