Important note: In the shift rows,circular left shift is done not circular right shift. Sir himself has verified this in comments but he didn't mark any annotation in the video. I am just writing it here so that who ever reads this correct him/herself. You can also check sir comments in replies below where he apologizes for his mistake. By the way your tutorials are nice sir.
hi thanks for your interest towards our channel and share my sessions with your friends and subscribe to our channel.Keep following our channel. feeling happy after watching your comment. keep on supporting our channel.
Hi, thanks for the videos. In this tutorial, within the shift row operation, Row 1 should left shift 1 byte, not 1 bits according to the diagram you demonstrated.
Sir you have helped me a lot sir during my exams time. Your explonation is very goood and clear. Keep maintian that sir. You are one of the best teacher in my study career. I was scared about this subject and i found you on youtube. Now i learned lot of subject. Thank you very much sir.
hi roberto i will try to upload it soon. thanks for your interest towards our channel and share my sessions with your friends and subscribe to our channel.Keep following our channel.
Hi Sir, Your lectures are crystal clear, with a lot of patience and clarifying every doubts students have. I see in most of the lectures, you have covered the encryption part of the algorithm. It would be really nice if you could make some videos on the decryption of each of these algorithms too. That would be very helpful to understand the system end to end. So with an example, you could explain how some data is encrypted at the sender and gets de-crypted at the receiving end. Thank you.
Hi syed Due to security issues I couldn't find the explanation even in single text book or net. So I didn't covered the decryption part. Thanks for your support towards our channel
hi sandeep thanks for your interest towards our channel and share my sessions with your friends and subscribe to our channel.Keep following our channel.
sir, we use total of 44 words ..which means we have to undergo 11 rounds . i.e for k0=add round key and for k1-k10 = common rounds .....u have written only k1-k9 ........16:40 please correct it .....overall it was a great tutorial :)
Very good explanation!! Just one point to be noted at @36:18 ..The rotation is Left Circular Shift.. Not a Right Circular Shift!! Again, thanks a lot for such insightful video!!!
Thank you so much sir❤️❤️ a very clear cut explanation, guys please watch this video don't skip because it's 49 mins, watch this you'll understand very clear all other videos are shit
One correction, in the shift row section of each round, each of the bits are shifted to the left by 0,1,2,3 bits. But a seriously well thought topic, thank you.
thank you sir it was great please arrange your video like number 1, then 2 .3 4.... which we learn by order perhaps some one don't know any more about network security from which video start to learn step by step thank you sir I hope be successfull
hi habibullah thanks for your interest towards our channel and share my sessions with your friends and subscribe to our channel.Keep following our channel.
hi ankush thanks for your interest towards our channel and share my sessions with your friends and subscribe to our channel.Keep following our channel. sure i will plan for the hard copy of material too.
hi Aparna thanks for your interest towards our channel and share my sessions with your friends and subscribe to our channel.Keep following our channel.
Sir how the key was expanded to 44words,you havent tell how it happens and we are having add round key initially,in this also same steps want to follow like what you explained a?
hi Aravind thanks for your interest towards our channel and share my sessions with your friends and subscribe to our channel.Keep following our channel.
Well explanation about AES algorithm. What about different modes in AES algorithm, like ECB, CBC, CTR, OCB, XTS. Please post videos regarding this, how to select proper AES algorithm.
Thank you so much sir. You made it in a way that every student can understand. One doubt ..........Sir, why do we neglect mix columns in the last round (10th round) ?
hi sheeba as i said that matrix is predefined means we have use the same in the algorithm.( just like formula) thanks for your interest towards our channel and share my sessions with your friends and subscribe to our channel.Keep following our channel.
in DES of s box has 4 rows and 16 columns means each row of numbers in between 0 to 16 but AES has 16 rows and 16 columns in each row how to take the numbers what are the numbers
hi das In AES s-box there will be 16 rows and 16 coloums. numbers are from 00 to FF (hexadecimal format) Maximum number from 8 bits can be represented in hexa is FF. Minimum number from 8 bits can be represented in hexa is 00. hope your doubt has been clarified.
Das the number of 16*16 metrix will be given to you! and from that you have to select the corresponding raws and column from that 8bit of each cell of given 4*4 metrix.
Hi Kailas thanks for your interest towards our channel and share my sessions with your friends and subscribe to our channel.Keep following our channel.
Very well explained. Sir I have a doubt.... why there are different S- Box values are available on internet , if you are saying these values are predefined ???
Hi harsh We can fill the 16 * 16 with random but each row should not contain duplications. Thanks for your support and interest towards our channel and share our channel with your friends. Keep following our channel.
hi chandu soon i will try to upload them. thanks for your interest towards our channel and share my sessions with your friends and subscribe to our channel.Keep following our channel.
Sir in Shiftrows, for each rounds is it 1 Bit right shift or 1 Byte Left Shift? When i observe the diagram in printed paper i have concluded it is 1Byte(not bit) Left Shift for round 1, simillarly for all other rounds. Thanks alot for the video sir !!
Hello Sundeep. It's really very very good explanation. Recently I started learning this. But after watching your video, I learnt it one session itself.. thank you so much for this. I have two questions.. 1. what is meant by key.? How to get that? and how to extract 44 sub keys? 2. If plain text is not equals to 4 words, assume 17 bytes, then this AES-128 algorithm will work? If yes, how it can be?
Hi suneel Thanks for your support towards our channel 1. Key is also some kind of text used in cipher text conversion. For generating subkeys there will some procedure to be followed. 2. If the plain text size is less than required then we are supposed to add 0s on left hand side of plain text. Hope your doubts have been clarified.
hi i had shown the s-box which i refered from william stallings text book and which book you have refered and were you find the difference. plz let me know so that we can correct the viewers.
Sir the circular shifted state array is taken as input to mixed couloums right? But is figure it is the array which was inputted to shift row.. Please clarify the doubt sir.
Sir, here you talked about plain text of size 128 bits. What if the plain text size is larger than or smaller than 128 bits. for example: 125 or 135 or 130 bits??.
Important note: In the shift rows,circular left shift is done not circular right shift. Sir himself has verified this in comments but he didn't mark any annotation in the video. I am just writing it here so that who ever reads this correct him/herself. You can also check sir comments in replies below where he apologizes for his mistake. By the way your tutorials are nice sir.
Sir you have really helped me a lot.
Today was my exam. You have helped me for my semester exam.
I thank from my heart.
Wow! I wish Teachers like you could be in every college. Thank you Sir, keep up the good work:)
hi
thanks for your interest towards our channel and share my sessions with your friends and subscribe to our channel.Keep following our channel. feeling happy after watching your comment.
keep on supporting our channel.
Can u help solve this..... In the S-AES algorithm 8309 is the ciphertext, assume the key is 2D55.
Determine the plaintext showing all steps
Thanks Sundeep. You have created a wonderful Channel and a strong following.
Hi, thanks for the videos. In this tutorial, within the shift row operation, Row 1 should left shift 1 byte, not 1 bits according to the diagram you demonstrated.
Sir you have helped me a lot sir during my exams time. Your explonation is very goood and clear. Keep maintian that sir. You are one of the best teacher in my study career. I was scared about this subject and i found you on youtube. Now i learned lot of subject. Thank you very much sir.
Thanks for explaining step by step and detailed process of AES algorithem...This video made my concept clear..
Really nicely explained! The only thing it's missing is the AES Key Expansion Algorithm. Thank you for your work :)
hi roberto
i will try to upload it soon.
thanks for your interest towards our channel and share my sessions with your friends and subscribe to our channel.Keep following our channel.
Exactly I was wondering about it
One correction, In the shift Rows transformation of the round, the shift is by 1 byte and NOT one bit.
Hello sir ,we all are following ur lecture in this lockdown.
I would like to correct you on the Row Shift. It is to the LEFT not to the right. For the Decryption, it is to the right.
Wow amazing I would pay double fees if my colg had atleast one professor like you
Hi Sir,
Your lectures are crystal clear, with a lot of patience and clarifying every doubts students have.
I see in most of the lectures, you have covered the encryption part of the algorithm. It would be really nice if you could make some videos on the decryption of each of these algorithms too.
That would be very helpful to understand the system end to end. So with an example, you could explain how some data is encrypted at the sender and gets de-crypted at the receiving end.
Thank you.
Hi syed
Due to security issues I couldn't find the explanation even in single text book or net. So I didn't covered the decryption part.
Thanks for your support towards our channel
wonderful video sir..only one doubt i come across , how to expand the key?
All your videos are very good crystal clear sir, thank you very much it helped a lot for my sem exams , wonderful job thank u once again .
hi sandeep
thanks for your interest towards our channel and share my sessions with your friends and subscribe to our channel.Keep following our channel.
Sir, the bits are rotated circularly to the left.
E.g: Row 3 ( 4 8 12 16 ) -> ( 16 4 8 12 )
yes
you are correct
shift is based on row number
it is left shifted no? in the video it is mentioned right shift
Hi Utsav Das
you are correct and it is left shift and nice observation and thanks for correction.
please mark the annotation in the video because every one not going through the comments
Thanks Sir and Thanks Bro! Got doubt in the same area!!!
Sir thank you your tutorial is one of the best videos i come across in cryptography please continue with the great work
Sir, in the shift rows,circular left shift is done not circular right shift.Kindly verify!
hi, I researched and i came to know that its circular left shift.
@@RiyanshikaVideo great
thank you
sir, we use total of 44 words ..which means we have to undergo 11 rounds . i.e for k0=add round key and for k1-k10 = common rounds .....u have written only k1-k9 ........16:40 please correct it .....overall it was a great tutorial :)
hi raj
yes your are correct i have to write k1 - k10
thanks for observation and correction. i am sorry for my mistake.
Thanks for pointing that out Raj! I got a little confused but now it's all cool
Thank you so much sir, it is indeed a boon to have you guide us with this cryptography stuff.
Very good explanation!! Just one point to be noted at @36:18 ..The rotation is Left Circular Shift.. Not a Right Circular Shift!! Again, thanks a lot for such insightful video!!!
Your explanation was crystal clear and thanks for good explanation sir.
Excellent video, clear explanation of concept. Good work.
Thank you for posting such a great content which helps us to learn n understand quickly
Really wonderful explanation to complex AES algo.
Sir, ur explanation is so clear nd wow.
We need BlowFish Algorithm too
Thank you so much sir❤️❤️ a very clear cut explanation, guys please watch this video don't skip because it's 49 mins, watch this you'll understand very clear all other videos are shit
Clearcut explanation . Thankyou sir
I like your video very much. It's really great. I'll keep an eye on your channel. I am your fan and I will support you.
the shift is left not right and the no.of round depends upon the the key size.
I think you are doing better than an IIT Professors and you are the best "believe me"
In substitution bytes, that 52 is in base 16 so it's technically 82 in base 10.
One correction, in the shift row section of each round, each of the bits are shifted to the left by 0,1,2,3 bits. But a seriously well thought topic, thank you.
boosted
well explained but did you miss on Key Generation?
Excellent explanation, Love the way of your teaching, lots of thanks and love
Sir, I scored good marks only by watching ur videos ..... Ur classes r so flexible to understand
Excellent sir. Thank you very much.
thank you sir it was great please arrange your video like number 1, then 2 .3 4.... which we learn by order perhaps some one don't know any more about network security from which video start to learn step by step thank you sir I hope be successfull
hi habibullah
thanks for your interest towards our channel and share my sessions with
your friends and subscribe to our channel.Keep following our channel.
Thank you for the great effort and making it freely available.
.15:23 I think R-10 round takes K-10th key (total 11 keys from 0 to 10)
Thank u for these brilliant lectures
kindly give us the link to the computer printed pages too
hi ankush
thanks for your interest towards our channel and share my sessions with
your friends and subscribe to our channel.Keep following our channel. sure i will plan for the hard copy of material too.
Your efforts are great sir.
OMG.... Thank you so much sir... Your vedios were very helpful...😻🙏
Fabulous explanation sir... Thank u soo much for ur clear explanation sir...!!
how to choose the Key for DES ? for permutation choice1 we use the 64-bit key on what bases we consider the key
Good one . Nice explanation sir
hi Aparna
thanks for your interest towards our channel and share my sessions with your friends and subscribe to our channel.Keep following our channel.
You did a great job. Very Well Explained. Thanks!
Superb Sir!!...explanation was great, you saved my day!..Thanks
Sir how the key was expanded to 44words,you havent tell how it happens and we are having add round key initially,in this also same steps want to follow like what you explained a?
Bro tat w(0,3) came as input to Round 1. So basically 1st Round starts with w(4,7) tats why Last round key is w(40,43)
Very nice explanation.Thank you so much sir..!!
hi pooja
thanks for your interest towards our channel and share my sessions with your friends and subscribe to our channel.Keep following our channel.
Ok what about if i use 192 key how many words will be use each round , is it 4 also or 6 , if 6 that will be 192 bits size !!!
Thank You Sir! Your videos helped a lot. Keep up the good work. I shared your videos among my friends.
hi Aravind
thanks for your interest towards our channel and share my sessions with your friends and subscribe to our channel.Keep following our channel.
Sundeep Saradhi Kanthety Will sure do Sir.
Excellent Session.... Thank you very much.
So useful very good explination sir upload more videos on AES algoritm
I love your way of explanation, it is very clear .. thanks a lottttttt . keep going .
Well explanation about AES algorithm. What about different modes in AES algorithm, like ECB, CBC, CTR, OCB, XTS. Please post videos regarding this, how to select proper AES algorithm.
Sir...similarly, pls give the explanation for AES-256
Very useful.....sir..... helps me a lot
thank you
Explain one problem sir in des and aes
Thank you so much sir. You made it in a way that every student can understand. One doubt ..........Sir, why do we neglect mix columns in the last round (10th round) ?
That is how the algorithm is designed.
Really good explanation sir
s box input 16*16 matrix values are predefined
Sir.... last R10 can contains subkey K10 only know Sir. .. Kindly clarify
Hi
Yes you are correct
why we do not apply mix column in last round of AES?
HI
That is how the algorithm designed and we are supposed to follow that.
Small correction at 15:58, round 10 has K10 only sir, you wrote K9. R2 has K2, R3 has K3 and R10 has K10.
yes ...it must be R10 and K10
Sir, your lectures are amazing !
hi uma devi
thanks for your interest towards our channel.
Sir, in SiftRows , the bits are shifted to left using Circular Left Shift ? isn't it
good explanation sir.one doubt how we get the predefined 4×4 matrix .thank you
hi sheeba
as i said that matrix is predefined means we have use the same in the algorithm.( just like formula)
thanks for your interest towards our channel and share my sessions with
your friends and subscribe to our channel.Keep following our channel.
thank you very much for the tutorial. could you please explain how the S-Box TABLEs for DES and AES are formed. what is GF(2^8)?
Nicely Explained Sir.
Help me out here? What is the benefit of understanding the logic of AES since it has been developed?
you are amazing sir . may god bless you. if possible can you make a tutorial by solving a problem. thnk u
Thank you very much, well explained...like your videos!!!!!!!!!!!....i love you videos.
hi
thanks for your interest towards our channel and share my sessions with your friends and subscribe to our channel.Keep following our channel.
you teach with passion , thank you
Can you give Elliptic Curve Cryptogrpahy(ECC) explanation
hi srihari
sure i will upload.
i had some doubts regarding this concept so let me clarify them and i will upload it.
Sundeep Saradhi Kanthety
Sir.. please upload soon..
@@sundeepsaradhi sir have u uploaded
in DES of s box has 4 rows and 16 columns means each row of numbers in between 0 to 16 but AES has 16 rows and 16 columns in each row how to take the numbers what are the numbers
hi das
In AES s-box there will be 16 rows and 16 coloums.
numbers are from 00 to FF (hexadecimal format)
Maximum number from 8 bits can be represented in hexa is FF.
Minimum number from 8 bits can be represented in hexa is 00.
hope your doubt has been clarified.
thank you sir , please upload Rc4 Stream cipher in your channel
Das the number of 16*16 metrix will be given to you! and from that you have to select the corresponding raws and column from that 8bit of each cell of given 4*4 metrix.
how did you expand the initial key of 4 words to generate 40 sub-keys?
Outstanding explanation..
Hi Kailas
thanks for your interest towards our channel and share my sessions with your friends and subscribe to our channel.Keep following our channel.
Very well explained. Sir I have a doubt.... why there are different S- Box values are available on internet , if you are saying these values are predefined ???
see his des algorithm video
sir, what will be in 16*16 matrix of s-box according to my observation there are some random values plz reply if i am wrong...thank you!
Hi harsh
We can fill the 16 * 16 with random but each row should not contain duplications.
Thanks for your support and interest towards our channel and share our channel with your friends. Keep following our channel.
Nice explanation Sir. Thank you.
sir,can You please provide videos on blowfish or cast 128 algorithms.
Thankyou
hi chandu
soon i will try to upload them.
thanks for your interest towards our channel and share my sessions with your friends and subscribe to our channel.Keep following our channel.
Thanks for the video, one doubt is is it circular right shift or circular left shift? Because arrows are shown towards the left.
Awesome explanation thousand thanks Dude !
Hi
Thank you for your support towards our channel share our channel with your friends and keep following our channel.
Great effort in teaching the algorithm. Your teaching technique is commendable sir!
Sir in Shiftrows, for each rounds is it 1 Bit right shift or 1 Byte Left Shift? When i observe the diagram in printed paper i have concluded it is 1Byte(not bit) Left Shift for round 1, simillarly for all other rounds.
Thanks alot for the video sir !!
Hello Sundeep. It's really very very good explanation. Recently I started learning this. But after watching your video, I learnt it one session itself.. thank you so much for this. I have two questions..
1. what is meant by key.? How to get that? and how to extract 44 sub keys?
2. If plain text is not equals to 4 words, assume 17 bytes, then this AES-128 algorithm will work? If yes, how it can be?
Hi suneel
Thanks for your support towards our channel
1. Key is also some kind of text used in cipher text conversion.
For generating subkeys there will some procedure to be followed.
2. If the plain text size is less than required then we are supposed to add 0s on left hand side of plain text.
Hope your doubts have been clarified.
@@sundeepsaradhi what about more than required
Sir can you please explain the "AES Algorithm using Pipelining" method
Super duper explanation.
Sir, here you are using a different s-box. Do we need to calculate s- box each time or it is fixed? Because in the book there is a different s-box.
hi
i had shown the s-box which i refered from william stallings text book and
which book you have refered and were you find the difference. plz let me know so that we can correct the viewers.
Sir, mine is also from William stallings book 5th edition.
Thank you sir...for this detail and Best explanation
Hello, please can you explain how the 4word key is used to generate, 44 sub keys, each of 4word length?
Sir the circular shifted state array is taken as input to mixed couloums right? But is figure it is the array which was inputted to shift row.. Please clarify the doubt sir.
In s box , the input box is converted to state array then to s box step and then converted to s' state array ?
Hi, how did you write 01010010 at 32:35 ?
can you tell me about what are the applications used in AES and DES algorithm
Sir in input array , is it each cell represent 1 byte or each column? If each cell means in total it gives 16bytes=128bits. Kindly clarify.
Hi
Here each column is represented with 1 Byte.
Thanks a lot, it helped me during Mtech.
Sir, here you talked about plain text of size 128 bits. What if the plain text size is larger than or smaller than 128 bits. for example: 125 or 135 or 130 bits??.
Could you upload an example of the explanation
It would be more helpful if a example video is there
Yeah....an example would make it even more clear
Thanks for the Awesome Explanation.