hi aravind thanks for your interest towards our channel and share my sessions with your friends and subscribe to our channel.Keep following our channel.
Sir i can't understand this topic from our professor and after watching this video i can understand clearly all videos related to network security, playlist is very easy to understand, thank you so much
thak you so much sir. I see every vdo of u. Network security topics when i see in book, it feels like i am not getting a singl word. But once i see a single vdo of u, i feel very satisfied with that topic. Thank you sir. U r doing a grt job. Keep it up and u will keep getting more blessings. God bless u.
hi kulkarni thanks for your interest towards our channel and share my sessions with your friends and subscribe to our channel.Keep following our channel.
Sir you have helped me a lot sir during my exams time. Your explonation is very goood and clear. Keep maintian that sir. You are one of the best teacher in my study career. I was scared about this subject and i found you on youtube. Now i learned lot of subject. Thank you very much sir.
Good explanation. At the university we had to make a block cipher written in python, they are fun to write and recommend anyone in the security field to write one to gain a good understanding of them.
Sir you are too good...The way you teach is so amazing...Each time when iam in need of some topics I first find your video and just when it's there I feel like the topic is done... Thankyou So much ..Ua videos are so helpful sir ...Plz always teach us like this only...
I think there has been a confusion between CFB and OFB , OFB mode operates on full blocks of plaintext and cipher text not on s-bit set while CFB operates on s-bit. Thank you by the way, your videos are very helpful.
hi hema thanks for your comment and soon i will try to do that thanks for your interest towards our channel and share my sessions with your friends and subscribe to our channel.Keep following our channel.
The way of expression is very interesting ,but what i want to say please take simple plain text as sample message and show how divide the message into block and how we Apply the encryption process!!!
1. Don't you lose the 64 - S bits by considering only S bits? 2. In the first step of the shift register, how can you select only S bits? That means during the entire encryption process you will work with S bits.
hi abhishek Thanks for your interest towards our channel and share my sessions with your friends and keep following our channel and don't forget to subscribe to our channel.
hi bhaskar thanks for your interest towards our channel and share my sessions with your friends and subscribe to our channel.Keep following our channel.
Hello Sir, thank you for this video. I loved watching as I understood. I would like to know why for the encryption, the algorithm can't just take the entire plain text in order to transform it into ciphertext? In order words, why does it have to always size the plain text in some fixes blocs? And also, what happens when the last plain text size is inferior to the fixed block size? Does the ciphertext will still remain with the same length? Thank you again and hopefully, I will find answers.
Sandeep very well taught , I had a small doubt in output rate cipher when we have N of block you said counter+N -1 why we have used -1 what it means. Please reply..
hi Yusuf actually if there are N blocks we are considering from 0 so the number of last block will be N-1. Hope your doubt has been clarified and sorry for the delay. thanks for your interest towards our channel and share my sessions with your friends and subscribe to our channel.Keep following our channel.
hi pankaj thanks for your interest towards our channel and share my sessions with your friends and subscribe to our channel.Keep following our channel. sure i will try to help you.
Sir I have one doubt i.e. You have taken plain text as s-bits it means 8bits, now what is the cipher text size, is it 8bits or 64 bits, if cipher text is 8bits how can we give to the next bock as 64-s and s-bits...
Propagating Cipher Block Chaining(PCBC) encryption is given by the equation- Cn=E(k,[Cn-1 XOR Pn-1 XOR Pn] Find out the decryption equation and draw neat figure for both encryption and decryption.(P0 can be considered as NULL). PLEASE SIR GIVE ME THE SOLUTION OF THIS QUESTION AS SOON AS POSSIBLE.
Sir.... does the PT of 64bits at xor operation is same as what we taken at IV at top or PT is considered only at XOR stage after encryption??? Plzz clarify.
hello sir. bit of confusion regarding OFB. 64 bits of plaintext or 64bits of initialization value? BTW, I am from Bangladesh. And your videos are awesome👌.
hi thakkar thanks for your interest towards our channel and share my sessions with your friends and subscribe to our channel.Keep following our channel.
0:10 - Intro
2:15 - Explanation
4:10 - Electronic Code Book Mode
7:15 - Cipher Block Chaining Mode
12:25 - Output Feedback Mode
19:55 - Cipher Feedback Mode
22:50 - Counter Mode
Absolute value add from you sir !. appreciate this effort.
I've been watching your videos throughout my Computer Security course and I trully thank you for helping me a lot in understanding the topics more!!
I was racking my brain how to complete this chapter! Thank god! I found you on UA-cam!
hi aravind
thanks for your interest towards our channel and share my sessions with your friends and subscribe to our channel.Keep following our channel.
It's not an exaggeration to say that ur explanation is crystal clear..
Thank You very much Sir for discuss all the Block Cipher Modes elaborately. It's very helpful.
Sir i can't understand this topic from our professor and after watching this video i can understand clearly all videos related to network security, playlist is very easy to understand, thank you so much
Thank you it is helped me a lot during this quarantine time to understand this chapter nicely !
All your videos are really helpful .Explanation is very clear and effective. Thankyou so much for your efforts sir
Just too Good Sir....No words for you....Grand salute to your explanation....So many thanks sir :)
Fantastic explanation Sundeep garu . Many thanks for taking time and sharing your knowledge .
Thank you soo much sir ..... Couldn't imagine of passing CNS without your videos .. :-)
thak you so much sir. I see every vdo of u. Network security topics when i see in book, it feels like i am not getting a singl word. But once i see a single vdo of u, i feel very satisfied with that topic. Thank you sir. U r doing a grt job. Keep it up and u will keep getting more blessings. God bless u.
hi kulkarni
thanks for your interest towards our channel and share my sessions with your friends and subscribe to our channel.Keep following our channel.
Sir you have helped me a lot sir during my exams time. Your explonation is very goood and clear. Keep maintian that sir. You are one of the best teacher in my study career. I was scared about this subject and i found you on youtube. Now i learned lot of subject. Thank you very much sir.
I just wrote my data network exam today and it went well because of you sir. Thank you so much.
sir,because of you wrote exam very well .
thank you so much sir,
Hi that's nice you hear from you and may I know your name and which college you are studying. All the best for your rest of exams.
Thank you..... Awesome... Simple, clear, concise and precise...
hi devis
thanks for your interest towards our channel and share my sessions with your friends and subscribe to our channel.Keep following our channel.
Good explanation. At the university we had to make a block cipher written in python, they are fun to write and recommend anyone in the security field to write one to gain a good understanding of them.
Could you suggest a video or two on learning to implement in Python?
Thanks sir,your sessions are very nice,and you would have explained very well.
Insane explanation 👏
This is what I would call a perfect tutorial...Great Work👍 and thank you
Thank you sir you made this complex topic to be understood in a very easy way.
Sir you are amazing , i have written exam very well because of u
Really a very helpful video!!! much respect for you , from Nepal!!
Sir you are too good...The way you teach is so amazing...Each time when iam in need of some topics I first find your video and just when it's there I feel like the topic is done...
Thankyou So much ..Ua videos are so helpful sir ...Plz always teach us like this only...
VERY MUCH USEFUL PROFESSOR
Thank god..... Next week , i have exam ... And i really didn't wanted to waste the hours on this topic.. Thanku so much..👍👍😊
Last-minute prep for exams :). So methodically explained!
really helpful for my MS. didnt need to open textbook at all.
Really a very helpful video sir .. thank u Soo much
Your hand writing is amazing
Best explaination...Thank you so much Sir..!!👍👍👍
Excellent work 👌
I think there has been a confusion between CFB and OFB , OFB mode operates on full blocks of plaintext and cipher text not on s-bit set while CFB operates on s-bit.
Thank you by the way, your videos are very helpful.
I also think he might have mixed up OFB with CFB
Easy for someone to explain it when they understand it well!
Very well explained!
Loved it.
Super sir, all concepts are clearly understand. thank you sir
Your intro made me low my lappy volume and your voice made me increase the volume.
Tq you sir for your precious time and valuable explanation
Hi rajesh
Thanks for your support towards our channel share our channel with your friends and keep following our channel
Well done...slow phase explanation....keep it up..thanks
Prepaing for an exam a night before. And, damn, your videos are awesome. Thank you)
good day Sir. plz give simple example for block and stream ciphers. your explanation is awesome .
hi hema
thanks for your comment and soon i will try to do that
thanks for your interest towards our channel and share my sessions with your friends and subscribe to our channel.Keep following our channel.
Superb sir... Tq very much Sir.. 😍😍😍😍😍😍 ....
Greatly explained
you helped a lot for my exams thanks :-)
nyce explination ..Thanx u soo mch Sir
Very well explained sir
The way of expression is very interesting ,but what i want to say please take simple plain text as sample message and show how divide the message into block and how we Apply the encryption process!!!
You made this interesting. Thanks
Thank you. Really good explanation.
Explained so well! Thank you
thank you sir awesome teaching
1. Don't you lose the 64 - S bits by considering only S bits?
2. In the first step of the shift register, how can you select only S bits? That means during the entire encryption process you will work with S bits.
Good explanation sir
Great explanation, thanks)
Thanks alot... awesome explanation
hi sana
thanks for your interest towards our channel and share my sessions with your friends and subscribe to our channel.Keep following our channel.
Great job
you are just amazing
hi abhishek
Thanks for your interest towards our channel and share my sessions with your friends and keep following our channel and don't forget to subscribe to our channel.
You helps a lot sir♥♥
good lectures
Thank you very much sir
Good work sir
hi Kapil
thanks for your interest towards our channel and share my sessions with
your friends and subscribe to our channel.Keep following our channel.
Thank you 😊😊😊😊
Nice one sir!
hi bhaskar
thanks for your interest towards our channel and share my sessions with your friends and subscribe to our channel.Keep following our channel.
No idea what this is about, but liking anyway
Thank u so much sir for giving us your precious time ❤️
Thank u so much sir for giving us your precious time ❤️
I want in telugu languge brooo
U r explaintion is excellent
I want more clear languge so if u can say in telugu that is more useful me and my frds too
Hello Sir, thank you for this video. I loved watching as I understood.
I would like to know why for the encryption, the algorithm can't just take the entire plain text in order to transform it into ciphertext?
In order words, why does it have to always size the plain text in some fixes blocs?
And also, what happens when the last plain text size is inferior to the fixed block size? Does the ciphertext will still remain with the same length?
Thank you again and hopefully, I will find answers.
Because that's how most algorithms work.
Thank you sir!
Sandeep very well taught , I had a small doubt in output rate cipher when we have N of block you said counter+N -1 why we have used -1 what it means. Please reply..
hi Yusuf
actually if there are N blocks we are considering from 0 so the number of last block will be N-1.
Hope your doubt has been clarified and sorry for the delay.
thanks for your interest towards our channel and share my sessions with your friends and subscribe to our channel.Keep following our channel.
Dear Sundeep, Very well explained. Can you please help me understanding AES CCM mode of operation?
hi pankaj
thanks for your interest towards our channel and share my sessions with your friends and subscribe to our channel.Keep following our channel.
sure i will try to help you.
What is counter value? Is it group of bits?
if u are the professor teaching us, no one in the class will fail !
thanks a lot sir
Clearly explained❤️❤️❤️
THANK YOU VERY MUCH.BUT WHAT IS THE PURPOSE OF INITIAL VECTOR
Thank You sir 😇😇
Thank u so much sir
In the output feedback mode, where do the shift register come from?
please give some examples of each it makes easy understanding
Thank you sir.
Sir I have one doubt i.e. You have taken plain text as s-bits it means 8bits, now what is the cipher text size, is it 8bits or 64 bits, if cipher text is 8bits how can we give to the next bock as 64-s and s-bits...
Super sir
Thank you sir
thanku very much
Great work indeed.Sir,i need help in RC6 algorithm.Kindly help me.
Propagating Cipher Block Chaining(PCBC) encryption is given by the equation-
Cn=E(k,[Cn-1 XOR Pn-1 XOR Pn]
Find out the decryption equation and draw neat figure for both encryption and decryption.(P0 can be considered as NULL).
PLEASE SIR GIVE ME THE SOLUTION OF THIS QUESTION AS SOON AS POSSIBLE.
hi tushar
send me an email to askme.selflearning@gmail.com
i will try to send the required topic to your mail.
Sir.... does the PT of 64bits at xor operation is same as what we taken at IV at top or PT is considered only at XOR stage after encryption??? Plzz clarify.
Plain Text is different from Initialization Vector
In chiper block chaining. is the first IV decryption must same with the first IV encryption? please answer me
Great!
hello sir. bit of confusion regarding OFB. 64 bits of plaintext or 64bits of initialization value?
BTW, I am from Bangladesh. And your videos are awesome👌.
hi ahmed
in OFB and CFB we have to take the plaintext equal to s-bits.
here 64 bits are the initialization values.
Great🙏🙏❤️
Why we are applying encryption algorithm itself in decryption in ofb?
I think you have forgotten to add this video in your network security playlist.
Thankyou sir
Are you God?
hi thakkar
thanks for your interest towards our channel and share my sessions with your friends and subscribe to our channel.Keep following our channel.
Meaning of Guru -- Sandeep saradhi 🤗
Sir please upload a video on International Data Encryption Algorithm
great
Sir! What is counter value. Y we have to choose that in counter mode ?
Sir can you please make a video on frequency analysis of simple substitution cipher