Cipher Block Chaining (CBC)

  Рет қаралды 67,605

Neso Academy

Neso Academy

Күн бұрын

Пікірлер: 19
@KawtherBenElkahia-gz5sk
@KawtherBenElkahia-gz5sk 24 күн бұрын
I skipped my IT Security lectures, but his videos have rescued me ! Keep the good work
@adithyarajapakshe3791
@adithyarajapakshe3791 Жыл бұрын
Bro you're like the best teacher ever
@leehaynes7761
@leehaynes7761 Жыл бұрын
Thank you for creating this video, you have really helped me understand in a clear way how CBC works.
@NanthaGopalJ-o6r
@NanthaGopalJ-o6r 4 ай бұрын
you are explaining better than my professor,
@josemorris1790
@josemorris1790 Жыл бұрын
Very good explanation
@jagadeshn4730
@jagadeshn4730 7 ай бұрын
Nice explanation !!
@heyiamuday
@heyiamuday Жыл бұрын
wow ../ great explanation
@robertkrasniqi6612
@robertkrasniqi6612 Ай бұрын
Thank you for the video, it is very helpful! At 6:43, why does CBC also offer authentication, you justify it with the IV, but this is not transmitted securely?
@Huda_khan.i
@Huda_khan.i Жыл бұрын
i studied my all engineering courses on this platform and now I m worried that their are no lecture available on communication system
@souravbhagat1358
@souravbhagat1358 Жыл бұрын
Pls make a vedio lectures on Internet security protocol which is tha part of network security and also authentication part
@fadalinitube
@fadalinitube 9 ай бұрын
Thank u so much
@luka_17_63
@luka_17_63 Ай бұрын
I hope you will reply, i have a question, is the encryption part then something like AES Encryption? So for the first block of the plaintext we are combining it the IV via XOR and this output will be get to AES for encryption and so on?
@mertcanzafer9901
@mertcanzafer9901 2 ай бұрын
There is also one thing I noticed here is that even if we can not encrypt the data in parallel, but we can decrypt the data in parallel using CBC operation. How? Because all ciphertext are known so you don't need to wait for previous ciphertext to produce the plain text!!!
@NestorFeliciano
@NestorFeliciano 11 ай бұрын
nice!
@sauru_6527
@sauru_6527 Жыл бұрын
संजीवनी jindabad 2:49
@sauru_6527
@sauru_6527 Жыл бұрын
Btech computer 💻 A division Rno 7 Bramhamgaonkar 3:36
@abedzaben
@abedzaben 9 ай бұрын
how the IV is extracted during the decryption?
@1004-u5t
@1004-u5t 2 ай бұрын
but both sides need to know rhe key as well so the key provides authentication for all modes.
@Huda_khan.i
@Huda_khan.i Жыл бұрын
why there is no lecture on modern Digital and analogue communication By bp lathi edition 4
Cipher Feedback (CFB)
13:46
Neso Academy
Рет қаралды 55 М.
Introduction to Advanced Encryption Standard (AES)
11:07
Neso Academy
Рет қаралды 246 М.
How Strong Is Tape?
00:24
Stokes Twins
Рет қаралды 96 МЛН
Арыстанның айқасы, Тәуіржанның шайқасы!
25:51
QosLike / ҚосЛайк / Косылайық
Рет қаралды 700 М.
UFC 310 : Рахмонов VS Мачадо Гэрри
05:00
Setanta Sports UFC
Рет қаралды 1,2 МЛН
Electronic Codebook (ECB)
11:30
Neso Academy
Рет қаралды 60 М.
Multiple Encryption and Triple DES
20:54
Neso Academy
Рет қаралды 55 М.
How To Design A Completely Unbreakable Encryption System
5:51
Half as Interesting
Рет қаралды 513 М.
Modes of Operation - Computerphile
14:16
Computerphile
Рет қаралды 229 М.
Feistel Cipher Structure
14:13
Neso Academy
Рет қаралды 207 М.
Transformers (how LLMs work) explained visually | DL5
27:14
3Blue1Brown
Рет қаралды 4,5 МЛН
Stream Cipher vs. Block Cipher
9:46
Neso Academy
Рет қаралды 135 М.
How Strong Is Tape?
00:24
Stokes Twins
Рет қаралды 96 МЛН