Home

12:22
FEISTEL STRUCTURE Most of the block ciphers follows the Feistel Structure. Plain text is processed in terms of blocks Plain text is divided into two equal halves Plain text is processed in number of rounds Sub Keys are generated for each round.

11:38
MS-Office 1 MS-Word 2 MS-Excel 3.MS -Power point 4 MS - Access 5 FrontPage 6 Outlook Express

12:47
Transposition technique is to rearrange the plain text bits/character to get the cipher text. 1) Rail Fence Cipher 2) Row Transposition Cipher

08:33

10:15
Searching is the procedure to find the search element in the array of elements. Searching can be performed using two methods 1) Linear Search 2) Binary Search In Linear Search the search element will be compared with all the elements in an array from index 0 to n-1.

23:04
RSA Algorithm is the example for Public Key Encryption algorithm. Here we are supposed to find two keys 1) Public Key which is used at encryption 2) Private Key which is used at decryption step 1: Select two large Primes P , Q Step 2: Calculate n=P*Q & O(n) = (P-1)*(Q-1) Step 3: Assume e and d (Public and Private Key). Step 4: Encrypt the Plain Text using Public Key e. Step 5: Decrypt the Cipher Text using Private Key d.

20:58

10:40
Recursion is defined as calling the same function itself repeatedly. For every recursion function there must be an exit condition. In the absence of the exit condition the program will go into infinite loop.

23:34

26:15
1. Electronic Code Book Mode 2. Cipher Block Chaining Mode 3. Output Feedback Mode 4. Cipher Feedback Mode 5. Counter Mode

23:36
PGP - PRETTY GOOD PRIVACY THIS IS ONE OF THE EMAIL SECURITY MECHANISM PGP SERVICES 1. AUTHENTICATION WITH DIGITAL SIGNATURE 2. CONFIDENTIALITY 3. EMAIL COMPATABILITY 4. ZIP OR COMPRESSION FUNCTION.

13:17
Define a structure Declare structure variable Declare Pointer variable Initialize pointer variable with address of structure variable Access the members of structure using pointer variable. Here arrow operator is used to access members of structure using pointer.

12:02

18:03
Two Categories of attacks 1) Passive Attacks a) Release of the content b) Traffic Analysis 2) Active Attacks a) Masquerade b) Replay c) Modification of Message d) Denial of Service

15:45
Security Services 1) Access Control 2) Authentication 3) Confidentiality 4) Integrity 5) Non-Repudiation

09:04
C PROGRAM TO FIND THE TRANSPOSE FOR GIVEN MATRIX

33:37
This is algorithm is used to clip the polygon which lies inside the window boundary.

23:40

12:21
Declaring structure variable as member of another structure is known as Nested Structure.

24:52

34:11
This Algorithm is used to exchange the secret /symmetric key between sender and receiver. This exchange of key can be done with the help of public key and private key step 1 Assume prime number p step 2 Select a such that a is primitive root of p and a less than p step 3 Assume XA private key of user A step 4 Calculate YA public key of user A with the help of formula step 5 Assume XB private key of user B step 6 Calculate YB public key of user B with the help of formula step 7 Generate K secret Key using YB and XA with the help of formula at Sender side. step 8 Generate K secret Key using YA and XB with the help of formula at Receiver side.

11:57
Placing if inside the if else is called nested if else.

14:08
Difference between union and structure is in memory allocated to the variable. For structure variable the memory allocated is the sum of sizes of all the members of a structure. For Union variable the memory allocated is the highest size of the member of a union.

22:53
SET - Secure Electronic Transaction How the data is protected in the electronic transaction. SET SERVICES 1.CONFIDENTIALITY 2.INTEGRITY 3.CARD HOLDER AUTHENTICATION 4.MERCHANT AUTHENTICATION SET PARTICIPANTS 1.CARD HOLDER 2.MERCHANT 3.ISSUER 4.AQUIRER 5.CERTIFICATE AUTHORITY 6.PAYMENT GATEWAY SET TRANSACTIONS 1.PURCHASE REQUEST 2.PAYMENT AUTHORIZATION 3.PAYMENT CAPTURE.

13:00
GOTO STATEMENT ALSO CALLED UNCONDITIONAL JUMP. Forward Jump - Skips some set of statements Backward Jump - Executes repeatedly some of set of statements forms the loop

25:01

27:28
Pointer Variable is used to store the address of another variable. * - Indirection Operator / De-referencing Operator / Value Operator & - Address Operator

21:23
Two Dimensional arrays are used to represent the data in a tabular form. Example : 1) Storing the marks of all the students in a class 2) Matrix operations

08:13
Sum of individual digits of a given number 1) Find the individual digits of a number 2) Add all the individual digits

31:22
IP SECURITY SERVICES 1. AUTHENTICATION WITH INTEGRITY 2.CONFIDENTIALITY IP SECURITY ARCHITECTURE 1. AUTHENTICATION HEADER PROTOCOL 2.ENCAPSULATING SECURITY PAYLOAD PROTOCOL 3.KEY MANAGEMENT

28:32

10:07
Program to find the Fibonacci Series. Initial elements are 0 & 1 we have to find next elements with given formula element n = element (n-1) + element (n-2)

10:49
Pointers passing as a parameters to functions In calling function, actual parameters will be the address of variables In called function the formal parameters will be the value at address of variables.

40:57
Three types of Authentications 1. Message Encryption 2. Message Authentication Code 3. Hash Functions.

37:03
Functions are the subprograms of any complex problem which are developed independently and finally the solutions of all the subprograms will be integrated for final solution for the given problem. Functions are of two types: 1) Predefined Functions 2) User Defined Functions Also known as Modular Programming Three points to be followed while implementing any userdefined functions 1) Function Declaration. 2) Function Call. 3) Function Definition.

20:28

30:01

15:50
Major Operations that can be performed on arrays are 1. Insertion 2. Deletion 3. Sorting 4. Searching This video explains the process of inserting an element into an array at specified position. User have to specify the position where the element to be inserted and the element which to be inserted. Here POSITION given by user is the INDEX value.

24:55
File Operations 1) Create a file 2) Open a file 3) Input / Output 4) Access the content of file 5) Closing the file

24:47
Compare first element with second element if first element is greater than second element those elements will be interchanged. We have to repeat the procedure until reaches the last element. If there are n elements all the elements will be arranged in sorted order in n-1 passes.

33:00
Digital Signature : If the Sender Private key is used at encryption then it is called digital signature. This digital Signature is implemented two approaches 1) RSA Approach 2) DSS Approach.

30:19
Substitution Techniques Here the Plain Text Letters are replaced with Cipher Text Characters 1) Caesar Cipher 2) Play Fair Cipher

49:01
AES algorithm is the Block Cipher Symmetric Algorithm Block Size is 128 bits Key Size is 128 bits ( 4 words or 16 Bytes ) Sub Key Size is 1 Word (32 bit) Number of Sub keys 44 Words Number of Rounds 10 Cipher Text Size is 128 bits

17:17
Passing structures as parameters to functions There are 3 categories 1) Passing Individual members of a structure as parameters to functions 2) Passing Structure variable as parameters to functions 3) Passing address of a structure variable as a parameter to functions.

16:42
Increment and Decrement Operators are represented by ++ & -- Pre Increment ++a Post Increment a++ Pre Decrement --a Post Decrement a--

25:51
There are two methods to pass the parameters as arguments to functions 1) Call by Value 2) Call by Reference In Call by Value both actual and formal parameters will have different memory locations and In Call by Reference both actual and formal parameters will share common memory location.

28:55
Simple if if - else else-if ladder switch (Multi-Selection)

05:17
This video is having a brief overview of all operators in c language.

30:35

20:31
SSL is implemented using SSL protocol stack 1.SSL Record Protocol 2.Handshake Protocol 3.Change Cipher Spec Protocol 4.Alert Protocol

winchester 67 dating
earth dating methods/limitations
man hacks dating website
online dating free websites
dating sms msg