Тёмный

BLOWFISH ALGORITHM in Cryptography and Network Security | Easiest explanation for students 

Abhishek Sharma
Подписаться 128 тыс.
Просмотров 89 тыс.
50% 1

#BlowfishAlgorithm #Blowfish #BlowfishAlgoInCryptography #Cryptography #NetworkSecurity
Blowfish Algorithm
blowfish algorithm in Cryptography
BLOWFISH algorithm in Cryptography and network security
Blowfish algorithm in hindi
Cryptography and network security
what is blowfish Algorithm
blowfish encryption Algorithm
Telegram channel :
t.me/abhisheksharmadit
Facebook page
/ abhishek_tutorials_inf...
Instagram : / abhishekdit
#abhishekdit
Twitter :
/ abhiaustin07
This is our Cryptography and network security Playlist.
In this video,i have explained the concept of BLOWFISH Algorithm in Cryptography and network security.
If you're learned something new do like and share this video with your friends and don't forget to subscribe to my channel :)
There are lectures related to different subjects on this channel.Do check them out, guys.
Link is given below:
Placement videos:
• Interview process deta...
INFOSYS :
• INFOSYS
Amazon Interview questions
• Amazon Interview quest...
Linked List for Interviews :
• Linked List for interv...
Pointers in C :
• Pointers in C
Cryptography :
• Cryptography and netwo...
computer graphics:
• Computer Graphics
engineering economics:
• Engineering Economics
GATE QUESTIONS:
• GATE question solutions
.Net C# :
• .NET C#
Programming in C
• Programming in C
C PROGRAMS for beginners
• C programs for beginners
Java Tricky videos/programs for interviews :
• Java tricky programs/v...
File Handling in C :
• FILE Handling in C
C Programming tips and tricks:
• C tricky programs/videos
Abhishek VLOGS :
• #VLOG-1 Riding through...
Concerts :
• Khushboo Grewal concer...

Опубликовано:

 

18 апр 2020

Поделиться:

Ссылка:

Скачать:

Готовим ссылку...

Добавить в:

Мой плейлист
Посмотреть позже
Комментарии : 62   
@Dailyvlogs......
@Dailyvlogs...... 4 года назад
Best explanation of Blowfish Algorithm on youtube . Loved It
@everythingpossible8764
@everythingpossible8764 4 года назад
Bahut jyada need thi is topic ki
@pischekparker8197
@pischekparker8197 Год назад
I actually struggle with hindi but the way you layout this algorithm is really great, you real made me understand this algo. Thank you sir!
@shubhgopal1323
@shubhgopal1323 3 года назад
U deserve much more than what u r getting
@pixelinnovative34
@pixelinnovative34 4 года назад
Best explanation loved it
@afjalsharifopu5058
@afjalsharifopu5058 3 года назад
Best Explanation On RU-vid , Love Brother From Dhaka
@tushar5426
@tushar5426 2 года назад
What a wonderful and detailed explaination !! Thank you so much💕
@aartichaudhari8438
@aartichaudhari8438 3 года назад
Well explained sir.. thank you so much
@harishvukkadapu5385
@harishvukkadapu5385 3 года назад
Thanks for ur lectures sir
@anuragthakur3813
@anuragthakur3813 Год назад
Great explanation Thank you very much
@hinabatool5102
@hinabatool5102 Год назад
Thankyou for this detailed video.
@mushi172
@mushi172 Год назад
Seriously u r super...apka samjhane ka tareeka bahut acha hai..keep it up..
@milanrai3596
@milanrai3596 4 года назад
sir if A simple symmetric encryption algorithm can be written as follows: 1: Input message M and 64 bit key K 2: Divide M into 64 bit size blocks B1...Bn 3: Get first block B1 and perform bit-wise XOR with K to produce encrypted block E1 4: Repeat Get next block Bi and perform bit-wise XOR with Ei-1 to produce encrypted block Ei 5: Until End of message Based on the above algorithm, answer the following questions: (a) Explain the weaknesses of the above algorithm if the first input block is identical to the key. (b) Give a modified algorithm that corrects the problem(s) identified in part (a)
@jaydipthakkar9838
@jaydipthakkar9838 2 года назад
Thank You So Much Sir 🙏🙏
@NAVAP_IAS
@NAVAP_IAS 3 года назад
Great explanation bro 😇😇😇
@everythingpossible8764
@everythingpossible8764 4 года назад
Thanks sir
@ShreyaSingh-lw4uk
@ShreyaSingh-lw4uk Месяц назад
Thank you so much.... really grateful 🙏
@shrutisatyams2146
@shrutisatyams2146 Год назад
Thank you🙂
@anujain4378
@anujain4378 3 года назад
excellent explaination sir
@4liexplains486
@4liexplains486 4 года назад
god bless u..
@079_vikashrajpurohit9
@079_vikashrajpurohit9 3 года назад
brilliant bro
@sushmasharma769
@sushmasharma769 2 года назад
Nice one
@kumarsamyak513
@kumarsamyak513 11 месяцев назад
Sir nice explanation
@shamsingh9688
@shamsingh9688 Год назад
BUT what happened if we take 32 bit keys insted of 448 bit then what happened
@BABYJAHNAVIKOKKILIGADDA-ed4ne
Thank u sir
@supikshajain4333
@supikshajain4333 3 года назад
SIR if we take key size small then how we do XOR operation with l1, l2 32 bit . or we add some temporary bit in P1(IF 32 SIZE IS NOT TAKEN)
@divakarsharma2625
@divakarsharma2625 3 года назад
Superb video...... but less views thats weird.. u r awesome man
@008-nathan4
@008-nathan4 2 года назад
thanks bhai😇
@humanAbsu
@humanAbsu 4 года назад
Yeahhhhhh❣️❣️❣️❣️❣️
@SoniKumari-wv3tw
@SoniKumari-wv3tw 3 года назад
Pls upload a video on SAFER and FEAL algorithm
@yashpriyadeepkatta8823
@yashpriyadeepkatta8823 2 года назад
totally understood, thanks!
@mahtab7667
@mahtab7667 11 месяцев назад
Hello kya mujhe bata skte ho ye p[0]....p[17] isme initially, key(k1,k2) ke saath exor karne se pehle inme kya value hogi???
@dhyanijethava6666
@dhyanijethava6666 3 года назад
sir, can you please make a video on RC5 algorithm ?
@brookehewitt6297
@brookehewitt6297 2 года назад
Sir please tell how creted these hexadecimal digits which stored in aray, mean how to create sub-keys? please explain
@whoisanirudhh
@whoisanirudhh 3 года назад
bhai please make a video explaining RC5 Algorithm
@angulardesign7412
@angulardesign7412 4 года назад
Mujhe agar video encryption karna he aes only kafi he ya fir aes blowfish dono use karu
@renukachowdary709
@renukachowdary709 4 года назад
Sir how about decryption ??
@kraghupati
@kraghupati 4 года назад
How the 18 subkeys are created?
@sanjeevisuresh936
@sanjeevisuresh936 3 года назад
How to choose the subkeys?
@anjumsadvice
@anjumsadvice 2 года назад
Bhai RC5 pe video banao please
@roshnimandarapu5097
@roshnimandarapu5097 Год назад
could you explain RC5 algo plzz?
@mahtab7667
@mahtab7667 11 месяцев назад
Kitna complex karoge ,, p[0] , p[1] me value kon si hogi ?? Jo 448 bit ki key hai wohi hogi ya kuj or kyunki baad me 448 bit ko divide karke usme ex or kar rahe ho
@renukachowdary709
@renukachowdary709 4 года назад
Sir 256 entries in S boxes u said but only 32bits u passed?
@prashantSharma-ht9po
@prashantSharma-ht9po 2 года назад
👍👍👍🙏
@rehmanahmed763
@rehmanahmed763 Год назад
in s box u said it has total 256 entries (32 bit each) how this can't be possible because 32*4 is 128
@RajeevKumar-yk3il
@RajeevKumar-yk3il 4 года назад
Bhai Notes provide kra do please..For college exam
@hardikmakhija4470
@hardikmakhija4470 2 года назад
I there way to get notes of your content. It will be very helpful for me please if there is way then please provide them.
@anubhavsikarwar8488
@anubhavsikarwar8488 Год назад
sir also provide notes plzz..
@arunkumarn6650
@arunkumarn6650 3 года назад
bro please explain with one example practically
@txcommandogaming8707
@txcommandogaming8707 4 месяца назад
apa shark ka content bhi pada do
@roshniverma2471
@roshniverma2471 2 года назад
Please send PDA of notes
@humanAbsu
@humanAbsu 4 года назад
Bhayya kya aapki videos sequence wise hein..?
@AbhishekSharmaDit
@AbhishekSharmaDit 4 года назад
Hanji sequeence me h playlist
@Viralvlogvideos
@Viralvlogvideos 3 года назад
@@AbhishekSharmaDit 5:52 what values are initially stored in p[0].p[1]..etc.?? u said it will store keys of 32bit in hexadecimal format then when ur performing xor with key are u using the same value to do xor?? then the answer will be 0000s isn't?? please explain this
@ManojKumar-hj7fh
@ManojKumar-hj7fh 3 года назад
@@Viralvlogvideos they will have constant hexa decimal values, which are intially stored in the p array, see the video to understand better
@mahtab7667
@mahtab7667 11 месяцев назад
Sab me sab aise hi bhare pade hai you tube pr koi v example nhi karwata sabko bss ratta lagwana hai
@mahtab7667
@mahtab7667 11 месяцев назад
Initially p[0] p[1] ....p[17] me value kya hogi ye bata skta hai koi iss sir ko chahne wala agr itna hi samajh aaya hai to ????
@siddharthsoni8784
@siddharthsoni8784 Год назад
can you please put these videos in the right order? It is very trouble some to check each one of vedio and which one it is related to .
@AbhishekSharmaDit
@AbhishekSharmaDit Год назад
Check the playlist its given in sequence there - ru-vid.com/group/PL9FuOtXibFjV77w2eyil4Xzp8eooqsPp8
@mahtab7667
@mahtab7667 11 месяцев назад
Ye nhi samaj aata ke theoretical to thik hai pr jab practical karwate hai tabhi kuj pta lagta hai kaise cheeje ho rahi hai
@anubhavsikarwar8488
@anubhavsikarwar8488 Год назад
anybody notes ?
@mahtab7667
@mahtab7667 11 месяцев назад
Kuj v padha ke chale jaate ho kmm se kmm example to karwa doya karo yaa aapne v bss ratta hi maara hai and yahan bss wohi bata rahe ho
Далее
#20 Blowfish Algorithm - Block Cipher Algorithm |CNS|
12:07
Cryptography
13:34
Просмотров 338 тыс.
Multiple Encryption and Triple DES
20:54
Просмотров 34 тыс.