Mastering Data Encryption Standards & Block Cipher Modes π
Explore the structure, key generation, and security features of DES, along with modes of block ciphers and hash functions. Enhance your understanding of cryptography in computing!

KTU Computer Science Tutorials
2.6K views β’ Jan 13, 2023

About this video
Modes of Block Ciphers-mod 2: https://youtu.be/_1eIGXPZFxw
Hash Function 1-mod 4: https://youtu.be/bCv_mKD5PJ4
Hash function 2-mod 4: https://youtu.be/TLE--yWyNw0
Message authentication Code-Requirements mod 4: https://youtu.be/R4iuEbpzJFU
Digital signature- mod 4 : https://youtu.be/z92gl0-8eLc
Digital Signature Standard-mod 4: https://youtu.be/Swq6y2NGKI8
Distribution of secret keys-mod 5:https://youtu.be/uqzYay0SYDU
Distribution of Public keys-Mod 5:https://youtu.be/NDJVYUFGdWI
Malicious software-mod 5:https://youtu.be/X3Fn-GlPLhE
Viruses-1-mod 5:https://youtu.be/TGT2mTsnmAs
viruses-2-mod 5: https://youtu.be/pD68A_SBPIs
Join this channel to get access to perks:
https://www.youtube.com/channel/UCNhpTl8Bdn-IDAAI46yqsMA/join
Hash Function 1-mod 4: https://youtu.be/bCv_mKD5PJ4
Hash function 2-mod 4: https://youtu.be/TLE--yWyNw0
Message authentication Code-Requirements mod 4: https://youtu.be/R4iuEbpzJFU
Digital signature- mod 4 : https://youtu.be/z92gl0-8eLc
Digital Signature Standard-mod 4: https://youtu.be/Swq6y2NGKI8
Distribution of secret keys-mod 5:https://youtu.be/uqzYay0SYDU
Distribution of Public keys-Mod 5:https://youtu.be/NDJVYUFGdWI
Malicious software-mod 5:https://youtu.be/X3Fn-GlPLhE
Viruses-1-mod 5:https://youtu.be/TGT2mTsnmAs
viruses-2-mod 5: https://youtu.be/pD68A_SBPIs
Join this channel to get access to perks:
https://www.youtube.com/channel/UCNhpTl8Bdn-IDAAI46yqsMA/join
Video Information
Views
2.6K
Likes
19
Duration
21:51
Published
Jan 13, 2023
User Reviews
4.1
(2)