Cipher Block Chaining (CBC)

  Рет қаралды 67,605

Neso Academy

Neso Academy

Күн бұрын

Пікірлер: 19
@KawtherBenElkahia-gz5sk
@KawtherBenElkahia-gz5sk 24 күн бұрын
I skipped my IT Security lectures, but his videos have rescued me ! Keep the good work
@adithyarajapakshe3791
@adithyarajapakshe3791 Жыл бұрын
Bro you're like the best teacher ever
@leehaynes7761
@leehaynes7761 Жыл бұрын
Thank you for creating this video, you have really helped me understand in a clear way how CBC works.
@NanthaGopalJ-o6r
@NanthaGopalJ-o6r 4 ай бұрын
you are explaining better than my professor,
@josemorris1790
@josemorris1790 Жыл бұрын
Very good explanation
@jagadeshn4730
@jagadeshn4730 7 ай бұрын
Nice explanation !!
@heyiamuday
@heyiamuday Жыл бұрын
wow ../ great explanation
@robertkrasniqi6612
@robertkrasniqi6612 Ай бұрын
Thank you for the video, it is very helpful! At 6:43, why does CBC also offer authentication, you justify it with the IV, but this is not transmitted securely?
@Huda_khan.i
@Huda_khan.i Жыл бұрын
i studied my all engineering courses on this platform and now I m worried that their are no lecture available on communication system
@souravbhagat1358
@souravbhagat1358 Жыл бұрын
Pls make a vedio lectures on Internet security protocol which is tha part of network security and also authentication part
@fadalinitube
@fadalinitube 9 ай бұрын
Thank u so much
@luka_17_63
@luka_17_63 Ай бұрын
I hope you will reply, i have a question, is the encryption part then something like AES Encryption? So for the first block of the plaintext we are combining it the IV via XOR and this output will be get to AES for encryption and so on?
@mertcanzafer9901
@mertcanzafer9901 2 ай бұрын
There is also one thing I noticed here is that even if we can not encrypt the data in parallel, but we can decrypt the data in parallel using CBC operation. How? Because all ciphertext are known so you don't need to wait for previous ciphertext to produce the plain text!!!
@NestorFeliciano
@NestorFeliciano 11 ай бұрын
nice!
@sauru_6527
@sauru_6527 Жыл бұрын
संजीवनी jindabad 2:49
@sauru_6527
@sauru_6527 Жыл бұрын
Btech computer 💻 A division Rno 7 Bramhamgaonkar 3:36
@abedzaben
@abedzaben 9 ай бұрын
how the IV is extracted during the decryption?
@1004-u5t
@1004-u5t 2 ай бұрын
but both sides need to know rhe key as well so the key provides authentication for all modes.
@Huda_khan.i
@Huda_khan.i Жыл бұрын
why there is no lecture on modern Digital and analogue communication By bp lathi edition 4
Cipher Feedback (CFB)
13:46
Neso Academy
Рет қаралды 55 М.
Introduction to Advanced Encryption Standard (AES)
11:07
Neso Academy
Рет қаралды 246 М.
The evil clown plays a prank on the angel
00:39
超人夫妇
Рет қаралды 53 МЛН
She made herself an ear of corn from his marmalade candies🌽🌽🌽
00:38
Valja & Maxim Family
Рет қаралды 18 МЛН
Chain Game Strong ⛓️
00:21
Anwar Jibawi
Рет қаралды 41 МЛН
Electronic Codebook (ECB)
11:30
Neso Academy
Рет қаралды 60 М.
Modes of Operation - Computerphile
14:16
Computerphile
Рет қаралды 229 М.
Multiple Encryption and Triple DES
20:54
Neso Academy
Рет қаралды 55 М.
Lecture 9: Modes of Operation for Block Ciphers by Christof Paar
1:25:14
Introduction to Cryptography by Christof Paar
Рет қаралды 99 М.
Feistel Cipher Structure
14:13
Neso Academy
Рет қаралды 207 М.
How To Design A Completely Unbreakable Encryption System
5:51
Half as Interesting
Рет қаралды 513 М.
The evil clown plays a prank on the angel
00:39
超人夫妇
Рет қаралды 53 МЛН