Home
Videos uploaded by user “Sundeep Saradhi Kanthety”
NETWORK SECURITY - FEISTEL STRUCTURE
 
12:22
FEISTEL STRUCTURE Most of the block ciphers follows the Feistel Structure. Plain text is processed in terms of blocks Plain text is divided into two equal halves Plain text is processed in number of rounds Sub Keys are generated for each round.
MS-OFFICE - INTRODUCTION (in telugu) / ఎంస్ ఆఫీస్ ఇంట్రడక్షన్
 
11:38
MS-Office 1 MS-Word 2 MS-Excel 3.MS -Power point 4 MS - Access 5 FrontPage 6 Outlook Express
NETWORK SECURITY - TRANSPOSITION TECHNIQUES
 
12:47
Transposition technique is to rearrange the plain text bits/character to get the cipher text. 1) Rail Fence Cipher 2) Row Transposition Cipher
C PROGRAMMING - LINEAR SEARCH
 
10:15
Searching is the procedure to find the search element in the array of elements. Searching can be performed using two methods 1) Linear Search 2) Binary Search In Linear Search the search element will be compared with all the elements in an array from index 0 to n-1.
NETWORK SECURITY - TYPES OF ATTACKS
 
18:03
Two Categories of attacks 1) Passive Attacks a) Release of the content b) Traffic Analysis 2) Active Attacks a) Masquerade b) Replay c) Modification of Message d) Denial of Service
NETWORK SECURITY - HMAC ALGORITHM
 
20:58
www.youtube.com/c/sundeepsaradhi
NETWORK SECURITY - RSA ALGORITHM
 
23:04
RSA Algorithm is the example for Public Key Encryption algorithm. Here we are supposed to find two keys 1) Public Key which is used at encryption 2) Private Key which is used at decryption step 1: Select two large Primes P , Q Step 2: Calculate n=P*Q & O(n) = (P-1)*(Q-1) Step 3: Assume e and d (Public and Private Key). Step 4: Encrypt the Plain Text using Public Key e. Step 5: Decrypt the Cipher Text using Private Key d.
C PROGRAMMING - INSERTION OF AN ELEMENT INTO AN ARRAY AT SPECIFIC POSITION
 
15:50
Major Operations that can be performed on arrays are 1. Insertion 2. Deletion 3. Sorting 4. Searching This video explains the process of inserting an element into an array at specified position. User have to specify the position where the element to be inserted and the element which to be inserted. Here POSITION given by user is the INDEX value.
NETWORK SECURITY - PGP (E-MAIL SECURITY)
 
23:36
PGP - PRETTY GOOD PRIVACY THIS IS ONE OF THE EMAIL SECURITY MECHANISM PGP SERVICES 1. AUTHENTICATION WITH DIGITAL SIGNATURE 2. CONFIDENTIALITY 3. EMAIL COMPATABILITY 4. ZIP OR COMPRESSION FUNCTION.
NETWORK SECURITY - BLOCK CIPHER MODES OF OPERATION
 
26:15
1. Electronic Code Book Mode 2. Cipher Block Chaining Mode 3. Output Feedback Mode 4. Cipher Feedback Mode 5. Counter Mode
C POGRAMMING - POINTERS TO STRUCTURES
 
13:17
Define a structure Declare structure variable Declare Pointer variable Initialize pointer variable with address of structure variable Access the members of structure using pointer variable. Here arrow operator is used to access members of structure using pointer.
NETWORK SECURITY - SECURITY SERVICES
 
15:45
Security Services 1) Access Control 2) Authentication 3) Confidentiality 4) Integrity 5) Non-Repudiation
C PROGRAMMING - FUNCTIONS
 
37:03
Functions are the subprograms of any complex problem which are developed independently and finally the solutions of all the subprograms will be integrated for final solution for the given problem. Functions are of two types: 1) Predefined Functions 2) User Defined Functions Also known as Modular Programming Three points to be followed while implementing any userdefined functions 1) Function Declaration. 2) Function Call. 3) Function Definition.
C PROGRAMMING - RECURSION WITH EXAMPLE
 
10:40
Recursion is defined as calling the same function itself repeatedly. For every recursion function there must be an exit condition. In the absence of the exit condition the program will go into infinite loop.
C PROGRAMMING - NESTED IF
 
11:57
Placing if inside the if else is called nested if else.
COMPUTER GRAPHICS - SUTHERLAND HODGEMAN POLYGON CLIPPING ALGORITHM
 
33:37
This is algorithm is used to clip the polygon which lies inside the window boundary.
C PROGRAMMING - DECISION CONTROL STATEMENTS
 
28:55
Simple if if - else else-if ladder switch (Multi-Selection)
C PROGRAMMING - GOTO STATEMENT
 
13:00
GOTO STATEMENT ALSO CALLED UNCONDITIONAL JUMP. Forward Jump - Skips some set of statements Backward Jump - Executes repeatedly some of set of statements forms the loop
C PROGRAMMING - NESTED STRUCTURES
 
12:21
Declaring structure variable as member of another structure is known as Nested Structure.
NETWORK SECURITY - IP SECURITY PART 1 (AUTHENTICATION HEADER)
 
31:22
IP SECURITY SERVICES 1. AUTHENTICATION WITH INTEGRITY 2.CONFIDENTIALITY IP SECURITY ARCHITECTURE 1. AUTHENTICATION HEADER PROTOCOL 2.ENCAPSULATING SECURITY PAYLOAD PROTOCOL 3.KEY MANAGEMENT
C PROGRAMMING - INCREMENT & DECREMENT OPERATORS
 
16:42
Increment and Decrement Operators are represented by ++ & -- Pre Increment ++a Post Increment a++ Pre Decrement --a Post Decrement a--
NETWORK SECURITY - SECURE ELECTRONIC TRANSACTION(SET) - PART 1
 
22:53
SET - Secure Electronic Transaction How the data is protected in the electronic transaction. SET SERVICES 1.CONFIDENTIALITY 2.INTEGRITY 3.CARD HOLDER AUTHENTICATION 4.MERCHANT AUTHENTICATION SET PARTICIPANTS 1.CARD HOLDER 2.MERCHANT 3.ISSUER 4.AQUIRER 5.CERTIFICATE AUTHORITY 6.PAYMENT GATEWAY SET TRANSACTIONS 1.PURCHASE REQUEST 2.PAYMENT AUTHORIZATION 3.PAYMENT CAPTURE.
C PROGRAMMING - TRANSPOSE OF GIVEN MATRIX
 
09:04
C PROGRAM TO FIND THE TRANSPOSE FOR GIVEN MATRIX
C PROGRAMMING - TWO DIMENSIONAL ARRAYS
 
21:23
Two Dimensional arrays are used to represent the data in a tabular form. Example : 1) Storing the marks of all the students in a class 2) Matrix operations
C PROGRAMMING - FIBONACCI SERIES
 
10:07
Program to find the Fibonacci Series. Initial elements are 0 & 1 we have to find next elements with given formula element n = element (n-1) + element (n-2)
C PROGRAMMING - SUM OF INDIVIDUAL DIGITS OF A NUMBER
 
08:13
Sum of individual digits of a given number 1) Find the individual digits of a number 2) Add all the individual digits
NETWORK SECURITY - DIFFIE HELLMAN KEY EXCHANGE ALGORITHM
 
34:11
This Algorithm is used to exchange the secret /symmetric key between sender and receiver. This exchange of key can be done with the help of public key and private key step 1 Assume prime number p step 2 Select a such that a is primitive root of p and a less than p step 3 Assume XA private key of user A step 4 Calculate YA public key of user A with the help of formula step 5 Assume XB private key of user B step 6 Calculate YB public key of user B with the help of formula step 7 Generate K secret Key using YB and XA with the help of formula at Sender side. step 8 Generate K secret Key using YA and XB with the help of formula at Receiver side.
C PROGRAMMING - OVERVIEW OF OPERATORS
 
05:17
This video is having a brief overview of all operators in c language.
C PROGRAMMING - BUBBLE SORT
 
24:47
Compare first element with second element if first element is greater than second element those elements will be interchanged. We have to repeat the procedure until reaches the last element. If there are n elements all the elements will be arranged in sorted order in n-1 passes.
C PROGRAMMING - DIFFERENCE BETWEEN STRUCTURE & UNION
 
14:08
Difference between union and structure is in memory allocated to the variable. For structure variable the memory allocated is the sum of sizes of all the members of a structure. For Union variable the memory allocated is the highest size of the member of a union.
C PROGRAMMING - INTRODUCTION TO POINTERS & POINTER ARITHMETIC
 
27:28
Pointer Variable is used to store the address of another variable. * - Indirection Operator / De-referencing Operator / Value Operator & - Address Operator
NETWORK SECURITY - SUBSTITUTION TECHNIQUES
 
30:19
Substitution Techniques Here the Plain Text Letters are replaced with Cipher Text Characters 1) Caesar Cipher 2) Play Fair Cipher
C PROGRAMMING - INTRODUCTION TO FILES
 
24:55
File Operations 1) Create a file 2) Open a file 3) Input / Output 4) Access the content of file 5) Closing the file
C PROGRAMMING - BINARY SEARCH
 
31:10
Before applying binary search all the elements of an array should be in sorted order. Here the search space will be reduced so implementation will be fast when compared to linear search
C PROGRAMMING - POINTERS PASSING AS ARGUMENTS TO FUNCTIONS
 
10:49
Pointers passing as a parameters to functions In calling function, actual parameters will be the address of variables In called function the formal parameters will be the value at address of variables.
C PROGRAMMING - STRUCTURES & FUNCTIONS
 
17:17
Passing structures as parameters to functions There are 3 categories 1) Passing Individual members of a structure as parameters to functions 2) Passing Structure variable as parameters to functions 3) Passing address of a structure variable as a parameter to functions.
NETWORK SECURITY - DIGITAL SIGNATURE ALGORITHM (DSA)
 
33:00
Digital Signature : If the Sender Private key is used at encryption then it is called digital signature. This digital Signature is implemented two approaches 1) RSA Approach 2) DSS Approach.