Koncept Recall

Videos from Koncept Recall

Page 1 of 1 • 17 total videos

Understanding Additive and Multiplicative Inverses Modulo 8 | Cryptography Lecture 51
7:38

Understanding Additive and Multiplicative Inverses Modulo 8 | Cryptography Lecture 51

Koncept Recall
137 views
GCD Example | Urdu/Hindi | Cryptography | Chapter 4 | Lecture 47
3:34

GCD Example | Urdu/Hindi | Cryptography | Chapter 4 | Lecture 47

Koncept Recall
26 views
The Division Algorithm | Urdu Hindi | Cryptography | Chapter 4  | Lecture 44
2:27

The Division Algorithm | Urdu Hindi | Cryptography | Chapter 4 | Lecture 44

Koncept Recall
45 views
The Avalanche Effect in DES Algorithm | Urdu/Hindi |Cryptography | Chapter 3 | Lecture 42
5:34

The Avalanche Effect in DES Algorithm | Urdu/Hindi |Cryptography | Chapter 3 | Lecture 42

Koncept Recall
107 views
Feistel Cipher | Design Features | Urdu/Hindi | Cryptography | Chapter 3 | Lecture 37
4:46

Feistel Cipher | Design Features | Urdu/Hindi | Cryptography | Chapter 3 | Lecture 37

Koncept Recall
25 views
Feistel Cipher | Part 3 | Feistel Parameters | Urdu Hindi | Cryptography | Chapter 3 | Lecture 36
1:58

Feistel Cipher | Part 3 | Feistel Parameters | Urdu Hindi | Cryptography | Chapter 3 | Lecture 36

Koncept Recall
9 views
Known Plaintext Ciphertext Attack on Hill Cipher, Cryptography, Chapter 2, Lecture 25
3:10

Known Plaintext Ciphertext Attack on Hill Cipher, Cryptography, Chapter 2, Lecture 25

Koncept Recall
109 views
Encryption Decryption using Hill Cipher with 2x2 Matrix | Cryptography | Chapter 2  |  Lecture 22
9:15

Encryption Decryption using Hill Cipher with 2x2 Matrix | Cryptography | Chapter 2 | Lecture 22

Koncept Recall
253 views
Relative Frequency Test to Break Cipher | Cryptography | Chapter 2 | Lecture 17
6:49

Relative Frequency Test to Break Cipher | Cryptography | Chapter 2 | Lecture 17

Koncept Recall
11 views
Bruteforce Cryptanalysis of Caesar Cipher | Cryptography | Chapter 2  | Lecture 16
5:02

Bruteforce Cryptanalysis of Caesar Cipher | Cryptography | Chapter 2 | Lecture 16

Koncept Recall
182 views
Caesar Cipher | Conventional Encryption | Cryptography | Chapter 2 | Lecture no 15
7:36

Caesar Cipher | Conventional Encryption | Cryptography | Chapter 2 | Lecture no 15

Koncept Recall
22 views
Modular Athematic | uses in Classical Encryption Techniques | Cryptography | Chapter 2 | Lecture 14
9:50

Modular Athematic | uses in Classical Encryption Techniques | Cryptography | Chapter 2 | Lecture 14

Koncept Recall
6 views
Cryptanalysis Attacks | Cryptography | Chapter 2 | Lecturer 12
6:03

Cryptanalysis Attacks | Cryptography | Chapter 2 | Lecturer 12

Koncept Recall
17 views
Characteristics of Cryptographic Systems | Cryptography | Chapter 2 | Lecture 11
3:49

Characteristics of Cryptographic Systems | Cryptography | Chapter 2 | Lecture 11

Koncept Recall
47 views
Model of Symmetric Cryptosystem | Cryptography | Chapter 2 | Lecture 10
4:32

Model of Symmetric Cryptosystem | Cryptography | Chapter 2 | Lecture 10

Koncept Recall
227 views
Secure Use of Conventional Encryption | Cryptography | Chapter 2 | Lecture 9
3:17

Secure Use of Conventional Encryption | Cryptography | Chapter 2 | Lecture 9

Koncept Recall
26 views
Symmetric Cipher Model, Cryptography, Chapter 2, Lecture 8
4:52

Symmetric Cipher Model, Cryptography, Chapter 2, Lecture 8

Koncept Recall
38 views