UNIT-IV SECURITY PRACTICE & SYSTEM SECURITY:Authentication applications-Kerberos-X.509 Authentication services - Internet Firewalls for Trusted System: Roles of Firewalls-Firewall Firewall designs related terminology Types of Firewalls SET for E-Commerce Virus and related threats Transactions. Intruder Intrusion detection system Countermeasures-Firewalls design principles - Trusted systems-Practical implementation of cryptography and security
Plaintext would be extended with padding to have right size. Plaintext is rarely right size for AES it is very common it requires padding to be some multiplication of 128bits
@@GamingWithSamiCheema Take it with a grain of salt, but my understanding is that it will be extended for example to August\x0A\x0A\x0A\x0A\x0A\x0A\x0A\x0A\x0A\x0A. (You just added 10x x0A Byte at the end of it to extend August which was 6 bytes to 16bytes) It depends on the type of padding which will be used there are different types. This one is for example is defined by PKCS7. Padding is usually just repeatedly adding some specific bits just to make message longer so it fits the required bit length. Then you have right length for plaintext and you can encrypt it with AES block cipher. When decryption happens you still will have plaintext with padding and you have to also remove it afterwards to get purely message.
not all heros wear caps , sometimes it could be an indian mind behind a youtube video
👏🏻🫡
You are a life saver! Thank you so much. What was taught by my professor in 4 hrs, took you 10 mins. So concise and straight to the point :)
Thanks for the elaborate vdos on the subject matter, these are golden n u r a true gem of teacher .
Dhanyavadanulu guruji ..,🙏
This is great, i couldn't get it first before this video
TRUE LINES " डर असफल होने से नहीं लगता है😔
डर तो " माँ बाप " के उदास चेहरे से लगता है" 😔😭😭//❤
clear and logically sound !!
UNIT-IV
SECURITY PRACTICE & SYSTEM SECURITY:Authentication applications-Kerberos-X.509
Authentication services - Internet Firewalls for Trusted System: Roles of Firewalls-Firewall
Firewall designs related terminology Types of Firewalls SET for E-Commerce
Virus and related threats
Transactions. Intruder Intrusion detection system
Countermeasures-Firewalls design principles - Trusted systems-Practical implementation of cryptography and security
Dear neso ,could you help me out by implementing AES,RSA algorithm,and other substitution techniques , in C c++ or java
Thanks big dawg
omg! thanks mario!!!!
Pls make a vedio on this topic: Blow fish RC -5 Algorithm..
Sir academy location
pwj was here
What to do , if we have Key or plaintext other than 128 or 192 or 256 bits??? What if plain text is less than 128 bits?
Plaintext would be extended with padding to have right size. Plaintext is rarely right size for AES it is very common it requires padding to be some multiplication of 128bits
@@tonnytrumpet734what is padding?
For example, we have key as:
August
So how to complete it to 16 bytes
@@GamingWithSamiCheema Take it with a grain of salt, but my understanding is that it will be extended for example to August\x0A\x0A\x0A\x0A\x0A\x0A\x0A\x0A\x0A\x0A. (You just added 10x x0A Byte at the end of it to extend August which was 6 bytes to 16bytes)
It depends on the type of padding which will be used there are different types. This one is for example is defined by PKCS7. Padding is usually just repeatedly adding some specific bits just to make message longer so it fits the required bit length.
Then you have right length for plaintext and you can encrypt it with AES block cipher. When decryption happens you still will have plaintext with padding and you have to also remove it afterwards to get purely message.
@@tonnytrumpet734 okay, thank you so much
Williams Brian Hernandez Jeffrey Lopez Daniel
who're they
💥
🎉
bhai padhata to acha ho hindi me bhi ajao subscribers or jyada badh jayenge
0576 Grady Hill