best use of 3 minute 36 seconds ..... thanks a lot ..
@vladimir88957 ай бұрын
Your blockchain tutorial for beginners is one of the best things i've ever found on internet. I have 5+ years of web programming, and now I feel bored with all of this and want to change my field of work. I was looking for some simple and clear walkthrough but found only tons of bs and complete water, but God felt my pain and sent me this GEM of tutorials. 🙏🙏🙏
@rhajvijay6 жыл бұрын
Navin.. You're gifted with an ability to explain things clearly. One of the best Indian KZbin challenge for learning!!!👏👏👏
@techwithwhiteboard34835 жыл бұрын
channel and not challenge also he hasnt taught anything on blockchain. how to make one on our own lol
@placement36086 жыл бұрын
God is here guys ...thank u very much sir for making each and every concept to be clean and crystal clear....hats off for your hard work for making videos for us .....many many thanks sir
@dibyanshu29306 жыл бұрын
It would be unfair if I doesn't appreciate your skills to explain anything very neatly. Along with your video I also watch other channels also no one can beat you. You r d best.
@mycreations34526 жыл бұрын
I heard in my class in last few days back ,I couldn't understood that..now it's clear .tq sir
@Tuba.k0072 жыл бұрын
crystal clear...after watching so many videos on youtube .. this was just crisp and perfect
@exFeeds3367 ай бұрын
Amazing. i was confused how digital signature and confidentiality works together . Now i know the order too. Thanks
@NAVEENKUMARS12 Жыл бұрын
What a simple way of explaining a twisted concept. More power to you Navin!
@AbhishekSharmaDit5 жыл бұрын
Sir at the end of the video 3:20min if we will use public key of A in then, any third person can also access it! Then confidentiality kaise hua maintain?
@kisme015 жыл бұрын
but only B can decrypt it in the first place? so nobody else can actually intercept and attempt to decrypt it with A's public key
@AjayJain-ef2mz4 жыл бұрын
@@kisme01 so 'B' will decrypt it using A's public key. But how does B get A's public key in the first place. Does A share it?
@shreyasingh12584 жыл бұрын
woahh thats pretty cool!iam in my second year engg and i regret not watching these videos earlier
@sindhubasavanna19276 жыл бұрын
master in explaining things in a simple way :)
@manojvitharana65126 ай бұрын
What an amazing teacher🥰
@amitcshah4 жыл бұрын
What I like is, the "time constraint" of your explaination.. mostly I try to find "to the point" kind of videos.. otherwise we need to keep watching 20 mins video to understand a simple logic with which the real content starts at the end.
@vishugondaliya76443 жыл бұрын
what a great explanation I think you are really gifted with this , explanation of every hard topic so simply .
@naschwindias38733 жыл бұрын
best explanation ever
@abhilashkokkonda17136 жыл бұрын
wow Navin...New graphics looks awesome..and as always great video
@sonaliumare3445 жыл бұрын
too good explanation, need more videos how to use blockchain
@shouvikpradhan10946 жыл бұрын
Sir truely speaking you are great , thanks sir ,thanks .If possible I also wants some hands on practical experience by solving some small problem using Blockchain technology
@mohamadrezapirayesh38112 жыл бұрын
finally somebody who can explain this shit in just 3 minutes thanks man
@parthivsolanki21 Жыл бұрын
Your explanation is just wow 😘 Mind blowing sir 🙂 I got it.
@dr.patgiri6623 жыл бұрын
Short and precise to understand. Excellent.
@rakshar91296 жыл бұрын
Sir you have always been a great inspiration .Best teacher ever . Thank you so much.
@hendrixbrysen94333 жыл бұрын
instablaster.
@vinayvipul2 жыл бұрын
Very great quality videos, explained beautifully and with excellent graphics.
@mangeshpawar22555 жыл бұрын
Really worth to learn your tutorial , nice way you tought. Thanks buddy I appreciate your kind efforts. Keep doing ....
@ManivannanGD6 жыл бұрын
#Telusko clean explanation about #DigitalSignature. But I have a question, how the #key's are shared between two persons in virtually. How that works?
@himanshugta17242 жыл бұрын
Thanks for the simple explanation!
@stocksandblocks96615 жыл бұрын
I always follow your videos, they are stunning
@hamidliaqat7283 Жыл бұрын
awesome ,regards from pak 😍😍
@MyLamph3 жыл бұрын
this is very precise. Thanks for this Navin
@sureshkannan6313 Жыл бұрын
Excellent teaching.....🤩
@bowbowzai37573 жыл бұрын
You explained it clearly!
@manoj44803 жыл бұрын
Thank you. Great video. Just the last sentence. C can not decrypt it as it is encrypted with A's private key (You mentioned B's public key) Correct me if I am wrong.
@MrAjay514 жыл бұрын
thanks very much for doing this in English
@ravindrabangalore29904 жыл бұрын
Yes agree your point to have asymmetric keys ,but here how we can communicate with more than 1 node or system, here also we need to maintain all public keys and private keys ...what's different???
@MajorVenkataKrishnaMadem2 жыл бұрын
outstanding explanation
@indianitguru2 жыл бұрын
Hello Navin, Great videos and thank you so much for these. I am however not sure if you have explained digital signatures correctly. I think during the digital signatures what we normally do is use the hashing technique along with the encryption.
@yashchauhan57106 жыл бұрын
point to point explanation gg
@bolludiwakarreddy84876 жыл бұрын
Sir what are you going to teach? Blockchain web development or core development?
@rengarajansrinivasan43562 жыл бұрын
The best guider!!
@amitkadivar94456 жыл бұрын
this video helpful in to study.Thanks sir
@udhayasankar1136 жыл бұрын
Excellent explanation..
@Skaxarrat6 жыл бұрын
Very clear and concise explanation. We will see any coded blockchain project?
@1112sravani6 жыл бұрын
How does B know that it has to decrypt with A's public key?.....Will it try all public keys?
@arjunvihaan67456 жыл бұрын
it is automatic...i was lucky to be directed to brainwonder77@gmail.com...i cant imagine that my wallet is back and spendable..contact him..goodluck
@meghhanigam83754 жыл бұрын
Best teacher
@unemployedcse35144 жыл бұрын
Awesome bro 💞💞
@ramkumarreddy42954 жыл бұрын
Great stuff sir thank u🔥
@chethanr.a.46105 жыл бұрын
Navin, what will happen, if A private key is compromised. Is there any option in block chain technology in which keys are regenerated and newly generated public is shared again?
@saikrishnareddy34856 жыл бұрын
Ssssir vvvery clear ......😍
@aditi220123 жыл бұрын
Won't the public and private key be the same? Unless the message can be decrypted by two kinds of keys?
@reenus1342 жыл бұрын
Very good presentation
@sudhakarverma84526 жыл бұрын
Very amazing video sir
@sounakbhowmik28413 жыл бұрын
Hey! I was using rsa library in python. When I encrypt a message using a private key, I can not decrypt using the public key. What do you suggest?
@muhammadmughees75513 жыл бұрын
very nice explanation
@chandrareddy24276 жыл бұрын
Black chain technology books best tell me
@OmNamahShivayOmm6 жыл бұрын
awesome explanation!
@sagarworriors14023 жыл бұрын
classic clarification. thanks
@anuragbose4944 жыл бұрын
Sir, i couldn't understand the digital signature part. Is it possible to explain how it really happened.
@sarikigovind47036 жыл бұрын
How can B encrypt A's message.. I need proper explanation..
@sarikigovind47036 жыл бұрын
@Rajesh Bhattarai thank u....
@ernestmbila504714 күн бұрын
you can only encrypt a message you want to send. eg B can encrypt a message it wants to send to A with A's public key and A will decrypt it with it private key. the bigger question is where will B store its private key so nobody can see it?
@ernestmbila504714 күн бұрын
Where can A, B or C store it private key so nobody can see it since the private key is the major security
@rakeshsanthapuri99335 жыл бұрын
Awesome navin
@snehashischattopadhyay95194 жыл бұрын
I understood how the encryption and decryption would work. But how does one ensure that this is the private and public key of one item eg A. ?
@jeromes91862 жыл бұрын
You can be sure that a file is encrypted by A's private key by trying to decrypt it by A's public key.
@sourabhtiwri Жыл бұрын
For C we have cryptography A we have digital signature what about Integrity ?
@umeshnataraj59516 жыл бұрын
Great video
@divakarreddyperlavenkata96005 жыл бұрын
You are super awesome👌👌
@nirusanhariharan83823 жыл бұрын
I got a doubt sir. What if the third party knew the algorithm which node a and b were using and third party use the both public keys to access it. The private key and the public key can be known by others ( B knew the private key of A). So how to sort out this, sir ?
@compass25302 жыл бұрын
B doesnt have the Private key of A, No one can have the Other person Private key in the network ! So only B can decrypt the message, since only B has the Private key of its own to decrypt the message
@anantmohan31586 жыл бұрын
Great Sir..!
@atharva2004 Жыл бұрын
solving problem of authentication: message is encrypted with private key, and then this encrypted message is again encrypted by receivers public key. so receiver first decrypts using his private key, and then using sender's public key. so now receiver knows who the sender is. this is digital signature.
@lishannavishka17834 жыл бұрын
Navin sir, Can you take a scenario there are 5 members, they are doing transaction between each of other I want to know when they are doing their transaction how make Genesis block and other blocks how make digital signature for each block? What Wii happen some persons access one block and changed it hash and how it affects to next block, and you told anyone can not hack all nodes in block chain but some time one node can be hacked when one node hack what happened security of another blocks these are the questions which I have if you can make a practical scenario for block chain that will be help Thank you.
@harishkallianpur93685 жыл бұрын
Just excellent..
@devkishanjoshi38975 жыл бұрын
Sir can u please make tutorials on competitive programming ...?
@venky49933 жыл бұрын
The name of this channel is telusko Telugu word
@khetaramsansi1195 жыл бұрын
Sir, I have USB device that containing digital signature of authorized person, Now I need to add this signature into PDF, I am working in PHP, can you please suggest me how can I achieve it, I am totally confused and don;t have any idea to implement it. I have used the hwcrypto.js and able to generate the certificate, but how do I process it in background and add signature into PDF using PHP. It will be great help from you sir and I am looking forward your positive response for same.
@vedantkamat85702 жыл бұрын
Is this concept the same with crypto currency wallets?
@apricotcomputers39432 жыл бұрын
my question is... how can this be possible for router ip tables??
@top10swithkesi6 жыл бұрын
can we encrypt one text multiple times..??
@yt.user-zull6 жыл бұрын
Yes, a message can be encrypted any number of times but you will have to keep every encryption key while decrypting it. Just one time encryption is enough but sometimes for some security reasons two levels of encryption is required (e.g. as explained in this video). Encrypting a message above two levels is not required and its cumbersome.
@top10swithkesi6 жыл бұрын
@@yt.user-zull Thanks you brother.😍
@yt.user-zull6 жыл бұрын
Great..👌
@nokhaizlolzz3 жыл бұрын
Excellent thanks
@nktt93516 жыл бұрын
Great sir
@surajkarna60364 жыл бұрын
superb!
@YashPatniyp6 жыл бұрын
How you earn money ? What is your source of income ?
@Mahesh-gq7fm4 жыл бұрын
very awesome
@okechuchukwuchinwuko8430 Жыл бұрын
Nice 👍
@yahiagamal937 Жыл бұрын
the videos are just amazing but the sound at the begining is really annoying and loud😅
@rudreshmehta68706 жыл бұрын
As private key n u r encrypting B node is decrypting by aa public key Then are you telling that as private n as public key is same?🙄
@fazaljarral27924 жыл бұрын
Perfect.
@Softwareengineeringdev6 жыл бұрын
good ♥♥♥
@RobinJesba6 жыл бұрын
Can't wait.
@Soldier-yu2ml Жыл бұрын
Good video
@amanshaw84966 жыл бұрын
Here there is two encryption: 1. Encrypted with B public key and Decrypted with B private key in order to obtain confidentiality.. 2. Encrypted with A private key and Decrypted with A public key in order to obtain digital signature I am waiting for how we obtain these function, encrypting with B public key but decrypting with B private key.. How ..
@namangamer81426 жыл бұрын
Picture perfect..
@SS-qf3pl4 жыл бұрын
how can every one know A's privatte key?
@punitmore6 жыл бұрын
How to implement it practicaly
@sivacharan573 жыл бұрын
you haven's touched the concept of hashes, without describing hashes I believe the concept of digital signatures remains incomplete.
@ullast45 жыл бұрын
Where your office?
@NamanGuptachaloghar6 жыл бұрын
Can you pls explain little bit more?
@MrWandalen4 жыл бұрын
Public key only for encryption!
@mdjahidulislam92055 жыл бұрын
Grreat
@siddharthsingh18276 жыл бұрын
Sir please apne hindi channel.mein hindi mein samjhao sir please