Data Encryption Standard (DES) - Explained with an Example - Cryptography - CyberSecurity - CSE4003
Вставка
- Опубліковано 30 лип 2020
- In this video we will be understanding the following
1. What is DES - Data Encryption Standard
2. Algorithm behind DES
3. DES is explained with an example.
That's literally the best tutorial on DES I've ever seen on youtube. So practical and very detailed. thank you so much sir. I highly appreciate your work
Look! Everyone on here. From this video, I realized if you don't understand any form of instruction, complex or simple (math, science, logic, etc) it is not your fault. The burden of you understanding a section of instructions or lesson lies largely on the person teaching. Thank God for the internet. If something is not too from your instructor, try learning it from other sources until it is clear. It worked for me. Cryptography has been like a mystery over my years in cyber security. THIS VIDEO right here proves my theory. "It wasn't my fault". @Satish CJ! You've made my years! 🤣 For the rest of my life, I can explain DES to anyone in my sleep! Sorry, this is a long comment.... but AMAZING.
Glad to know the video helped. I understand it's a long comment.. but it's the best comment I have had so far. Thanks for the nice feedback
In my opinion, this video is much easier to follow and much more detailed than other explanations of DES available online. Thank you.
... this is exactly what I needed to help me understand DES, thank you for sharing this video.
Thank you for the effort you put into detailing every step ! I have to code an implementation as part of a school project and it is very very helpful !
man I appreciate ur time to made this vdo series, no matter how many views u got or what, this information r valuable.cheers!
Geniusly Executed. Thank you , This has been very helpful
This is the best tutorial on DES. Thank you sir, really helpful explanations.
Best Ever Tuotorial on DES, best ever literally! - idk why is this so underrated....
Sir. Very nice. Patience in explaining step by step. Long video, but I deserved the time for explanation.
You’re the best man 🙏🏻🔥
This video is soo helpful, You need much more reach and appreciation than this, You literally helped me out a lott!!! Great work thankssssssss
Thank you sir, Very helpful explanations
Sir your patience is remarkable, thank you for this!
Glad to know the video helped. Thanks for the feedback
Very very helpful video, thx for this
Thanks for your good lecture. Pls post more videos about cybersecurity
very helpful video!
Such a wonderful explanation with an example. Thank you so much
Glad it was helpful!. Thanks for the nice feedback!!
Sir this is the best video for DES!! Thanks a lot for helping me at the last min of exam preparation :,-)♡
Glad to know the video helped. Thanks for the nice feedback
Neat explanation. Grateful I found this first among all other videos.
Great to hear!.. Thanks for the nice feedback!!
one of the best lecture on DES on youtube. Thank you sir.
Wow, thank you!
Thank you sir ...very well explained ...one of the best video on DES algorithm
You are most welcome. Thanks for the feedback
Great Video. Made it very easy to understand
Glad it helped!
I thought the comments exaggerated, but this video is *actually* better than the ones by million sub channels. Extremely easy to follow and very practical. Sir kindly never stop making these, you're a blessing
Thanks for the inspiring feedback. Glad to know you liked the lecture
Really helpful!!
Amazing!
Thank you so much sir!
Sir, thank you so much for all the effort and didactics you put on this work. I was trying to find a video that I could understand DES for days and this one saved my assignment and my student life! lol
greetings from Brazil!
Glad to know the video helped.Thanks for the nice feedback
I enjoyed this. However, I'd like to ask the following questions:
1. How were the values in the S-box table generated?
2. How do you carryout the decryption processes.
Thank you.
This tutorial was awesome!!
Glad you liked it
Really outstanding DES tutorial.
Thanks for the nice feedback
THANK YOU SOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOOO MUCH ❤❤❤❤❤❤❤❤
Thank you!
Thanks a lot for this Sir, very well done lecture :)
Most welcome! Thanks for the nice feedback 👍
sir you are very clear on this ty!
Glad it was helpful!
explained in a very simple way sir.. thnks a lot
You are most welcome
Thank you sir!! You've saved me from tutorial hell
Glad I could help!
Sir,These pc tables are of pre-defined or else we can take of our own
the permutation table is provided in the exam or do we have to carry the tables with us.....and is this permutation tables is common for all problems or different
I need help in speck lightweight encryption and key generation thank you so much
bestest
Sir could you please explain the design principle of s box & p box
sir should we learn all pc tables???this is my doubt sir
Is the value of PC-1 table and pc-2 table constant or given?????? additionally the value of iteration to left shifts is it constant ??? please i need your help to understand!
Exactly, I also wanted to know. And, searching through the web and some books, he uses the same tables. So, I guess these tables are the convention. There's also a Wikipedia article on this: en.wikipedia.org/wiki/DES_supplementary_material#Initial_permutation_(IP)
in 8:53 the second part of the key+ should be 1110011 instead of 0110011
Question: if there are 64 bits in the key and only 56bits on the PC1 matrix, do the remaining 8 bits on the key just not get used?
yes they are not used
How to write pc 2
Aced it.
Sir please share DES notes
there is a mistake in the video. when generating the 56th key from a 64-bit key, the 21st bit will be 0, not 1
If that is a mistake.. Thanks for pointing it out. I might have missed it while scanning a big string of 0's and 1's. Really glad that you are able to spot such errors. Thanks for the correction
oh, sorry, it’s not a mistake, the key is correct. it is a typo in PC1 table. on the last row instead of 21, there should be 12 ^^
and because the value of 12 and 21 bits are different, I thought it’s an omission in calculations
Sir, I need the powerpoint file, please
What are the steps for DES decryption?
same to encryption just you need to encrypt decrypted text with same key, in which you encrypted
BBS WALO YAHA ATTENDENCE LAGAO
Sir, who invented this?
Please let me know 😡
That's literally the best tutorial on DES I've ever seen on youtube. So practical and very detailed. thank you so much sir. I highly appreciate your work