Thanks for this wonderful lecture, I'm always happy that your lectures are in English which allows me as an international student to understand this subject
I had difficulties with this topic.. I stumbled upon this video and now I understand the topic. Gr8 video mate. I hope I find other videos I need in the video list.
I have college assignment, Differential cryptanalysis attack on Feal-4 algorithm , we have choose plain text and cipher text. I have done four rounds. and got 6 subkeys. , when i use the six sub keys to encrypt and decrypt , verification working fine , but my college professor. say like this . below. Only one value is given for each key - most are out by a few bits, but one is correct. Code seems to be largely based on Amazing Kings, without any real understanding of how the attack works what's your opinion on it.
Asslam u alaikum Sir Aik question hai kindly answer krdy Question: IT Security Personnel Security Physical Security Operational Security Into which of these would you put the following, justify your choice? Enforcing hard-to-guess passwords Encrypting your hard drive Looking sensitive documents in a safe Stationing a marine guard outside an embassy Assigning security clearances to staffers Using SSL for data transfer Having off-site backup of documents Plzzz sir i request you iska answer bta dy plzzzz
don't understand at all. talk too fast as though the presenter is trying to beat the clock. i watch and watch many times trying to understand, especially the chosen plaintext and chosen ciphertext. still don't understand the explanation. actually it is not only this presenter. i find that none of those videos I've watched so far actually explain these concepts clearly. even college textbooks written by super well-known authors can't explain the concepts clearly. no wonder students are never able to understand, because the textbooks are basically useless and the teachers based on the textbooks can't explain, because the textbooks the teachers use can explain the concepts. it's a joke seriously. i find that these attacks make no sense. perhaps just trying to invent these concepts to confuse people.
Thanks for this wonderful lecture, I'm always happy that your lectures are in English which allows me as an international student to understand this subject
I had difficulties with this topic.. I stumbled upon this video and now I understand the topic. Gr8 video mate. I hope I find other videos I need in the video list.
Great explanation. Thank you. You are an excellent teacher.
Good explanation. Thanks
Please enable capttions in every videos
Nice topic
Thank you 🙏
Good video......Please include captions.......Thank You......
Great video... congratulations
What about a known ciphertext attack when attacker have a couple of cipher and decrypted cipher = plaintext ?
Great video!
Then why did they choose two-fish over Raj-13 for AES standard?
I have college assignment, Differential cryptanalysis attack on Feal-4 algorithm , we have choose plain text and cipher text. I have done four rounds. and got 6 subkeys. , when i use the six sub keys to encrypt and decrypt , verification working fine , but my college professor. say like this . below.
Only one value is given for each key - most are out by a few bits, but one is correct. Code seems to be largely based on Amazing Kings, without any real understanding of how the attack works
what's your opinion on it.
Your an excellent teacher.......
Easily explained sir 👍
Nicely explained 👌
Sir please upload full cource of Compiler Design
Thankuuu
the algorith doesnt have to be known for all of these....
R u sure?
sir please provide the ppt thanks a lot sir
0:38
Asslam u alaikum Sir
Aik question hai kindly answer krdy
Question:
IT Security
Personnel Security
Physical Security
Operational Security
Into which of these would you put the following, justify your choice?
Enforcing hard-to-guess passwords
Encrypting your hard drive
Looking sensitive documents in a safe
Stationing a marine guard outside an embassy
Assigning security clearances to staffers
Using SSL for data transfer
Having off-site backup of documents
Plzzz sir i request you iska answer bta dy plzzzz
Using SSL
🙏🏻
don't understand at all. talk too fast as though the presenter is trying to beat the clock. i watch and watch many times trying to understand, especially the chosen plaintext and chosen ciphertext. still don't understand the explanation. actually it is not only this presenter. i find that none of those videos I've watched so far actually explain these concepts clearly. even college textbooks written by super well-known authors can't explain the concepts clearly. no wonder students are never able to understand, because the textbooks are basically useless and the teachers based on the textbooks can't explain, because the textbooks the teachers use can explain the concepts. it's a joke seriously.
i find that these attacks make no sense. perhaps just trying to invent these concepts to confuse people.
i will explain you, leave a message in any of my vdos
How did y'all get through with the accent? 😂