Master Basic Cryptography: Complete Notes & Past Questions for B.Tech 2nd Year π
Boost your cybersecurity knowledge with comprehensive notes and previous year questions on Basic Cryptography (Chapter 04). Perfect for B.Tech 2nd-year students preparing for exams and understanding core concepts. #Cybersecurity #CSS #LearnByCode

learn by code
107 views β’ Feb 27, 2023

About this video
#learnbycode #CSS #cybersecurity #aktucss #2ndyear #uptu #aktu #btech #Cyptography
Basic Cryptography | Chapter - 04| Complete Chapter Notes + Previous Year | Cyber System and Security | 2nd Year B.Tech
Topic covered are :
0:00 - Introduction
0:28 - Basic terminologies in Basic cryptography.
1:09 - Previous Year Q. Explain the term Public key Cryptography in detail.
1:58 - Previous Year Q. What is Encryption and Decryption in Cyber System and Security .
2:21 - Diffrence between symmetric and asymmetric key cryptography in tabular form.
2:44 - Previous Year Q. Explain RSA Public key Cryptography.
3:40 - Previous Year Q. .Explain RSA algorithm. Perform Encryption and Decryption using RSA for p=11,q=13,e=7,m=9.
4:10 - Previous Year Q. What are Asymmetric Algorithms ? Give their advantages and disadvantages.
4:33 - Previous Year Q. Write a short note on secret key cryptography. Also list its advantages, disadvantages and examples.
5:01 - Previous Year Q. Discuss single vs public-key cryptography. Also list its advantages, disadvantages and examples.
5:51 - Previous Year Q. What is a Digital Signature? How Digital Signature Works?
6:46 - Previous Year Q. Discuss any three types of digital signatures and what are the steps to use them in the real world ?
7:25 - Public key distribution and methods for public key distribution.
7:52 - Hash function / Features of hash functions / Design of Hashing Algorithms / Application of Hash Functions:
8:58 - Types of real world protocol- several types.
9:30 - Previous Year Q. Explain any three real world Protocols and what are the steps to use them in the real world.
10:08 - Previous Year Q. Explain SSL Encryption. What are steps involved in SSL server authentication.
10:43 - SSL ? How does SSL/TLS work ? Why is SSL important ?
11:02 - SSL certificate and what are the types of SSL certificate ?
11:28 - Previous Year Q. What are the difference between HTTPs, SSL and TLS ?
12:02 - Previous Year Q. Explain of IP protocol function?
12:29 - Previous Year Q. What is DNS and how does it work ?
13:14 - Previous Year Q. Explain what is Email security certificates ? / types of email security certificates
13:40 - Architecture of email security system and How to secure email ?
14:28 - Email hacking can be done in any of the following ways: Spam, Virus, Phishing ? explain .
14:54 - Transport Layer security ( TLS ) .
15:32 - Working of TLS and several benefits of TLS / Two main transport layer protocols are used .
16:18 - What is DNS actually and why is DNS security important ? Explain. / their attacks / fast flux / prevention / DINSSEC / measures to prevent DNS attack.
17:26 - IP security and Uses of IP security.
17:50 - Functional areas of IPsec. How does IPsec work ?
18:20 - Protocols are used in IPsec .
18:40 - Internal key exchange (IKE) and Kerberos authentication protocol .
Syllabus : (AKTU/UPTU)
Basic cryptography: Public key cryptography ,RSA public key crypto ,Digital signature Hash
functions ,Public key distribution ,Real world protocols ,Basic terminologies ,Email security
certificates ,Transport Layer security TLS ,IP security , DNS security.
This channel not only provides code and program but it also provide notes and various information related to engineering..
If there is any Spelling mistake , then just ignore it ..
Next time we will done better..
If there is any important concept is missing in this notes so please comment and we will definately add it in notes.
Thanks You,
Please share, like and subscribe..
Basic Cryptography | Chapter - 04| Complete Chapter Notes + Previous Year | Cyber System and Security | 2nd Year B.Tech
Topic covered are :
0:00 - Introduction
0:28 - Basic terminologies in Basic cryptography.
1:09 - Previous Year Q. Explain the term Public key Cryptography in detail.
1:58 - Previous Year Q. What is Encryption and Decryption in Cyber System and Security .
2:21 - Diffrence between symmetric and asymmetric key cryptography in tabular form.
2:44 - Previous Year Q. Explain RSA Public key Cryptography.
3:40 - Previous Year Q. .Explain RSA algorithm. Perform Encryption and Decryption using RSA for p=11,q=13,e=7,m=9.
4:10 - Previous Year Q. What are Asymmetric Algorithms ? Give their advantages and disadvantages.
4:33 - Previous Year Q. Write a short note on secret key cryptography. Also list its advantages, disadvantages and examples.
5:01 - Previous Year Q. Discuss single vs public-key cryptography. Also list its advantages, disadvantages and examples.
5:51 - Previous Year Q. What is a Digital Signature? How Digital Signature Works?
6:46 - Previous Year Q. Discuss any three types of digital signatures and what are the steps to use them in the real world ?
7:25 - Public key distribution and methods for public key distribution.
7:52 - Hash function / Features of hash functions / Design of Hashing Algorithms / Application of Hash Functions:
8:58 - Types of real world protocol- several types.
9:30 - Previous Year Q. Explain any three real world Protocols and what are the steps to use them in the real world.
10:08 - Previous Year Q. Explain SSL Encryption. What are steps involved in SSL server authentication.
10:43 - SSL ? How does SSL/TLS work ? Why is SSL important ?
11:02 - SSL certificate and what are the types of SSL certificate ?
11:28 - Previous Year Q. What are the difference between HTTPs, SSL and TLS ?
12:02 - Previous Year Q. Explain of IP protocol function?
12:29 - Previous Year Q. What is DNS and how does it work ?
13:14 - Previous Year Q. Explain what is Email security certificates ? / types of email security certificates
13:40 - Architecture of email security system and How to secure email ?
14:28 - Email hacking can be done in any of the following ways: Spam, Virus, Phishing ? explain .
14:54 - Transport Layer security ( TLS ) .
15:32 - Working of TLS and several benefits of TLS / Two main transport layer protocols are used .
16:18 - What is DNS actually and why is DNS security important ? Explain. / their attacks / fast flux / prevention / DINSSEC / measures to prevent DNS attack.
17:26 - IP security and Uses of IP security.
17:50 - Functional areas of IPsec. How does IPsec work ?
18:20 - Protocols are used in IPsec .
18:40 - Internal key exchange (IKE) and Kerberos authentication protocol .
Syllabus : (AKTU/UPTU)
Basic cryptography: Public key cryptography ,RSA public key crypto ,Digital signature Hash
functions ,Public key distribution ,Real world protocols ,Basic terminologies ,Email security
certificates ,Transport Layer security TLS ,IP security , DNS security.
This channel not only provides code and program but it also provide notes and various information related to engineering..
If there is any Spelling mistake , then just ignore it ..
Next time we will done better..
If there is any important concept is missing in this notes so please comment and we will definately add it in notes.
Thanks You,
Please share, like and subscribe..
Video Information
Views
107
Likes
17
Duration
19:21
Published
Feb 27, 2023
Related Trending Topics
LIVE TRENDSRelated trending topics. Click any trend to explore more videos.
Trending Now