Тёмный

Stream Cipher ll Information and Cyber Security ll Explained with Example in Hindi 

5 Minutes Engineering
Подписаться 674 тыс.
Просмотров 213 тыс.
50% 1

Myself Shridhar Mankar a Engineer l RU-vidr l Educational Blogger l Educator l Podcaster.
My Aim- To Make Engineering Students Life EASY.
Website - 5minutesengine...
5 Minutes Engineering English RU-vid Channel - / @5minutesengineeringen...
Instagram - www.instagram....
A small donation would mean the world to me and will help me to make AWESOME videos for you.
• UPI ID : 5minutesengineering@apl
Playlists :
• 5 Minutes Engineering Podcast :
• 5 Minutes Engineering ...
• Aptitude :
• Aptitude
• Machine Learning :
• Machine Learning
• Computer Graphics :
• Computer Graphics
• C Language Tutorial for Beginners :
• C Language Tutorial fo...
• R Tutorial for Beginners :
• R Tutorial for Beginners
• Python Tutorial for Beginners :
• Python Tutorial For Be...
• Embedded and Real Time Operating Systems (ERTOS) :
• Embedded and Real Time...
• Shridhar Live Talks :
• Shridhar Live Talks
• Welcome to 5 Minutes Engineering :
• Welcome To 5 Minutes E...
• Human Computer Interaction (HCI) :
• Human Computer Interac...
• Computer Organization and Architecture :
• Computer Organization ...
• Deep Learning :
• Deep Learning
• Genetic Algorithm :
• Genetic Algorithm
• Cloud Computing :
• Cloud Computing
• Information and Cyber Security :
• Information And Cyber ...
• Soft Computing and Optimization Algorithms :
• Soft Computing And Opt...
• Compiler Design :
• Compiler Design
• Operating System :
• Operating System
• Hadoop :
• Hadoop
• CUDA :
• CUDA
• Discrete Mathematics :
• Discrete Mathematics
• Theory of Computation (TOC) :
• Theory Of Computation ...
• Data Analytics :
• Data Analytics
• Software Modeling and Design :
• Software Modeling And ...
• Internet Of Things (IOT) :
• Internet Of Things (IOT)
• Database Management Systems (DBMS) :
• Database Management Sy...
• Computer Network (CN) :
• Computer Networks (CN)
• Software Engineering and Project Management :
• Software Engineering A...
• Design and Analysis of Algorithm :
• Design And Analysis Of...
• Data Mining and Warehouse :
• Data Mining and Warehouse
• Mobile Communication :
• Mobile Communication
• High Performance Computing :
• High Performance Compu...
• Artificial Intelligence and Robotics :
• Artificial intelligenc...

Опубликовано:

 

2 окт 2024

Поделиться:

Ссылка:

Скачать:

Готовим ссылку...

Добавить в:

Мой плейлист
Посмотреть позже
Комментарии : 94   
@chinmaykulkarni6656
@chinmaykulkarni6656 5 лет назад
Do does the length of key depend upon the length of the message? And the key stream generator algorithm should be the same at sender's and receiver's side?
@wahajmubeen9376
@wahajmubeen9376 2 года назад
What a gem this man is! Brilliant.
@sreelakshmimenon8
@sreelakshmimenon8 5 лет назад
kaafi acha aur easy way me explain kiya...thank you for uploading this video...
@pixelisticgaming
@pixelisticgaming 4 года назад
How key is generated? It will given already or should be generated?
@aisakyunhotahai8130
@aisakyunhotahai8130 4 года назад
You will be given an Initial key, which will be passed to a Key generator function, and then the stream of keys will be obtained.
@ganesh9446
@ganesh9446 4 года назад
Love you broo from Karnataka thanks for the tutorial
@jubinrajnirmal9291
@jubinrajnirmal9291 4 года назад
Very helpful but how is the same key generated on the receiver's side? They must pre-share the key before the transmission of message right?
@shaliyaabdulla7959
@shaliyaabdulla7959 3 года назад
Exactly. I'm having this same doubt
@hum__shyam
@hum__shyam 4 года назад
Sir! is that "key stream generator" generate same key for the sender and receiver?? 🤔
@aisakyunhotahai8130
@aisakyunhotahai8130 4 года назад
Yes
@shwetathorat4364
@shwetathorat4364 8 месяцев назад
Superb example sir... I'm trying another one. Excellent 👍
@ravinderpartapsingh7792
@ravinderpartapsingh7792 5 лет назад
if at the receiver side the stream key generator generate different keys which are not equal to sender side keys then what will happened ??? plz explain me
@my_simple_vlog
@my_simple_vlog 4 года назад
I have same doubt!
@Vegeta_Sama311
@Vegeta_Sama311 4 года назад
Kis University se ho bhai?
@jithu1700
@jithu1700 4 года назад
Buddy if symmetric encryption is used then the same keys are shared between the sender and receiver. In case of asymmetric encryption the private key will be already available with the receiver. Hope it is clear now!
@ashutoshbhandari1975
@ashutoshbhandari1975 Год назад
The most comprehensive explanation! Excellent!
@muhammadahsan7414
@muhammadahsan7414 4 года назад
Good job sir, please keep it up!.........thanks a lot for uploading such videos!!!!
@MonojitBarua
@MonojitBarua Год назад
During decryption time you have taken the same key (like encryption). But what if the decryption-side key generator generates a key which is not the same as the encryption-side key then how come the decryption will happen?
@GalaxyRNC
@GalaxyRNC 4 года назад
Cha gaye guruji kya padhaate hain aap.. maza aa gaya !
@nomansyt
@nomansyt 2 года назад
Thankyou for making videos for CSE/IT students
@swatiaryaa9268
@swatiaryaa9268 8 месяцев назад
Sir the way u explain is more impressive......❤❤
@ZeeAas
@ZeeAas 9 месяцев назад
your method of teaching is so nice and short that everyone can easily understand
@033prateeksingh4
@033prateeksingh4 3 года назад
Bruh u are just amazing.Keep up the good work.
@muhammadahsan7414
@muhammadahsan7414 4 года назад
excuse me, sir, what is the keystream generator?? where it lies?? how does it work??
@pranavsinha1334
@pranavsinha1334 7 месяцев назад
Badhiya Video tha sir.
@ShoubhikSadhu
@ShoubhikSadhu 3 года назад
Sir bohot badiya tarike se explain kiye hai aap.
@bhataasim
@bhataasim 6 месяцев назад
Watch in 1.25 You will feel it
@Animalsfacts165
@Animalsfacts165 4 года назад
Love for ur effort n wellwishes from pakistan.
@harishkumar9180
@harishkumar9180 3 года назад
Looks like Rohit Sharma 🤔 hai na
@RitikSingh-xe2zj
@RitikSingh-xe2zj Год назад
Darmeyan word is compulsory
@EraserNum10
@EraserNum10 2 года назад
Great information within a 5 minutes vdo ♥️
@Nova8739
@Nova8739 11 дней назад
Kal exam ha thank you sir😢
@muhammadahsan7414
@muhammadahsan7414 4 года назад
excuse me, sir, how can we represent data in bits?? do we manually do this or there is an algorithm??
@cheshmashahi9182
@cheshmashahi9182 3 года назад
Yes I also want to know how ??
@akarshkumar2171
@akarshkumar2171 2 года назад
He is just giving an example. To convert data into bits, there can be any algorithm. Eg: Convert char or numbers into Ascii value and then do XOR at bit level and then send these bits as cipher text.
@brijeshgaud3196
@brijeshgaud3196 5 лет назад
20k sub Congo😎😎😎
@ZeeAas
@ZeeAas 9 месяцев назад
please make more videos
@swagatochakraborty6043
@swagatochakraborty6043 4 месяца назад
BIT SPECIFIC BITWISE XOR
@KickKraze2023
@KickKraze2023 5 месяцев назад
thanks for help
@63bankardipak38
@63bankardipak38 Год назад
Thank you sir
@hanishvenkat9496
@hanishvenkat9496 4 месяца назад
well explained sir
@ss8273
@ss8273 Год назад
thankyou sir
@ZeeAas
@ZeeAas 9 месяцев назад
thank you sir
@sumitchakrawarti2116
@sumitchakrawarti2116 5 лет назад
Thanku sir you are great
@zarasafdar7734
@zarasafdar7734 Год назад
Zabrdast
@SK-mt2wb
@SK-mt2wb Год назад
mashallah
@namankumargarg4827
@namankumargarg4827 4 года назад
how does the same set of bits are generated at both the sender end and reciever end?
@Sahil-xo5en
@Sahil-xo5en 2 года назад
There is a algorithm on both sides that adds the keys or receiver Already knows the key.
@husnainalishah7628
@husnainalishah7628 4 года назад
Good love u bhai 1 bar main hi smjh agya love u
@rockydeshmukh2943
@rockydeshmukh2943 2 года назад
Thanks
@rishabhraj8497
@rishabhraj8497 5 лет назад
Love you Sir😍
@shivprajapati454
@shivprajapati454 5 лет назад
Shidhar ko binary mai encode kaise kiya WO to btaya nahi .this is the partial explaination .
@hirakmondal6174
@hirakmondal6174 4 года назад
Its just an example that he has taken, if you want to convert some alphabet into binary go with *ASCI*
@rahulojha2599
@rahulojha2599 5 лет назад
please sir upload compiler and hci please books are not available please.
@Signature77
@Signature77 5 лет назад
Thank U !!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
@rajasachin5600
@rajasachin5600 5 лет назад
key generator may generate different key at receiver end, then???
@abhineetsagar
@abhineetsagar 5 лет назад
Makaut ka exam h ky? Mujhe bhi yehi doubt h
@jithu1700
@jithu1700 4 года назад
Buddy if symmetric encryption is used then the same keys are shared between the sender and receiver. In case of asymmetric encryption the private key will be already available with the receiver. Hope it is clear now!
@darahaas15
@darahaas15 2 года назад
🔥
@Amisha21298
@Amisha21298 5 месяцев назад
❤❤❤❤❤❤❤❤
@fixyou8526
@fixyou8526 3 года назад
Vai Ap kis pe ENGINEERING kiya ho?
@chewdiepie1738
@chewdiepie1738 Год назад
thanks man , was very easy to understand
@PournimaBhuyar-vg7cf
@PournimaBhuyar-vg7cf Год назад
It was really helpful sir !!
@muhayminuddin9368
@muhayminuddin9368 3 года назад
bhai rc4 banao xam hai jaldi aaj ich banao
@shrutishukla2508
@shrutishukla2508 4 года назад
Sir ye bit kha se ayi isme agr shridhar ki jgh koi or naam ho to ya kuch likha ho to hm ko bit ke bare me kese pta chalega ki msg ko bit me kese change krenge ?
@aisakyunhotahai8130
@aisakyunhotahai8130 4 года назад
you will be already given the binary message, no conversions will be asked😊
@saweranadeem2040
@saweranadeem2040 2 года назад
JAZAK ALLAH SIR
@alihassankhanyousafzai
@alihassankhanyousafzai 4 года назад
Love you bro bht acha samjhaya apne.......
@AllinOne-nj6zk
@AllinOne-nj6zk 5 лет назад
Bahot sahi explanation
@arpitaanasane3026
@arpitaanasane3026 5 лет назад
Pdhne m pressure nai aa rha hai sir... credit goes to u
@AyushSharma-fg9hm
@AyushSharma-fg9hm 5 лет назад
Pressure nai aa rha to kayam churan khaiye aa jayega😂😂😂
@muhammadahsan7414
@muhammadahsan7414 4 года назад
excuse me, sir, do we generate key bits manually?
@priyankabiswas7411
@priyankabiswas7411 5 лет назад
Shridhar ka binary code aya kaha se?
@rajasachin5600
@rajasachin5600 5 лет назад
just assumed
@shashantchaudhary5636
@shashantchaudhary5636 4 года назад
Sir kya ap buffer overflow attack pr ek vdo bna skte hee
@SaileeShingare
@SaileeShingare 3 года назад
Nice explanation. Thank you sir
@muslimwazaef1334
@muslimwazaef1334 Год назад
Thanks Sir👍
@altamassmith4402
@altamassmith4402 4 года назад
Very very good sir
@AKHILDS-j3v
@AKHILDS-j3v 5 лет назад
You are awesome....😍😍😍thnx sir
@sabashoukat5575
@sabashoukat5575 4 года назад
sir hr bit pa jo key apply hogi kia wo b different hogi????? ya same hogi??
@jithu1700
@jithu1700 4 года назад
It depends on the key. Usually keys are some random bits which is properly synced between sender and receiver.
@ankitakadam8991
@ankitakadam8991 3 года назад
thank you
@ayanghosal3808
@ayanghosal3808 3 года назад
ekdam barabar 👍
@HarshPatel-uj7dh
@HarshPatel-uj7dh 2 года назад
Great work
@ManishKumar-kx7yc
@ManishKumar-kx7yc 3 года назад
Great 👌
@khilosiyakomal2874
@khilosiyakomal2874 4 года назад
thn youis it proved useful for me on the time...
@sairayaqub6091
@sairayaqub6091 4 года назад
How we can generate the key in Stream Cipher?
@akankshapandey8106
@akankshapandey8106 3 года назад
Same question
@trockskahlon
@trockskahlon 3 года назад
👍🏻
@accidentalGamer69
@accidentalGamer69 5 лет назад
thank you so much
@nazarmohammadziarmal3941
@nazarmohammadziarmal3941 5 лет назад
superb sir i am really impressed the way you explaining
@kalaakaarai
@kalaakaarai 5 лет назад
Copy of technical guru ji
@gagankaur8254
@gagankaur8254 4 года назад
Can we also use OR truth table for this type of algorithm?
@jithu1700
@jithu1700 4 года назад
No buddy. You can't use OR operation in Encryption because you won't be able to retrieve back original message!
Далее
#24 Stream Cipher - Working with Example |CNS|
4:50
Просмотров 54 тыс.
Обменялись песнями с POLI
00:18
Просмотров 260 тыс.
Stream Cipher 🔥🔥
6:59
Просмотров 11 тыс.
Stream Cipher vs. Block Cipher
9:46
Просмотров 102 тыс.