Cryptanalysis

  Рет қаралды 193,365

Neso Academy

Neso Academy

Күн бұрын

Пікірлер: 28
@udoegodstreasure671
@udoegodstreasure671 Жыл бұрын
Thanks for this wonderful lecture, I'm always happy that your lectures are in English which allows me as an international student to understand this subject
@DozedUP007
@DozedUP007 3 жыл бұрын
I had difficulties with this topic.. I stumbled upon this video and now I understand the topic. Gr8 video mate. I hope I find other videos I need in the video list.
@ruwanwijekoon1122
@ruwanwijekoon1122 2 жыл бұрын
Great explanation. Thank you. You are an excellent teacher.
@twinkletata
@twinkletata 9 ай бұрын
Good explanation. Thanks
@myname1484
@myname1484 2 ай бұрын
Thank you 🙏
@kishsaam
@kishsaam 2 жыл бұрын
Great video... congratulations
@SandyNico-o6e
@SandyNico-o6e 9 ай бұрын
Nice topic
@manytuch
@manytuch Жыл бұрын
Great video!
@anonmuss7035
@anonmuss7035 3 жыл бұрын
Good video......Please include captions.......Thank You......
@tech-learner4555
@tech-learner4555 3 жыл бұрын
Please enable capttions in every videos
@gr33narr0w55
@gr33narr0w55 3 жыл бұрын
Nicely explained 👌
@Ototoxi
@Ototoxi 2 жыл бұрын
Easily explained sir 👍
@sidharthshankar2136
@sidharthshankar2136 3 жыл бұрын
Your an excellent teacher.......
@playlistc342
@playlistc342 9 ай бұрын
What about a known ciphertext attack when attacker have a couple of cipher and decrypted cipher = plaintext ?
@avejessi4175
@avejessi4175 2 жыл бұрын
0:38
@prabagaran.s1285
@prabagaran.s1285 Жыл бұрын
I have college assignment, Differential cryptanalysis attack on Feal-4 algorithm , we have choose plain text and cipher text. I have done four rounds. and got 6 subkeys. , when i use the six sub keys to encrypt and decrypt , verification working fine , but my college professor. say like this . below. Only one value is given for each key - most are out by a few bits, but one is correct. Code seems to be largely based on Amazing Kings, without any real understanding of how the attack works what's your opinion on it.
@JohnDerhammer-oq9zi
@JohnDerhammer-oq9zi Жыл бұрын
Then why did they choose two-fish over Raj-13 for AES standard?
@ryyb3880
@ryyb3880 3 жыл бұрын
the algorith doesnt have to be known for all of these....
@srushtiprajapati8709
@srushtiprajapati8709 10 ай бұрын
R u sure?
@scrunchiestylepk
@scrunchiestylepk Жыл бұрын
Thankuuu
@anjaligupta-ew6ns
@anjaligupta-ew6ns 3 жыл бұрын
Sir please upload full cource of Compiler Design
@mdmahinuddin4412
@mdmahinuddin4412 3 жыл бұрын
sir please provide the ppt thanks a lot sir
@moatazalnasan3905
@moatazalnasan3905 3 жыл бұрын
🙏🏻
@rimsha6001
@rimsha6001 2 жыл бұрын
Asslam u alaikum Sir Aik question hai kindly answer krdy Question: IT Security Personnel Security Physical Security Operational Security Into which of these would you put the following, justify your choice?  Enforcing hard-to-guess passwords  Encrypting your hard drive  Looking sensitive documents in a safe  Stationing a marine guard outside an embassy  Assigning security clearances to staffers  Using SSL for data transfer  Having off-site backup of documents Plzzz sir i request you iska answer bta dy plzzzz
@junaiddar2586
@junaiddar2586 2 жыл бұрын
Using SSL
@vont8424
@vont8424 3 жыл бұрын
don't understand at all. talk too fast as though the presenter is trying to beat the clock. i watch and watch many times trying to understand, especially the chosen plaintext and chosen ciphertext. still don't understand the explanation. actually it is not only this presenter. i find that none of those videos I've watched so far actually explain these concepts clearly. even college textbooks written by super well-known authors can't explain the concepts clearly. no wonder students are never able to understand, because the textbooks are basically useless and the teachers based on the textbooks can't explain, because the textbooks the teachers use can explain the concepts. it's a joke seriously. i find that these attacks make no sense. perhaps just trying to invent these concepts to confuse people.
@turtlepedia5149
@turtlepedia5149 2 жыл бұрын
i will explain you, leave a message in any of my vdos
@heavymetalrox268
@heavymetalrox268 10 ай бұрын
How did y'all get through with the accent? 😂
Brute Force Attack
8:46
Neso Academy
Рет қаралды 137 М.
Classical Encryption Techniques
8:32
Neso Academy
Рет қаралды 195 М.
Tuna 🍣 ​⁠@patrickzeinali ​⁠@ChefRush
00:48
albert_cancook
Рет қаралды 102 МЛН
А я думаю что за звук такой знакомый? 😂😂😂
00:15
Денис Кукояка
Рет қаралды 6 МЛН
Creative Justice at the Checkout: Bananas and Eggs Showdown #shorts
00:18
Fabiosa Best Lifehacks
Рет қаралды 35 МЛН
Differential Cryptanalysis || Lesson 28 ||
12:55
Learning Monkey
Рет қаралды 1,1 М.
Cryptanalysis and its Types | What is Cryptology in Network Security
10:03
Are AI advancements already slowing down?
13:29
CNBC
Рет қаралды 170 М.
Caesar Cipher (Part 1)
13:23
Neso Academy
Рет қаралды 567 М.
This Video is AI Generated! SORA Review
16:41
Marques Brownlee
Рет қаралды 2,7 МЛН
The Keyboard IS the Computer! (Pi 500)
10:20
Jeff Geerling
Рет қаралды 226 М.
Cracking Enigma in 2021 - Computerphile
21:20
Computerphile
Рет қаралды 2,5 МЛН
Tuna 🍣 ​⁠@patrickzeinali ​⁠@ChefRush
00:48
albert_cancook
Рет қаралды 102 МЛН