noc20 cs02 lec02 Symmetric key Encryption

  Рет қаралды 29,246

NPTEL - Indian Institute of Science, Bengaluru

NPTEL - Indian Institute of Science, Bengaluru

Күн бұрын

Problems addressed by cryptography ,Types of cryptographic primitives,Symmetric key encryption scheme,Kerckhoffs’ Principle,Properties of secure cipher,Formalizing privacy definition,Attack models,Ciphertext only attack (COA),Chosen plain text attack (CPA),Chosen cipher text attack (CCA),

Пікірлер: 16
@PasinduTennageprofile
@PasinduTennageprofile 3 жыл бұрын
Really good lecture! Thanks Professor!
@adgjpmwt
@adgjpmwt 2 жыл бұрын
Very Good Lecture... Thank you Sir..
@raghavendravernekar4103
@raghavendravernekar4103 3 жыл бұрын
Such a nice lecture. Thanks Sir.
@kartik7415
@kartik7415 3 жыл бұрын
In KPA and CPA, even if the attacker has pairs of (m, c), there are very less no. of chance that they will match the fresh message encrypted by the sender (because of randomized algorithm). so how they are considered as an attack since there is very much less probability of adversary having the same pair. BTW LECTURES ARE SO INTERESTING AND HELPFUL
@varunjindal7657
@varunjindal7657 2 жыл бұрын
m can match, m is not randomized. You might be sending same message again, so that will be directly found in database, m is unencrypted. The corresponding c, for second time sending might be different, but m can have multiple entries resent in database Edit: m cannot be known, because if that is known, there is no privacy then
@varunjindal7657
@varunjindal7657 2 жыл бұрын
U r right, even if m is there in database, we should be searching database with ciphers read over channel (if we are able to read new message m, there is no cryptography). Then due to randomization, the chance of c matching with database is less
@rakshitmannur4624
@rakshitmannur4624 3 жыл бұрын
Thank you sir 🔥
@vibhas4686
@vibhas4686 5 жыл бұрын
what do you mean by 'compute some function of the underlying plaintext'?
@AparajitaTheInvincible
@AparajitaTheInvincible 5 жыл бұрын
Any kind of the information about the underlying message, encrypted in a ciphertext, can be viewed as computing some function of that message. For ex, if one is interested to learn the LSB of the message, then that is a function. If one wants to find the range of the message, then that is another function, etc
@avtarsingh-tz1up
@avtarsingh-tz1up 3 жыл бұрын
this intro theme is from mathologer
@jhansin5882
@jhansin5882 2 жыл бұрын
Please explain from basis!!!
@moonbook9854
@moonbook9854 10 ай бұрын
3). 33:55 4). 38:12
@learningtogether5008
@learningtogether5008 Жыл бұрын
Instead of using ppts.... Plz use white/blackboard
@KD-uj9tc
@KD-uj9tc 10 ай бұрын
Hey can you help me in getting this course weekly assessment answer it will mean a lot
@mediaanalysis4708
@mediaanalysis4708 2 жыл бұрын
Now some BJP minister will say that Ram was talking to Sita by mobile....!!!!
noc20 cs02 lec03 Historical Ciphers and their Cryptanalysis
26:48
NPTEL - Indian Institute of Science, Bengaluru
Рет қаралды 16 М.
noc20 cs02 lec07 Semantic Security
49:56
NPTEL - Indian Institute of Science, Bengaluru
Рет қаралды 10 М.
Who is More Stupid? #tiktok #sigmagirl #funny
0:27
CRAZY GREAPA
Рет қаралды 10 МЛН
Caleb Pressley Shows TSA How It’s Done
0:28
Barstool Sports
Рет қаралды 60 МЛН
진짜✅ 아님 가짜❌???
0:21
승비니 Seungbini
Рет қаралды 10 МЛН
Война Семей - ВСЕ СЕРИИ, 1 сезон (серии 1-20)
7:40:31
Семейные Сериалы
Рет қаралды 1,6 МЛН
Cryptanalysis
11:32
Neso Academy
Рет қаралды 203 М.
noc20 cs02 lec01 Introduction
28:38
NPTEL - Indian Institute of Science, Bengaluru
Рет қаралды 61 М.
Multiple Encryption and Triple DES
20:54
Neso Academy
Рет қаралды 56 М.
noc20 cs02 lec06 Introduction to Computational Security
36:13
NPTEL - Indian Institute of Science, Bengaluru
Рет қаралды 13 М.
Private Key Encryption (Symmetric Key Encryption)
4:52
Sunny Classroom
Рет қаралды 134 М.
Who is More Stupid? #tiktok #sigmagirl #funny
0:27
CRAZY GREAPA
Рет қаралды 10 МЛН