Learn Cryptography Basics in Malayalam | Free Online Video Tutorial π
Discover the fundamentals of cryptography with Aju J S. This easy-to-understand Malayalam tutorial covers encryption, decryption, and the importance of secure algorithms. Perfect for beginners!

AJU ED Solutions
19.4K views β’ May 24, 2020

About this video
This video contains basic information about Cryptography. It contains the details about Cryptography , needs of encryption and decryption algorithms. Also you can find the information about Cryptology .
Cryptanalyst , a person who analyse ciphertext and trying to find plain text and the key. Symmetric cryptosystems or secret key cryptosystems or conventional cryptosystems is the earliest cryptosystems. Due to some drawbacks of this system next type that is asymmetric cryptosystem came later. Public Key cryptosystem is an example of Asymmetric cryptosystem.
Public Key Cryptography Video Tutorial Link in Malayalam
https://youtu.be/t0CcDA0t8tI
During encryption two techniques are used that is Substitution techniques and Transposition techniques. Casers Cipher is an example of Substitution techniques and Rail fence techniques is an example of Transposition Techniques.
Block cipher or Stream Cipher method is used while doing encryption / decryption. Major difference between these two methods you can find it through this video.
DES | Data Encryption Standard Video Tutorial Link in Malayalam
https://youtu.be/PCMmC1FgHDk
These lectures are created by AJU J S | Online video tutorials for computer science papers.
Channel Link
https://www.youtube.com/c/lecturesbyajujs
Cryptanalyst , a person who analyse ciphertext and trying to find plain text and the key. Symmetric cryptosystems or secret key cryptosystems or conventional cryptosystems is the earliest cryptosystems. Due to some drawbacks of this system next type that is asymmetric cryptosystem came later. Public Key cryptosystem is an example of Asymmetric cryptosystem.
Public Key Cryptography Video Tutorial Link in Malayalam
https://youtu.be/t0CcDA0t8tI
During encryption two techniques are used that is Substitution techniques and Transposition techniques. Casers Cipher is an example of Substitution techniques and Rail fence techniques is an example of Transposition Techniques.
Block cipher or Stream Cipher method is used while doing encryption / decryption. Major difference between these two methods you can find it through this video.
DES | Data Encryption Standard Video Tutorial Link in Malayalam
https://youtu.be/PCMmC1FgHDk
These lectures are created by AJU J S | Online video tutorials for computer science papers.
Channel Link
https://www.youtube.com/c/lecturesbyajujs
Tags and Topics
Browse our collection to discover more content in these categories.
Video Information
Views
19.4K
Likes
622
Duration
31:03
Published
May 24, 2020
User Reviews
4.6
(3) Related Trending Topics
LIVE TRENDSRelated trending topics. Click any trend to explore more videos.
Trending Now