Simplified DES(Data Encryption Standard)(Information Security)

preview_player
Показать описание
1.Security goals
4.Basic terms in information security
5.Caesar cipher
6.Affine cipher
8.Multiplicative inverse
11.Autokey cipher
12.Hill cipher
13. Vernam cipher
14. Vigenere cipher
15.Raifence cipher
16. Railfence cipher when depth not given
17.Columnar cipher
18.Gcd of alphabets
19.Euclidean algorithm
20.Extended Euclidean algorithm
21.Euler's Totient function
22.Fermat's Theorem
23.Euler's Theorem
24 .Chinese Remainder Theorem
25)Diffie Hellman Key Exchange Cryptosystem
26) Simplified DES(Data Encryption standard)
27)RSA algorithm
28) Elgamal Digital Signature Scheme
Рекомендации по теме
Комментарии
Автор

That was an amazing explanation. You’ve taught me a lot in this video and made a subject I was struggling with seem so simple.❤

celdia
Автор

In 21:55 s0, s1 is noot needed i hope for x0r if done for 3 digit odd nos of 1 are 1 for xor. So technically 011 should be 0. Btw answer is correct 💯

Adwrells
Автор

Hats off to you mam than you so much for this amazing explanation 💕💕

laibafiaz
Автор

i am learning Cryptography and Network Security at university. thank you for this video. it helps me get better to learn this subject.

duyduyduy
Автор

that was a really great explanation. thank you maam

divyansh
Автор

It's so helpful!!
Thank you so much

gatluthoars
Автор

Thank you for this explanation. Does this process go same way when Encrypting using 128-bit? I would be grateful if you could please respond to this. Thanks

Potenthial
Автор

where did the initial permutation table come from?

aditidiwakar
Автор

Why are we giving two bits shift for round two? for generating Key2...
As we defined For round 1, 2, 9, 16...we have to give left shift of one bit...

learnwithjaffri
Автор

mam are u explain key generation or enctortion

AbdulRaffay-gymr
Автор

THANKS....HOW LONG DO WE HAVE TO CONTINUE?? HOW DO WE KNOW THAT THIS AMOUT OF ROUNDS ARE NEEDED TO E PERFORMED FOR A PARTICULAR QUESTION??

LetzzRockk
Автор

Mereko toh lagta hai baite baithe boor ho raha tha koi islye bana diya ye problem sar pair hi nahi hai 😢😢

bhavyasharma
Автор

how we will find IP-1 (IP inverse) and give steps to solve round 2

shaziakalsoom
Автор

aap hammmari Uni Ajao 6 months k liaye 😔😔😔 joun he semester end hoga aap chali jana .

chjibrann
Автор

P10 and P8 input and output tables are always given in the question???

Encrypt the plain text 01101001 using the key 1010000100 using S-­DES. Show all calculations and result.

How we can perform in this question?? Please reply anyone 🥺

SohamChowdhury
Автор

LS-1 and LS-2 as executed are NOT shifts! The bit manipulations were ROTATES, NOT shifts.

steveandamyalso
Автор

mam aap ny stop nahi kerna hopeless ho k keep going You are a moon not star

chjibrann
Автор

I have a question is the ques are finished or not round 2, 3 are to find or not

nobishizu