Thanks a ton for these lectures. It is helping me to understand the concept in a clear way. My university is following the book "Security in Computing" 5th edition by Charles P.Pfleeger. They are recommending us to read the book, which is really a boring thing for me. I am confused about which book you have followed and ignoring reading the suggested book from my university. Is it ok to just follow your lectures for exam preparation? I believe you can advise me in a better way. I just want to avoid reading books and still want to have good preparation by following your videos. Thank you. :)
You explain really well, just reduce the number of advertisements in between please, it breaks the concentration. Maybe you can put then all in the beginning and in the end
Hey bro can you explain me the same thing given in the 7th edition there i have doubt in their orignal sequence number I m student from the same book but of 7th edition
Man, the video are very good, even a person from a different area can understand this clearly, and can you recommand me a good book on this topic of cryptography
Key will not be given like this But if it happens then you can give more priority to that alphabet which occurs first in your word Example AXCC will become 1423
Asslam u alaikum Sir Aik question hai kindly answer krdy Question: IT Security Personnel Security Physical Security Operational Security Into which of these would you put the following, justify your choice? Enforcing hard-to-guess passwords Encrypting your hard drive Looking sensitive documents in a safe Stationing a marine guard outside an embassy Assigning security clearances to staffers Using SSL for data transfer Having off-site backup of documents Plzzz sir i request you iska answer bta dy plzzzz
I think this is wrong because order should be according to key and you are taking cipher text as 1,2,3.....7 which is totally wrong. Cipher text must be as key order like-4(aodw) 3(tsuo) and so on. Please look into it otherwise students will get it wrong.
Tq bro.....all of your videos helped me a lot....God bless🙏🏻
Keep it up thanx for help in my mid term exam...
Hi , I love your teaching , is there any way to get then notes in pdf ??? would help immensely
Thanks a ton for these lectures. It is helping me to understand the concept in a clear way. My university is following the book "Security in Computing" 5th edition by Charles P.Pfleeger. They are recommending us to read the book, which is really a boring thing for me. I am confused about which book you have followed and ignoring reading the suggested book from my university. Is it ok to just follow your lectures for exam preparation? I believe you can advise me in a better way. I just want to avoid reading books and still want to have good preparation by following your videos.
Thank you. :)
Do you have notes of these lectures can you pls share them if you have
@@neghatnazir1668 yes
@@vickymishra7908 notes ho to do
Pdf
very well explained
Big Thanks brother ...🙏🙏🙏🙏
You explain really well, just reduce the number of advertisements in between please, it breaks the concentration. Maybe you can put then all in the beginning and in the end
Awesome explaination
I love your teaching idea
Gud presentation
Too good man ❤️
Bro you are the best 🙌
Life savior 🙏
what about decryption process?
Separate video
Kyu maje le raha hai 😃😏
bhai cryptography ka playlist hai cryptanalysis ka nhi
Just reverse the word simple
I mean to say reverse the all the step you do
much informative well done
thanks abhishek so helpful
thank you sir 😍😇
Hey bro can you explain me the same thing given in the 7th edition there i have doubt in their orignal sequence number I m student from the same book but of 7th edition
Man, the video are very good, even a person from a different area can understand this clearly, and can you recommand me a good book on this topic of cryptography
I am referring Cryprtography and network security by Behrouz A Forouzan
And
Cryptography and network security by William Stallings
Nice explaination
Please explain decryption technique for these transposition techniques
very nice video
Nice explanation....
sir in the integer value, key: if the letters are repeated how are they numbered? as you said numbers cannot be repeated
i guess you wont get a key with same characters
Great sir
Excellent
Great explanations
How to solve if in the given key an alphabet is repeated in row transposition cipher?
Key will not be given like this
But if it happens then you can give more priority to that alphabet which occurs first in your word
Example AXCC will become 1423
Thank you
In a row transportation what is interger value of key Aabhi..? number should not repeat right..?
Abhishek Sharma is here man
What is a letter with 2 same letter need to be encryoted for row transposition ? For eg ‘need’ , how to give values ?
Sir, we have to leave 1 space after each word in rail fence technique
I have a question. What is the difference between row transposition and columnar transposition?
both are same just different name I think..
It is also known as block transposition
Sir which book should be best, which includes entire subject topic of CNS
Cryptography and Network Security by Behrouz A. Forouzan
Key kaise likhe ho (integer) pls reply
For which exams will it be helpful??
Colleges exams and any competitive exam in which u have Cryprtography as a subject
@@AbhishekSharmaDit Can we get your notes pleaseeeeeeeee? :)
@@Mr_SSKhave you got the notes or you made?
@@Kk_2072 Yaar, ye sab na yaad dilao, vul chuka hoon mai ye sab boht mushkil se...
How to many real fence depth we can use
While explaining row transformation how you decide to take key?
Hello sir, In row transposition cipher why we get only 7 columns. Why not get the 6, 8 or 5.
Yes, I have same doubt?
we do not need any key in in rail fence cipher right?
Which book you are using? Can you pls tell?
🔥
what if key is like striipe so we will take same value for both i?
What if the key in row transposition has same alphabets eg: HELLO instead of CRYPTO
Asslam u alaikum Sir
Aik question hai kindly answer krdy
Question:
IT Security
Personnel Security
Physical Security
Operational Security
Into which of these would you put the following, justify your choice?
Enforcing hard-to-guess passwords
Encrypting your hard drive
Looking sensitive documents in a safe
Stationing a marine guard outside an embassy
Assigning security clearances to staffers
Using SSL for data transfer
Having off-site backup of documents
Plzzz sir i request you iska answer bta dy plzzzz
bhaiya decrypt kr ke original line kaise laye??
decryption bhi bata dete guruji to achha hota
which book you are using?
What if we have 2 same letters in the key for ex key = CRACK in which there are 2 C's.
Or this is not possible n key will always have diff letters ?
In this case priority will be given to repeated alphabet that comes first like in this case CRACK will become 25134.
If the key is stripes so what repition???
In sab techniques ki decryption kha ha???
Hi Sir,
Can you please share pdfs of these notes. That will be really appreciated.
Thanks
Have you got the pdf or you made notes..?
Bhaiya I need your advice.
Mere syllabus me DES topic se start hua hai to kya hum Substitution and transpositions technique skip kar de .
Karlo to better rahega
Warna jaha b substitution and transposition use hoga waha clear ni hoga ache se
@@AbhishekSharmaDit ok thanks for the advice
Bro can you gives use the notes pdf...
This so helpfull for as...
Bhai Isme.... discription process kaise hoga
Notes available hoga kya
Bhai yeh notes pdf me share bhi krdete toh bht accha rhta.
Did you get the notes or you made yourself..?
I am studying this subject through your video not from my teacher , please upload the notes pdf.
If you have notes of all these lectures. Please share
bro mujhe bhi chahiye notes!!! tere paas ye notes hai toh bhej sakta hai pls🙏🙏🙏🙏
bro can you share notes if you have of crypto
i would be thankful of you
Bro deception kaise. Hoga.
Respect sir university Student kindly make more course in Hindi in Urdu in Post Quantum Cryptography Please sir
hi sir, how can we get your notes also, kindly give these notes for exam preparation it will help a lot
Have you got the pdf or you made notes..?
Bhai rotor machine pa bhi ak video bna dain
Which Book You will Be Used in this Lecture ?
attack postponed by two hour? broken enigma ! || IMITATION GAME
Sir may I take your notes in PDF from
Can you share written notes with us ?
Did you get the notes or you made yourself?
@@Kk_2072bro I cleared exam and got the job also 1.5 years of experience I have this is good channel you can make a notes by watching this videos
Treat due, if I passed in my upcoming semester exam
How to decrypt it
Can you provide notes...
I have same book as u used😅😅
Which book?
learn 2024 for mid term exam
sir can you please share notes ??
book ka name batao bro.
Please send your written notes also
pls can you share the notes pls bro
i would be thankful of you
Bro sare text ka ek PDF banaker send Kar do
Book name? Jo video ma ha...
Cryptography and network security by behrouz a forouzan
Sir notes kii PDF bii chye sir
please give the notes than we understand better
Bhai notes hoto pdf me to discrimination link dedo
can i get your notes pdf
There is no information about hill cipher
We have a dedicated video on this topic. Check the cryptography playlist
please upload those notes T-T
Notes?
hey bro...plz share the notes pdf...
Did you get notes ? If yes can you please share
with me also🙏🙏🙏🙏
@@adityapatole9691did you make notes ?
Bro Please Send the Notes
please snap the notes by mob and upload it to drive
Did you get notes ? If yes can you please share
Did you get notes ? If yes can you please share with me also🙏🙏🙏🙏
Nooo
OWP+++
I think this is wrong because order should be according to key and you are taking cipher text as 1,2,3.....7 which is totally wrong. Cipher text must be as key order like-4(aodw) 3(tsuo) and so on.
Please look into it otherwise students will get it wrong.
If you are not going to speak in english, please point out that in the title. You waste people's time.
You can find thousands of videos in English, but these all lectures only for Hindi or nearest language...
Kaun kaun 2025 me dekh raha hai
How to decrypt