Introduction to Advanced Encryption Standard (AES)

Поділитися
Вставка
  • Опубліковано 2 жов 2024

КОМЕНТАРІ • 20

  • @bitflyer-yx4kb
    @bitflyer-yx4kb 8 місяців тому +85

    not all heros wear caps , sometimes it could be an indian mind behind a youtube video

  • @pleego20
    @pleego20 11 місяців тому +10

    You are a life saver! Thank you so much. What was taught by my professor in 4 hrs, took you 10 mins. So concise and straight to the point :)

  • @ashwinivaidya4183
    @ashwinivaidya4183 8 місяців тому +2

    Dear neso ,could you help me out by implementing AES,RSA algorithm,and other substitution techniques , in C c++ or java

  • @GamingWithSamiCheema
    @GamingWithSamiCheema 4 місяці тому +1

    What to do , if we have Key or plaintext other than 128 or 192 or 256 bits??? What if plain text is less than 128 bits?

    • @tonnytrumpet734
      @tonnytrumpet734 4 місяці тому +1

      Plaintext would be extended with padding to have right size. Plaintext is rarely right size for AES it is very common it requires padding to be some multiplication of 128bits

    • @GamingWithSamiCheema
      @GamingWithSamiCheema 4 місяці тому +1

      @@tonnytrumpet734what is padding?
      For example, we have key as:
      August
      So how to complete it to 16 bytes

    • @tonnytrumpet734
      @tonnytrumpet734 4 місяці тому +1

      @@GamingWithSamiCheema Take it with a grain of salt, but my understanding is that it will be extended for example to August\x0A\x0A\x0A\x0A\x0A\x0A\x0A\x0A\x0A\x0A. (You just added 10x x0A Byte at the end of it to extend August which was 6 bytes to 16bytes)
      It depends on the type of padding which will be used there are different types. This one is for example is defined by PKCS7. Padding is usually just repeatedly adding some specific bits just to make message longer so it fits the required bit length.
      Then you have right length for plaintext and you can encrypt it with AES block cipher. When decryption happens you still will have plaintext with padding and you have to also remove it afterwards to get purely message.

    • @GamingWithSamiCheema
      @GamingWithSamiCheema 4 місяці тому

      @@tonnytrumpet734 okay, thank you so much

  • @BrendaSchmitz-e2n
    @BrendaSchmitz-e2n 16 днів тому

    Taylor Dorothy Martin Frank Lopez Jose

  • @aminvogue
    @aminvogue 7 місяців тому +2

    Thanks for the elaborate vdos on the subject matter, these are golden n u r a true gem of teacher .

  • @SmithTina-f8h
    @SmithTina-f8h 28 днів тому

    Lewis Thomas Hall Dorothy Thompson Robert

  • @BirrellQuentin-c6y
    @BirrellQuentin-c6y 26 днів тому

    Gonzalez Dorothy Lee Michelle Walker Paul

  • @ReshmaShaik-zi9rz
    @ReshmaShaik-zi9rz 7 місяців тому +2

    Dhanyavadanulu guruji ..,🙏

  • @souravbhagat1358
    @souravbhagat1358 Рік тому

    UNIT-IV
    SECURITY PRACTICE & SYSTEM SECURITY:Authentication applications-Kerberos-X.509
    Authentication services - Internet Firewalls for Trusted System: Roles of Firewalls-Firewall
    Firewall designs related terminology Types of Firewalls SET for E-Commerce
    Virus and related threats
    Transactions. Intruder Intrusion detection system
    Countermeasures-Firewalls design principles - Trusted systems-Practical implementation of cryptography and security

  • @ayz.7
    @ayz.7 Рік тому +2

    🎉

  • @sarobotics
    @sarobotics Місяць тому

    Thanks big dawg

  • @souravbhagat1358
    @souravbhagat1358 Рік тому

    Pls make a vedio on this topic: Blow fish RC -5 Algorithm..

  • @MathAfta
    @MathAfta 9 місяців тому +1

    clear and logically sound !!

  • @jagadeshkrishna6229
    @jagadeshkrishna6229 9 місяців тому

    💥