✪✪✪✪✪ http://www.theaudiopedia.com ✪✪✪✪✪ What is PSEUDORANDOM NUMBER GENERATOR? What does PSEUDORANDOM NUMBER GENERATOR mean? PSEUDORANDOM NUMBER GENERATOR meaning – PSEUDORANDOM NUMBER GENERATOR definition – PSEUDORANDOM NUMBER GENERATOR explanation. Source: Wikipedia.org article, adapted under https://creativecommons.org/licenses/by-sa/3.0/ license. A pseudorandom number generator (PRNG), also known as a deterministic random bit generator (DRBG), isContinue Reading

Lesson 3 of cryptography series (to see all video check cryptography playlist – link given below). cryptography playlist : https://www.youtube.com/watch?v=_Yw7QWbk9Vs&list=PLf8bMP4RWebLVGpUnhji9Olkj1jdXfzFd Subscribe to our new youtube channel also : https://www.youtube.com/channel/UCNx1Gkyy9LfOxDMbcOKuV4g cryptographic hash functions – storing data in databases securely this video includes : what are hash functions , what is theContinue Reading

Types of digital signature approaches – RSA approach – DSS approach Digital Signature Algorithm with easy explanation.The Digital Signature Algorithm (DSA) is a Federal Information Processing Standard for digital signatures.It was proposed by the National Institute of Standards and Technology (NIST) in August 1991 for use in their Digital SignatureContinue Reading

Step by step instructions on how to use The Chinese Remainder Theorem to solve a system of linear congruence. Visit Our Channel :- https://www.youtube.com/channel/UCxikHwpro-DB02ix-NovvtQ In this lecture we have taught about what how to solve multiplicative cipher method. Follow Smit Kadvani on :- Facebook :- https://www.facebook.com/smit.kadvani Instagram :- https://www.instagram.com/the_smit0507 FollowContinue Reading

In this video, I explain the fundamentals concept of cryptography like types of crypt analysis, symmetric & asymmetric key algorithms, encryption & decryption process, overview of cryptography fundamentals, basic terminology used in cryptography, brute force attack, social engineering attack, implementation attack etc.. -~-~~-~~~-~~-~- Dear Friends please watch my video lectureContinue Reading

Lesson 2 of cryptography series (to see all video check cryptography playlist – link given below). cryptography playlist : https://www.youtube.com/watch?v=_Yw7QWbk9Vs&list=PLf8bMP4RWebLVGpUnhji9Olkj1jdXfzFd Subscribe to our new youtube channel also : https://www.youtube.com/channel/UCNx1Gkyy9LfOxDMbcOKuV4g symmetric vs asymmetric ( public key ) cryptography symmetric key vs assymetric key encryption advantages of symmetric key cryptography advantages ofContinue Reading

Lesson 1 of cryptography series – Introduction to cryptography Subscribe to our new youtube channel also : https://www.youtube.com/channel/UCNx1Gkyy9LfOxDMbcOKuV4g Full cryptography playlist : https://www.youtube.com/watch?v=_Yw7QWbk9Vs&list=PLf8bMP4RWebLVGpUnhji9Olkj1jdXfzFd&index=1 cryptography ( encryption ) and its types – the backbone of security of networks and computers. this video includes : what is cryptography , types of cryptographyContinue Reading