I have to say that i am very gratefull with you because you saved me many time trying to find the correct documentation about this topic. Thanks god for people like you.
I just passed the sy0-501 exam this morning on my first try. I studied for about 2 months and your very concise videos were a constant aid to my studies. I also used your practice exams on my last days prior to taking the exam and I think they really helped prepare me for how the test questions were worded. Thanks for doing what you do!
Thank you Professor Messer for taking the time to explain this in the most easiest way a novice like me is able to comprehend. I've listened to other instructor. Your teaching is the best! Many blessings to you for all your efforts
Prof. Messer, where in the cipher modes does AES/DES/blowfish reside? Take ECB schema, for instance, is the algorithm (AES/DES/Two fish) the process that uses the Key to transform the plain text to the ciphertext and vice versa?
I have to say that i am very gratefull with you because you saved me many time trying to find the correct documentation about this topic.
Thanks god for people like you.
I just passed the sy0-501 exam this morning on my first try. I studied for about 2 months and your very concise videos were a constant aid to my studies. I also used your practice exams on my last days prior to taking the exam and I think they really helped prepare me for how the test questions were worded. Thanks for doing what you do!
Thank you for explaining this topic for me to understand better than the readings from other study sites.
Thank you Professor Messer for taking the time to explain this in the most easiest way a novice like me is able to comprehend. I've listened to other instructor. Your teaching is the best! Many blessings to you for all your efforts
Thank you so much for the clear explanation!
Great explanation with details. I have a better understanding now. Thank you sir!
Prof. Messer, where in the cipher modes does AES/DES/blowfish reside? Take ECB schema, for instance, is the algorithm (AES/DES/Two fish) the process that uses the Key to transform the plain text to the ciphertext and vice versa?
is the block size the same lenght of the key?