Thanks for this wonderful lecture, I'm always happy that your lectures are in English which allows me as an international student to understand this subject
@DozedUP0073 жыл бұрын
I had difficulties with this topic.. I stumbled upon this video and now I understand the topic. Gr8 video mate. I hope I find other videos I need in the video list.
@ruwanwijekoon11222 жыл бұрын
Great explanation. Thank you. You are an excellent teacher.
@twinkletata9 ай бұрын
Good explanation. Thanks
@myname14842 ай бұрын
Thank you 🙏
@kishsaam2 жыл бұрын
Great video... congratulations
@SandyNico-o6e9 ай бұрын
Nice topic
@manytuch Жыл бұрын
Great video!
@anonmuss70353 жыл бұрын
Good video......Please include captions.......Thank You......
@tech-learner45553 жыл бұрын
Please enable capttions in every videos
@gr33narr0w553 жыл бұрын
Nicely explained 👌
@Ototoxi2 жыл бұрын
Easily explained sir 👍
@sidharthshankar21363 жыл бұрын
Your an excellent teacher.......
@playlistc3429 ай бұрын
What about a known ciphertext attack when attacker have a couple of cipher and decrypted cipher = plaintext ?
@avejessi41752 жыл бұрын
0:38
@prabagaran.s1285 Жыл бұрын
I have college assignment, Differential cryptanalysis attack on Feal-4 algorithm , we have choose plain text and cipher text. I have done four rounds. and got 6 subkeys. , when i use the six sub keys to encrypt and decrypt , verification working fine , but my college professor. say like this . below. Only one value is given for each key - most are out by a few bits, but one is correct. Code seems to be largely based on Amazing Kings, without any real understanding of how the attack works what's your opinion on it.
@JohnDerhammer-oq9zi Жыл бұрын
Then why did they choose two-fish over Raj-13 for AES standard?
@ryyb38803 жыл бұрын
the algorith doesnt have to be known for all of these....
@srushtiprajapati870910 ай бұрын
R u sure?
@scrunchiestylepk Жыл бұрын
Thankuuu
@anjaligupta-ew6ns3 жыл бұрын
Sir please upload full cource of Compiler Design
@mdmahinuddin44123 жыл бұрын
sir please provide the ppt thanks a lot sir
@moatazalnasan39053 жыл бұрын
🙏🏻
@rimsha60012 жыл бұрын
Asslam u alaikum Sir Aik question hai kindly answer krdy Question: IT Security Personnel Security Physical Security Operational Security Into which of these would you put the following, justify your choice? Enforcing hard-to-guess passwords Encrypting your hard drive Looking sensitive documents in a safe Stationing a marine guard outside an embassy Assigning security clearances to staffers Using SSL for data transfer Having off-site backup of documents Plzzz sir i request you iska answer bta dy plzzzz
@junaiddar25862 жыл бұрын
Using SSL
@vont84243 жыл бұрын
don't understand at all. talk too fast as though the presenter is trying to beat the clock. i watch and watch many times trying to understand, especially the chosen plaintext and chosen ciphertext. still don't understand the explanation. actually it is not only this presenter. i find that none of those videos I've watched so far actually explain these concepts clearly. even college textbooks written by super well-known authors can't explain the concepts clearly. no wonder students are never able to understand, because the textbooks are basically useless and the teachers based on the textbooks can't explain, because the textbooks the teachers use can explain the concepts. it's a joke seriously. i find that these attacks make no sense. perhaps just trying to invent these concepts to confuse people.
@turtlepedia51492 жыл бұрын
i will explain you, leave a message in any of my vdos