Can you please let me know the text book you are using.
@AbhishekSharmaDit5 жыл бұрын
Cryptography and network security by behrouz A Forouzan
@chinnariprasad51775 жыл бұрын
@@AbhishekSharmaDit thanks a lot
@shashikanthd47673 жыл бұрын
@@AbhishekSharmaDit thanks again
@phantom2k8583 жыл бұрын
yeah it was good
@technologiesmotivationd7754 Жыл бұрын
you are from pakistan
@Gaurav-pm5hs4 жыл бұрын
That why I love indian boy explaining things on pen paper
@nabeelakbar82552 жыл бұрын
Integrity= hash function authentication= digital signature confidentiality= encryption
@soumyadeepbarik57118 ай бұрын
Waah kya baat hai
@tejas_machchhar7 ай бұрын
Authentication=Mac 🤔
@creeper47357 ай бұрын
waise availibility hota hai a ke lie
@rxzin720123 күн бұрын
@@tejas_machchhar yes signature and mac both provide authentication, but digital signature provides non repudiation and mac do not
@ajayshankhwar7303 жыл бұрын
This is the best channel for semster preperation .The content is really structural and exact.
@RAHULYADAV-dd3yy2 жыл бұрын
Bhai fan ho gaya main tumhara.. Bas tumhare hi lecture se padha hai maine... Love u bro..
@ShivamTiwari-mo3dj4 жыл бұрын
a very good work and thank you for clearing our concepts . loved your video, it is very useful as semester exam point of view.
@govindkumar-f3x2b11 ай бұрын
thanku bhaya this big and soo... big help for me in my exam shree ram ji aap ko bhala karay bhaya🕣🙏🙏🙏🙏🙏👇👇👇👇👇👇👇👇👇👇👇👇🙏🙏🙏🙏🙏🙏🙏🙏🙏🙏🙏🙏🙏🙏🙏🙏🙏🙏🙏👇👇👇👇👇👇👇👇👇🙏🙏🙏🙏🙏🙏🙏🙏🙏🙏🙏🙏🙏🙏🙏🙏🙏🙏🙏🙏🙏🙏🙏🙏🙏🙏🙏🙏🙏🙏🙏🙏🙏🙏🙏🙏🙏🙏🙏🙏🙏🙏🙏
@viraltoovideos Жыл бұрын
Bahut achha explain kiye hai bhaiya
@niharjyotibasisth2 жыл бұрын
Once again, here one night before the exam. Thank you...
@rutujapandule13602 жыл бұрын
Before teaching us our teacher learns from ur video then teach us ..... :)
@kavitasharma8483 Жыл бұрын
Sir ,I like the way you teaching
@angelahir80373 жыл бұрын
Very important information you will get
@angelahir80373 жыл бұрын
Kya hum project me use kr sakte he apka knowledge?
@coming_out_978 ай бұрын
A good explanation 😊
@priyanshigupta6178 Жыл бұрын
Well explained 👍💯
@kandukurianjani78523 жыл бұрын
Very nice explanation.. thank u so much
@arjitprakher733 жыл бұрын
Thank you bhaiya , ye kafi accha explanation tha
@geetikagupta27452 жыл бұрын
If public key is used to decrypt then intruders can attack during transmission because public key can be known to others also..so what is the use of encryption here if you could answer?
@khai-vq5hn Жыл бұрын
ya he made blunder out there
@shaheryarahmed51516 ай бұрын
I think the encryption he is talking about is not about the message,its about the signature. Only sender (let's say A) can create his signature so private key makes sense,anyone can verify that signature belongs to A so public key of A can be used
@avishekkumar8292 ай бұрын
Public key is used for encription while private key is used for decription.
@BharatSports36529 күн бұрын
You are thinking in right direction as per cryptography but here we are checking the authenticity of the msg that A has sent the msg or not. So for data security purpose we use double encryption first msg encrypted with B's public key then encrypted with A's private key. And now at receiver end B first decrypt with A' public key ( these authentic that it's coming from A) then he decrypt the msg with its(B) private key.
@namrataghatol157022 күн бұрын
It is not used for confidentiality …used for non repudiation only
@_NaeemTamboli Жыл бұрын
Amazing explanation
@Mmk-gi4ug14 күн бұрын
At 5:58 only the hash must be encrypted using the private key of A and not the message.
@syedasyed26882 жыл бұрын
Realy like ur way of Teaching thumbs up👍❣️
@shreyabhosale99624 жыл бұрын
Very nice explanation
@umer6946 Жыл бұрын
*Great*
@NottyPriyal Жыл бұрын
To everyone who is asking about hw we can decrypt the data using the public key. To validate the data's integrity, the recipient first uses the signer's public key to decrypt the digital signature. The recipient then uses the same hashing algorithm that generated the original hash to generate a new one-way hash of the same data.
@shweta_sharma1723 жыл бұрын
superb 👍👍
@khusbusahu58813 жыл бұрын
Your videos are very helpful to us....thank you... 😊
@sahil736262 жыл бұрын
Well understood .thanku bro!
@jayanthts51982 жыл бұрын
bhai jaan bacha liya yaar tmro is my end sem exam and this video stopped my cry
@joydeepbhattacharjee53053 жыл бұрын
well i'm a bit confused ..as per my knowledge we encrypt data using public key and decrypt data with private key...then why the reverse is being done here?? please explain
@joydeepbhattacharjee53053 жыл бұрын
@@girisharora945 okk thanks
@gautamgoyal1082 жыл бұрын
Brother it's for authentication Authentication is received if A decrypts with his own private key if a done with b public key then it's not authentic that A send mssg because B public key is all over on Internet
@kangna554 жыл бұрын
Can you explain the hash thing it with an example? Explain it with some msg written in email
@syedasyed26882 жыл бұрын
kindly sir upload the lecture on Arbitrated Digital Signature ...
@kishangautam13213 жыл бұрын
U r to good bhai ....❤️
@devchiragbhaithoriya917219 сағат бұрын
Which book you use in video
@TeachCraft42 ай бұрын
thank you so much
@vipinchaudhary77133 жыл бұрын
Nice,explanation bro..👍👍
@sumasri6062 жыл бұрын
Good explanation liked it can u plz explain about elliptical curve digital signature algorithm......
@saikun02934 жыл бұрын
Even the message also changes right if some hacker attacks.....why will it be the same? @7:53
@preyumkumar74043 жыл бұрын
great help thanks great video
@ddr_hritik58232 жыл бұрын
Can you share your notes of all encryption series???
@irfanshaik13023 жыл бұрын
bhai....🙏🏻🙏🏻...bachaliya tumne 😪😭
@CareerWithTech3 жыл бұрын
encryption is done through public key decryption is done through private key
@CareerWithTech3 жыл бұрын
pls check your video again
@pragatisahu43552 жыл бұрын
Aapne HMAC ki video nhi dali hai kya
@flutter_graphic352 жыл бұрын
JAZAK ALLAH sir
@garima21282 жыл бұрын
Can u plz make the vdo of kerberos encryption using non-cryptographic tools
@samandeepkaur6912 жыл бұрын
Please make video on hyperelliptic curve cryptography
@manasbanjare3198 Жыл бұрын
kass app digital certificate ka bhi bana dete itna aacha sabhji video banate ho aap
@hamzaalvi35993 жыл бұрын
Why we are using private key of A for encryption ???
@nidhijaswani29308 ай бұрын
It must be public key of B? Correct me if I am wrong
@statsgurru5758 Жыл бұрын
Bhaiya apne jo general copect ka diagram banaya usme aapne Singing algo toh use he nahi kiya toh vo digital signature ka general concept kese hua?
@Mohit_mk_2 жыл бұрын
Superb ♥️
@dhaneshpt8641 Жыл бұрын
Thank you..
@rajendertanwar188124 күн бұрын
Justice for person B 🙏 ❤️
@Yoyo-ck9pm3 жыл бұрын
Sir if we want confidentiality too which algorithm should be used!???Should DESor AES be used??
@techhackz2897 Жыл бұрын
11:57 your using private key of user-A. So, anyone with public key of user-A can decrypt the message and get the msg and hash So, how are we achieving confidentiality here. And in the last fig @ 12:50 we achieved confidentiality, non-repudiation and integrity.
@sarthakkumar867915 күн бұрын
ye notes ka pdf milega kya
@vigshakvlogs411615 сағат бұрын
Is this dsa method ?
@dheerajsahu4547 Жыл бұрын
Vha hash/message ki place pr cipher aayega after encryption
@gautamsingh9104 Жыл бұрын
Bhai digital signature ka koi mathematical base example nhi h ky?
@alapandas35382 жыл бұрын
Public key is in encryption and lrivate key in decryption
@sweta33458 ай бұрын
kya ap oo book author ka name bata sakte hoo ?
@vinod420786 Жыл бұрын
thank you sir
@shekhar27842 жыл бұрын
Can we get PDFs? Of your lecture notes
@prodiptamondal17583 жыл бұрын
Any user will have the public key of A, so how the confidentiality will be maintained for second case?
@nayanyadav50053 жыл бұрын
He missed.... let me help you (if this exact question u r asking) suppose, A as Sender B as Reciever, obviously, A has some plain text (PT) private key of A (PrKA) and public key of A(PuKA) private key of B (PrKB) and public key of B(PuKB) {Note---> PuKA ( PrKA =None OR we can say they can cancel one another}..............................................................................(NOTE) Now the game begins.... A--> PT --> PrKA (PT)--> PuKB (PrKA (PT)) Now (PuKB (PrKA (PT))) becomes a Free Electron and only B can get it. now,B has a Free electron, and his private key(PrKB) also. B -->PrKB ( PuKB (PrKA (PT))) B-->PrKA(PT)......... .............................................(from NOTE) Now B goes to google and asks for Public key of A B-->PuKA(PrKA(PT)) B--> (PT)......................................... (from NOTE) Hurrah!!!!!!! (Pls let me know the feedback, I will erase it otherwise)
@nikhilchoudhary47058 ай бұрын
msg aur hash dono ko kyu encrypt krenge, only hash ko encrypt krenge na using private key of A ?
@cst001anantharajd2 Жыл бұрын
Can you solve sums based on this
@chanchalgupta22594 жыл бұрын
Bhaiya ye hash function se only signature ko digitial signaure me convert krate h ky , Ya fir pura msg bhi convert hota h private key se,
@sumitrasar6204 Жыл бұрын
You force me to comment yar! Dam clear all doubt of mine .
@gulamsarwar6093 жыл бұрын
Bro, can u share your book's PDF file?
@Singham_here2 жыл бұрын
It's public key in Encryption
@centerwing2101 Жыл бұрын
No, Private key is used for encryption
@sahibdhawan98475 күн бұрын
Bhai public key se encryption hota hai and private se decryption
@mehaksaxena8664 жыл бұрын
I have a ques sir.. i studied somewhere that we should encrypt the msg with the help of public key of receiver and receiver will decrypt it with his private key to maintain confidentiality but here you said the opposite. I know you said there is no use of confidentiality but still its a doubt. What key should we use to encrypt a msg and vice versa. HOPE YOU WILL REPLY.
@AbhishekSharmaDit4 жыл бұрын
In normal situations it is ok but in digital signature concept we will have to ise the private key of the sender so that hame pata chal sake ki ha yahi banda i.e. sender h jo hame msh bhejra h
@AbhishekSharmaDit4 жыл бұрын
To encrypt the msg we will use hash function concept along with digital signature Aage series follow karo sab clear hota jayega
@mitulzala69762 жыл бұрын
10:00
@utkarshdubey41304 жыл бұрын
Bhai mcqs hr topic pr btado.. Bca final year is mcqs based this time
@IamSkyLight3 жыл бұрын
in your earlier video of Hash/MAC Function, you didn't mention anything about Integrity. Could you confirm if in any scenario (that you discussed) we would be achieving integrity along with authentication and confidentially?
@NottyPriyal Жыл бұрын
There is the concept of message integrity basis where the message will have the digest if the digest matches the public key of the receiver then the integrity of the message is achieved
@premcontact32303 жыл бұрын
If someone agree and give his concent through email but no signature on agreement is this considered as valid document?
@vlogplanet55362 жыл бұрын
Can you share the notes
@Punnu004 жыл бұрын
Synopsis kese bnai jati a
@divakar_alig87813 жыл бұрын
Sir can you send the notes of cryptography
@sumitbhatt37154 жыл бұрын
Sir app word expand algorithm of rsa ma ek video bna do plxx
@himachalivloggershipali62995 жыл бұрын
Kya apne tcp congestion control algo PE video bnaii haii btaa do
@AbhishekSharmaDit5 жыл бұрын
No nahi dali h
@himachalivloggershipali62995 жыл бұрын
@@AbhishekSharmaDit ohkkk 😔
@VinodThakur-i4i5 жыл бұрын
@@himachalivloggershipali6299 kisi or channel m dekh lo ..isko vse b smjhana nhi aata
@bestshorts_rk23422 жыл бұрын
WHAT IS Digital 33 Signature ?????
@geopluse6336 Жыл бұрын
kon sa book use karo rahai ho ??
@माधव..MADHAV24 күн бұрын
Fourozon dcna and security
@RishiKumar-tv4jk4 жыл бұрын
Agr beech me message alter hua hai to last step me message ko hash function me daalne pr jo hash aaya aur jo first step me message ko hash function me dalne pr hash aaya tha, vo same kse hoga jb message hi change hogya ??
@anshukumari1092 жыл бұрын
Digital signature bs itna hi h?...sir mjhe Google doc, e-mail, social media handle k classes mil skte h
@novyajyoti7920 Жыл бұрын
Encryption is a public key and decryption is private key
@centerwing2101 Жыл бұрын
No, Private key is used for encryption and public key for decryption
@lovesingh51054 жыл бұрын
Thank you
@nagamaruthitubati03053 жыл бұрын
Sir can you please explain the video in English also ..
@digitalbb18934 жыл бұрын
A k public key kahase milega bhai....A ko pblic key v B ko bhejna parega kya?
@mr.pranjul_013 жыл бұрын
Nhi public key toh public hai wo sbko pata hoti hai
@poojasankpal9046 Жыл бұрын
Please short me thoda slow explain kare sir
@poojayadav98214 жыл бұрын
Digital copyrights and search engine pe apne video upload ki h kya sir? If yes then please provide me that link.
@vishalmodi54693 жыл бұрын
Please provide notes any video
@syedrakeen77592 жыл бұрын
Sur can u provide a note for this question for 15 marks!
@kandukurianjani78523 жыл бұрын
Please sir.. explain the video English to English all videos
@shivanisahu9494 жыл бұрын
Are you from Dehradun?
@AbhishekSharmaDit4 жыл бұрын
Yes
@tenabisht4 жыл бұрын
Areh sahuu tum bhi Yaha😂😂✋✋
@AbhishekSharmaDit4 жыл бұрын
@@tenabisht sab doon se hi ho kya? 😂
@tenabisht4 жыл бұрын
@@AbhishekSharmaDit Haan mtlb hum teeno Doon se hi hn😂
@shivanisahu9494 жыл бұрын
Abe yar😂😂
@meetkakadia34042 жыл бұрын
yahh
@GauravDuseja-t6q7 ай бұрын
But A public key know to everyone so theere is no confidentiality anyone can acess A message
@sumitbhatt37154 жыл бұрын
Bhai itna acha video bna ra ho full support ha aapko keep doing the good work . Jo like support ni kar ra chutiya ha
@siddhantsingh65784 жыл бұрын
How do IAS officers do digital signature?
@nischayrawat62163 жыл бұрын
bro concept clear krke btao or har part ko alag alag krke, or yaha waha ye wo shbd mat istmaal kiya kro, kuch clear ni hota,
@Funduniyatv4 ай бұрын
Smjhaty ap bht acha hyn but apki handwriting smjh nahi ati r kuch words miss ho jty hyn kindly esi handwritting kryn k smjh bhi to ay kia likha hy
@iamgood34063 жыл бұрын
It's would better that if u did this video in English... there will be people who doesn't know hindhi how can they know??????
@whois25172 жыл бұрын
Ycce gang wya
@arjunbunny54243 жыл бұрын
Sir thoda dhire baat kro.....itni jldi jldi kyo boltey ho🙄