Тёмный
No video :(

Cryptanalysis 

Neso Academy
Подписаться 2,6 млн
Просмотров 170 тыс.
50% 1

Network Security: Cryptanalysis
Topics discussed:
1) Two general approaches to attacking conventional cryptosystem.
2) Explanation for cryptanalytic attack and brute force attack.
3) Explanation for known ciphertext only attacks with an example.
4) Explanation for known plaintext only attacks with an example.
5) Explanation for chosen plaintext only attack with example.
6) Explanation for chosen-ciphertext only attack with example.
7) Explanation for chosen text attack.
Follow Neso Academy on Instagram: @nesoacademy (bit.ly/2XP63OE)
Contribute: www.nesoacademy...
Memberships: bit.ly/2U7YSPI
Books: www.nesoacademy...
Website ► www.nesoacademy...
Forum ► forum.nesoacad...
Facebook ► goo.gl/Nt0PmB
Twitter ► / nesoacademy
Music:
Axol x Alex Skrindo - You [NCS Release]
#NetworkSecurityByNeso #Cryptography #NetworkSecurity #Cryptanalysis

Опубликовано:

 

23 авг 2024

Поделиться:

Ссылка:

Скачать:

Готовим ссылку...

Добавить в:

Мой плейлист
Посмотреть позже
Комментарии : 27   
@udoegodstreasure671
@udoegodstreasure671 Год назад
Thanks for this wonderful lecture, I'm always happy that your lectures are in English which allows me as an international student to understand this subject
@DozedUP007
@DozedUP007 2 года назад
I had difficulties with this topic.. I stumbled upon this video and now I understand the topic. Gr8 video mate. I hope I find other videos I need in the video list.
@ruwanwijekoon1122
@ruwanwijekoon1122 2 года назад
Great explanation. Thank you. You are an excellent teacher.
@tech-learner4555
@tech-learner4555 3 года назад
Please enable capttions in every videos
@twinkletata
@twinkletata 5 месяцев назад
Good explanation. Thanks
@anonmuss7035
@anonmuss7035 2 года назад
Good video......Please include captions.......Thank You......
@manytuch
@manytuch 10 месяцев назад
Great video!
@playlistc342
@playlistc342 6 месяцев назад
What about a known ciphertext attack when attacker have a couple of cipher and decrypted cipher = plaintext ?
@kishsaam
@kishsaam 2 года назад
Great video... congratulations
@user-ft9sg9bl5g
@user-ft9sg9bl5g 5 месяцев назад
Nice topic
@gr33narr0w55
@gr33narr0w55 3 года назад
Nicely explained 👌
@JohnDerhammer-oq9zi
@JohnDerhammer-oq9zi Год назад
Then why did they choose two-fish over Raj-13 for AES standard?
@Ototoxi
@Ototoxi 2 года назад
Easily explained sir 👍
@sidharthshankar2136
@sidharthshankar2136 3 года назад
Your an excellent teacher.......
@prabagaran.s1285
@prabagaran.s1285 Год назад
I have college assignment, Differential cryptanalysis attack on Feal-4 algorithm , we have choose plain text and cipher text. I have done four rounds. and got 6 subkeys. , when i use the six sub keys to encrypt and decrypt , verification working fine , but my college professor. say like this . below. Only one value is given for each key - most are out by a few bits, but one is correct. Code seems to be largely based on Amazing Kings, without any real understanding of how the attack works what's your opinion on it.
@anjaligupta-ew6ns
@anjaligupta-ew6ns 3 года назад
Sir please upload full cource of Compiler Design
@avejessi4175
@avejessi4175 2 года назад
0:38
@taiebxr
@taiebxr Год назад
Thankuuu
@ryyb3880
@ryyb3880 2 года назад
the algorith doesnt have to be known for all of these....
@srushtiprajapati8709
@srushtiprajapati8709 7 месяцев назад
R u sure?
@mdmahinuddin4412
@mdmahinuddin4412 2 года назад
sir please provide the ppt thanks a lot sir
@moatazalnasan3905
@moatazalnasan3905 3 года назад
🙏🏻
@rimsha6001
@rimsha6001 2 года назад
Asslam u alaikum Sir Aik question hai kindly answer krdy Question: IT Security Personnel Security Physical Security Operational Security Into which of these would you put the following, justify your choice?  Enforcing hard-to-guess passwords  Encrypting your hard drive  Looking sensitive documents in a safe  Stationing a marine guard outside an embassy  Assigning security clearances to staffers  Using SSL for data transfer  Having off-site backup of documents Plzzz sir i request you iska answer bta dy plzzzz
@junaiddar2586
@junaiddar2586 2 года назад
Using SSL
@vont8424
@vont8424 2 года назад
don't understand at all. talk too fast as though the presenter is trying to beat the clock. i watch and watch many times trying to understand, especially the chosen plaintext and chosen ciphertext. still don't understand the explanation. actually it is not only this presenter. i find that none of those videos I've watched so far actually explain these concepts clearly. even college textbooks written by super well-known authors can't explain the concepts clearly. no wonder students are never able to understand, because the textbooks are basically useless and the teachers based on the textbooks can't explain, because the textbooks the teachers use can explain the concepts. it's a joke seriously. i find that these attacks make no sense. perhaps just trying to invent these concepts to confuse people.
@turtlepedia5149
@turtlepedia5149 2 года назад
i will explain you, leave a message in any of my vdos
@heavymetalrox268
@heavymetalrox268 7 месяцев назад
How did y'all get through with the accent? 😂
Далее
Brute Force Attack
8:46
Просмотров 121 тыс.
Cryptography
13:34
Просмотров 350 тыс.
Х.евая доставка 😂
00:23
Просмотров 380 тыс.
When I met the most famous Cristiano
01:03
Просмотров 27 млн
Classical Encryption Techniques
8:32
Просмотров 168 тыс.
Caesar Cipher (Part 1)
13:23
Просмотров 498 тыс.
CIA Triad
16:08
Просмотров 297 тыс.
7 Cryptography Concepts EVERY Developer Should Know
11:55
Monoalphabetic Cipher
15:59
Просмотров 326 тыс.
Where People Go When They Want to Hack You
34:40
Просмотров 1,5 млн