filmov
tv
Cryptography - Basics #cryptography #studymaterial #informatio #theory

Показать описание
In this video, the basic idea of cryptography is discussed. Classification of cryptographic techniques, different algorithms to encrypt and decrypt any message for secure transmission and reception are also discussed.
The topics covered here in this video are as follows.
1. Cryptography
2. Types of Threat in Communication
3. Security Concerns in Communication
4. Classification of Cryptography
5. Comparison: Symmetric Key and Asymmetric Key
6. Substitution Cipher
7. Transportation Cipher
8. Stream Cipher
9. Block Cipher
10. Encryption
11. Decryption
12. Key
13. Hash
14. Initialization Vector
15. Salt
16. HTTPS
17. End-to-End Encryption
18. Symmetric Key
19. Asymmetric Key
20. Data Encryption Standard (DES)
21. Advanced Encryption Standard (AES)
22. Comparison between DES and AES
23. Kerckhoff’s Principle of Cryptosystem
24. RSA Algorithm
25. Generation of Public key and Private using RSA algorithm
26. Network Security
27. Types of Network Security Attacks
28. One-Time Password (OTP)
29. Side Channel Attack
30. Brute-Force Attack
31. Applications of Cryptography
For additional reading, follow the references.
The topics covered here in this video are as follows.
1. Cryptography
2. Types of Threat in Communication
3. Security Concerns in Communication
4. Classification of Cryptography
5. Comparison: Symmetric Key and Asymmetric Key
6. Substitution Cipher
7. Transportation Cipher
8. Stream Cipher
9. Block Cipher
10. Encryption
11. Decryption
12. Key
13. Hash
14. Initialization Vector
15. Salt
16. HTTPS
17. End-to-End Encryption
18. Symmetric Key
19. Asymmetric Key
20. Data Encryption Standard (DES)
21. Advanced Encryption Standard (AES)
22. Comparison between DES and AES
23. Kerckhoff’s Principle of Cryptosystem
24. RSA Algorithm
25. Generation of Public key and Private using RSA algorithm
26. Network Security
27. Types of Network Security Attacks
28. One-Time Password (OTP)
29. Side Channel Attack
30. Brute-Force Attack
31. Applications of Cryptography
For additional reading, follow the references.