Computer Data & Network Security: Cryptography with Bangla Code Tutorial

Learn about cryptography techniques used in computer data and network security through detailed Bangla tutorials, including practical coding examples. Explore related data structures and algorithms with comprehensive playlists.

content on demandâ€ĸ368 viewsâ€ĸ01:27:29

đŸ”Ĩ Related Trending Topics

LIVE TRENDS

This video may be related to current global trending topics. Click any trend to explore more videos about what's hot right now!

THIS VIDEO IS TRENDING!

This video is currently trending in Nigeria under the topic 'nysc portal registration batch c'.

About this video

Data Structure Playlist: https://youtube.com/playlist?list=PLW7fU_8SZVrtXC0wsG7_X4onIDuKvapXH Algorithm Playlist: https://youtube.com/playlist?list=PLW7fU_8SZVrv12r_JAXHNOGF1av6eqPbS computer Network Playlist: https://youtube.com/playlist?list=PLW7fU_8SZVruBsFfULu9QRDsFfFSg77Cu Wireless ad-hoc network playlist: https://youtube.com/playlist?list=PLW7fU_8SZVrtgOkfjZFLh_46QvOR6Di5y Design Pattern Playlist: https://youtube.com/playlist?list=PLW7fU_8SZVrtz-riKwgnx6u6U0QvYtVOk Management Information System Playlist: https://youtube.com/playlist?list=PLW7fU_8SZVrs0h1gOsZRokHzlYmcShvjp Definition of 'Cryptography' Definition: Cryptography is associated with the process of converting ordinary plain text into unintelligible text and vice-versa. It is a method of storing and transmitting data in a particular form so that only those for whom it is intended can read and process it. Cryptography not only protects data from theft or alteration, but can also be used for user authentication. Description: Earlier cryptography was effectively synonymous with encryption but nowadays cryptography is mainly based on mathematical theory and computer science practice. Modern cryptography concerns with: Confidentiality - Information cannot be understood by anyone Integrity - Information cannot be altered. Non-repudiation - Sender cannot deny his/her intentions in the transmission of the information at a later stage Authentication - Sender and receiver can confirm each Cryptography is used in many applications like banking transactions cards, computer passwords, and e- commerce transactions. Three types of cryptographic techniques used in general. 1. Symmetric-key cryptography 2. Hash functions. 3. Public-key cryptography Symmetric-key Cryptography: Both the sender and receiver share a single key. The sender uses this key to encrypt plaintext and send the cipher text to the receiver. On the other side the receiver applies the same key to decrypt the message and recover the plain text. Public-Key Cryptography: This is the most revolutionary concept in the last 300-400 years. In Public-Key Cryptography two related keys (public and private key) are used. Public key may be freely distributed, while its paired private key, remains a secret. The public key is used for encryption and for decryption private key is used. Hash Functions: No key is used in this algorithm. A fixed-length hash value is computed as per the plain text that makes it impossible for the contents of the plain text to be recovered. Hash functions are also used by many operating systems to encrypt passwords.

Video Information

Views
368

Total views since publication

Likes
12

User likes and reactions

Duration
01:27:29

Video length

Published
Nov 11, 2021

Release date

Quality
hd

Video definition