Digital signature

  Рет қаралды 543,546

Abhishek Sharma

Abhishek Sharma

Күн бұрын

Пікірлер: 148
@chinnariprasad5177
@chinnariprasad5177 5 жыл бұрын
Can you please let me know the text book you are using.
@AbhishekSharmaDit
@AbhishekSharmaDit 5 жыл бұрын
Cryptography and network security by behrouz A Forouzan
@chinnariprasad5177
@chinnariprasad5177 5 жыл бұрын
@@AbhishekSharmaDit thanks a lot
@shashikanthd4767
@shashikanthd4767 4 жыл бұрын
@@AbhishekSharmaDit thanks again
@phantom2k858
@phantom2k858 3 жыл бұрын
yeah it was good
@technologiesmotivationd7754
@technologiesmotivationd7754 Жыл бұрын
you are from pakistan
@Gaurav-pm5hs
@Gaurav-pm5hs 4 жыл бұрын
That why I love indian boy explaining things on pen paper
@RAHULYADAV-dd3yy
@RAHULYADAV-dd3yy 3 жыл бұрын
Bhai fan ho gaya main tumhara.. Bas tumhare hi lecture se padha hai maine... Love u bro..
@nabeelakbar8255
@nabeelakbar8255 2 жыл бұрын
Integrity= hash function authentication= digital signature confidentiality= encryption
@soumyadeepbarik5711
@soumyadeepbarik5711 10 ай бұрын
Waah kya baat hai
@tejas_machchhar
@tejas_machchhar 8 ай бұрын
Authentication=Mac 🤔
@creeper4735
@creeper4735 8 ай бұрын
waise availibility hota hai a ke lie
@rxzin7201
@rxzin7201 Ай бұрын
@@tejas_machchhar yes signature and mac both provide authentication, but digital signature provides non repudiation and mac do not
@ajayshankhwar730
@ajayshankhwar730 4 жыл бұрын
This is the best channel for semster preperation .The content is really structural and exact.
@govindkumar-f3x2b
@govindkumar-f3x2b Жыл бұрын
thanku bhaya this big and soo... big help for me in my exam shree ram ji aap ko bhala karay bhaya🕣🙏🙏🙏🙏🙏👇👇👇👇👇👇👇👇👇👇👇👇🙏🙏🙏🙏🙏🙏🙏🙏🙏🙏🙏🙏🙏🙏🙏🙏🙏🙏🙏👇👇👇👇👇👇👇👇👇🙏🙏🙏🙏🙏🙏🙏🙏🙏🙏🙏🙏🙏🙏🙏🙏🙏🙏🙏🙏🙏🙏🙏🙏🙏🙏🙏🙏🙏🙏🙏🙏🙏🙏🙏🙏🙏🙏🙏🙏🙏🙏🙏
@viraltoovideos
@viraltoovideos Жыл бұрын
Bahut achha explain kiye hai bhaiya
@ShivamTiwari-mo3dj
@ShivamTiwari-mo3dj 4 жыл бұрын
a very good work and thank you for clearing our concepts . loved your video, it is very useful as semester exam point of view.
@NosheezaMehak
@NosheezaMehak 22 күн бұрын
Thnk u sir really helpfull .. ❤❤
@rutujapandule1360
@rutujapandule1360 2 жыл бұрын
Before teaching us our teacher learns from ur video then teach us ..... :)
@priyanshigupta6178
@priyanshigupta6178 Жыл бұрын
Well explained 👍💯
@niharjyotibasisth
@niharjyotibasisth 2 жыл бұрын
Once again, here one night before the exam. Thank you...
@angelahir8037
@angelahir8037 3 жыл бұрын
Very important information you will get
@angelahir8037
@angelahir8037 3 жыл бұрын
Kya hum project me use kr sakte he apka knowledge?
@coming_out_97
@coming_out_97 10 ай бұрын
A good explanation 😊
@umer6946
@umer6946 Жыл бұрын
*Great*
@_NaeemTamboli
@_NaeemTamboli Жыл бұрын
Amazing explanation
@geetikagupta2745
@geetikagupta2745 2 жыл бұрын
If public key is used to decrypt then intruders can attack during transmission because public key can be known to others also..so what is the use of encryption here if you could answer?
@khai-vq5hn
@khai-vq5hn Жыл бұрын
ya he made blunder out there
@shaheryarahmed5151
@shaheryarahmed5151 8 ай бұрын
I think the encryption he is talking about is not about the message,its about the signature. Only sender (let's say A) can create his signature so private key makes sense,anyone can verify that signature belongs to A so public key of A can be used
@avishekkumar829
@avishekkumar829 3 ай бұрын
Public key is used for encription while private key is used for decription.
@BharatSports365
@BharatSports365 2 ай бұрын
You are thinking in right direction as per cryptography but here we are checking the authenticity of the msg that A has sent the msg or not. So for data security purpose we use double encryption first msg encrypted with B's public key then encrypted with A's private key. And now at receiver end B first decrypt with A' public key ( these authentic that it's coming from A) then he decrypt the msg with its(B) private key.
@namrataghatol1570
@namrataghatol1570 Ай бұрын
It is not used for confidentiality …used for non repudiation only
@shweta_sharma172
@shweta_sharma172 3 жыл бұрын
superb 👍👍
@kavitasharma8483
@kavitasharma8483 Жыл бұрын
Sir ,I like the way you teaching
@shreyabhosale9962
@shreyabhosale9962 4 жыл бұрын
Very nice explanation
@arjitprakher73
@arjitprakher73 3 жыл бұрын
Thank you bhaiya , ye kafi accha explanation tha
@syedasyed2688
@syedasyed2688 3 жыл бұрын
Realy like ur way of Teaching thumbs up👍❣️
@devchiragbhaithoriya9172
@devchiragbhaithoriya9172 Ай бұрын
Which book you use in video
@paiwandazizi
@paiwandazizi 5 күн бұрын
How do I get the book you are using?
@TeachCraft4
@TeachCraft4 3 ай бұрын
thank you so much
@sarthakkumar8679
@sarthakkumar8679 Ай бұрын
ye notes ka pdf milega kya
@Mmk-gi4ug
@Mmk-gi4ug Ай бұрын
At 5:58 only the hash must be encrypted using the private key of A and not the message.
@kishangautam1321
@kishangautam1321 3 жыл бұрын
U r to good bhai ....❤️
@Mohit_mk_
@Mohit_mk_ 2 жыл бұрын
Superb ♥️
@ddr_hritik5823
@ddr_hritik5823 2 жыл бұрын
Can you share your notes of all encryption series???
@pragatisahu4355
@pragatisahu4355 2 жыл бұрын
Aapne HMAC ki video nhi dali hai kya
@preyumkumar7404
@preyumkumar7404 4 жыл бұрын
great help thanks great video
@kandukurianjani7852
@kandukurianjani7852 3 жыл бұрын
Very nice explanation.. thank u so much
@flutter_graphic35
@flutter_graphic35 2 жыл бұрын
JAZAK ALLAH sir
@dhaneshpt8641
@dhaneshpt8641 Жыл бұрын
Thank you..
@syedasyed2688
@syedasyed2688 3 жыл бұрын
kindly sir upload the lecture on Arbitrated Digital Signature ...
@jayanthts5198
@jayanthts5198 2 жыл бұрын
bhai jaan bacha liya yaar tmro is my end sem exam and this video stopped my cry
@sahil73626
@sahil73626 2 жыл бұрын
Well understood .thanku bro!
@vipinchaudhary7713
@vipinchaudhary7713 3 жыл бұрын
Nice,explanation bro..👍👍
@gautamsingh9104
@gautamsingh9104 Жыл бұрын
Bhai digital signature ka koi mathematical base example nhi h ky?
@kangna55
@kangna55 5 жыл бұрын
Can you explain the hash thing it with an example? Explain it with some msg written in email
@vigshakvlogs4116
@vigshakvlogs4116 Ай бұрын
Is this dsa method ?
@CareerWithTech
@CareerWithTech 3 жыл бұрын
encryption is done through public key decryption is done through private key
@CareerWithTech
@CareerWithTech 3 жыл бұрын
pls check your video again
@vinod420786
@vinod420786 2 жыл бұрын
thank you sir
@dheerajsahu4547
@dheerajsahu4547 Жыл бұрын
Vha hash/message ki place pr cipher aayega after encryption
@manasbanjare3198
@manasbanjare3198 2 жыл бұрын
kass app digital certificate ka bhi bana dete itna aacha sabhji video banate ho aap
@statsgurru5758
@statsgurru5758 Жыл бұрын
Bhaiya apne jo general copect ka diagram banaya usme aapne Singing algo toh use he nahi kiya toh vo digital signature ka general concept kese hua?
@sumasri606
@sumasri606 2 жыл бұрын
Good explanation liked it can u plz explain about elliptical curve digital signature algorithm......
@khusbusahu5881
@khusbusahu5881 3 жыл бұрын
Your videos are very helpful to us....thank you... 😊
@irfanshaik1302
@irfanshaik1302 3 жыл бұрын
bhai....🙏🏻🙏🏻...bachaliya tumne 😪😭
@saikun0293
@saikun0293 4 жыл бұрын
Even the message also changes right if some hacker attacks.....why will it be the same? @7:53
@hamzaalvi3599
@hamzaalvi3599 3 жыл бұрын
Why we are using private key of A for encryption ???
@nidhijaswani2930
@nidhijaswani2930 9 ай бұрын
It must be public key of B? Correct me if I am wrong
@samandeepkaur691
@samandeepkaur691 2 жыл бұрын
Please make video on hyperelliptic curve cryptography
@sweta3345
@sweta3345 9 ай бұрын
kya ap oo book author ka name bata sakte hoo ?
@jagrutiaher2510
@jagrutiaher2510 22 күн бұрын
Cryptography and network security ke book ki pdf mil sakati hai kya??
@garima2128
@garima2128 2 жыл бұрын
Can u plz make the vdo of kerberos encryption using non-cryptographic tools
@cst001anantharajd2
@cst001anantharajd2 2 жыл бұрын
Can you solve sums based on this
@nikhilchoudhary4705
@nikhilchoudhary4705 9 ай бұрын
msg aur hash dono ko kyu encrypt krenge, only hash ko encrypt krenge na using private key of A ?
@sahibdhawan9847
@sahibdhawan9847 Ай бұрын
Bhai public key se encryption hota hai and private se decryption
@shekhar2784
@shekhar2784 2 жыл бұрын
Can we get PDFs? Of your lecture notes
@Yoyo-ck9pm
@Yoyo-ck9pm 3 жыл бұрын
Sir if we want confidentiality too which algorithm should be used!???Should DESor AES be used??
@joydeepbhattacharjee5305
@joydeepbhattacharjee5305 4 жыл бұрын
well i'm a bit confused ..as per my knowledge we encrypt data using public key and decrypt data with private key...then why the reverse is being done here?? please explain
@joydeepbhattacharjee5305
@joydeepbhattacharjee5305 3 жыл бұрын
@@girisharora945 okk thanks
@gautamgoyal108
@gautamgoyal108 2 жыл бұрын
Brother it's for authentication Authentication is received if A decrypts with his own private key if a done with b public key then it's not authentic that A send mssg because B public key is all over on Internet
@utkarshdubey4130
@utkarshdubey4130 4 жыл бұрын
Bhai mcqs hr topic pr btado.. Bca final year is mcqs based this time
@prodiptamondal1758
@prodiptamondal1758 3 жыл бұрын
Any user will have the public key of A, so how the confidentiality will be maintained for second case?
@nayanyadav5005
@nayanyadav5005 3 жыл бұрын
He missed.... let me help you (if this exact question u r asking) suppose, A as Sender B as Reciever, obviously, A has some plain text (PT) private key of A (PrKA) and public key of A(PuKA) private key of B (PrKB) and public key of B(PuKB) {Note---> PuKA ( PrKA =None OR we can say they can cancel one another}..............................................................................(NOTE) Now the game begins.... A--> PT --> PrKA (PT)--> PuKB (PrKA (PT)) Now (PuKB (PrKA (PT))) becomes a Free Electron and only B can get it. now,B has a Free electron, and his private key(PrKB) also. B -->PrKB ( PuKB (PrKA (PT))) B-->PrKA(PT)......... .............................................(from NOTE) Now B goes to google and asks for Public key of A B-->PuKA(PrKA(PT)) B--> (PT)......................................... (from NOTE) Hurrah!!!!!!! (Pls let me know the feedback, I will erase it otherwise)
@alapandas3538
@alapandas3538 2 жыл бұрын
Public key is in encryption and lrivate key in decryption
@chanchalgupta2259
@chanchalgupta2259 4 жыл бұрын
Bhaiya ye hash function se only signature ko digitial signaure me convert krate h ky , Ya fir pura msg bhi convert hota h private key se,
@NottyPriyal
@NottyPriyal Жыл бұрын
To everyone who is asking about hw we can decrypt the data using the public key. To validate the data's integrity, the recipient first uses the signer's public key to decrypt the digital signature. The recipient then uses the same hashing algorithm that generated the original hash to generate a new one-way hash of the same data.
@anshukumari109
@anshukumari109 2 жыл бұрын
Digital signature bs itna hi h?...sir mjhe Google doc, e-mail, social media handle k classes mil skte h
@vlogplanet5536
@vlogplanet5536 2 жыл бұрын
Can you share the notes
@rajendertanwar1881
@rajendertanwar1881 2 ай бұрын
Justice for person B 🙏 ❤️
@divakar_alig8781
@divakar_alig8781 4 жыл бұрын
Sir can you send the notes of cryptography
@sumitrasar6204
@sumitrasar6204 Жыл бұрын
You force me to comment yar! Dam clear all doubt of mine .
@sumitbhatt3715
@sumitbhatt3715 4 жыл бұрын
Sir app word expand algorithm of rsa ma ek video bna do plxx
@geopluse6336
@geopluse6336 Жыл бұрын
kon sa book use karo rahai ho ??
@माधव..MADHAV
@माधव..MADHAV 2 ай бұрын
Fourozon dcna and security
@himachalivloggershipali6299
@himachalivloggershipali6299 5 жыл бұрын
Kya apne tcp congestion control algo PE video bnaii haii btaa do
@AbhishekSharmaDit
@AbhishekSharmaDit 5 жыл бұрын
No nahi dali h
@himachalivloggershipali6299
@himachalivloggershipali6299 5 жыл бұрын
@@AbhishekSharmaDit ohkkk 😔
@VicksGamingWorld
@VicksGamingWorld 5 жыл бұрын
@@himachalivloggershipali6299 kisi or channel m dekh lo ..isko vse b smjhana nhi aata
@mehaksaxena866
@mehaksaxena866 4 жыл бұрын
I have a ques sir.. i studied somewhere that we should encrypt the msg with the help of public key of receiver and receiver will decrypt it with his private key to maintain confidentiality but here you said the opposite. I know you said there is no use of confidentiality but still its a doubt. What key should we use to encrypt a msg and vice versa. HOPE YOU WILL REPLY.
@AbhishekSharmaDit
@AbhishekSharmaDit 4 жыл бұрын
In normal situations it is ok but in digital signature concept we will have to ise the private key of the sender so that hame pata chal sake ki ha yahi banda i.e. sender h jo hame msh bhejra h
@AbhishekSharmaDit
@AbhishekSharmaDit 4 жыл бұрын
To encrypt the msg we will use hash function concept along with digital signature Aage series follow karo sab clear hota jayega
@mitulzala6976
@mitulzala6976 2 жыл бұрын
10:00
@Singham_here
@Singham_here 2 жыл бұрын
It's public key in Encryption
@centerwing2101
@centerwing2101 Жыл бұрын
No, Private key is used for encryption
@gulamsarwar609
@gulamsarwar609 3 жыл бұрын
Bro, can u share your book's PDF file?
@lovesingh5105
@lovesingh5105 4 жыл бұрын
Thank you
@techhackz2897
@techhackz2897 2 жыл бұрын
11:57 your using private key of user-A. So, anyone with public key of user-A can decrypt the message and get the msg and hash So, how are we achieving confidentiality here. And in the last fig @ 12:50 we achieved confidentiality, non-repudiation and integrity.
@IamSkyLight
@IamSkyLight 3 жыл бұрын
in your earlier video of Hash/MAC Function, you didn't mention anything about Integrity. Could you confirm if in any scenario (that you discussed) we would be achieving integrity along with authentication and confidentially?
@NottyPriyal
@NottyPriyal Жыл бұрын
There is the concept of message integrity basis where the message will have the digest if the digest matches the public key of the receiver then the integrity of the message is achieved
@bestshorts_rk2342
@bestshorts_rk2342 2 жыл бұрын
WHAT IS Digital 33 Signature ?????
@RishiKumar-tv4jk
@RishiKumar-tv4jk 4 жыл бұрын
Agr beech me message alter hua hai to last step me message ko hash function me daalne pr jo hash aaya aur jo first step me message ko hash function me dalne pr hash aaya tha, vo same kse hoga jb message hi change hogya ??
@Punnu00
@Punnu00 4 жыл бұрын
Synopsis kese bnai jati a
@premcontact3230
@premcontact3230 3 жыл бұрын
If someone agree and give his concent through email but no signature on agreement is this considered as valid document?
@poojayadav9821
@poojayadav9821 4 жыл бұрын
Digital copyrights and search engine pe apne video upload ki h kya sir? If yes then please provide me that link.
@digitalbb1893
@digitalbb1893 4 жыл бұрын
A k public key kahase milega bhai....A ko pblic key v B ko bhejna parega kya?
@mr.pranjul_01
@mr.pranjul_01 3 жыл бұрын
Nhi public key toh public hai wo sbko pata hoti hai
@poojasankpal9046
@poojasankpal9046 Жыл бұрын
Please short me thoda slow explain kare sir
@nagamaruthitubati0305
@nagamaruthitubati0305 3 жыл бұрын
Sir can you please explain the video in English also ..
@syedrakeen7759
@syedrakeen7759 2 жыл бұрын
Sur can u provide a note for this question for 15 marks!
@novyajyoti7920
@novyajyoti7920 Жыл бұрын
Encryption is a public key and decryption is private key
@centerwing2101
@centerwing2101 Жыл бұрын
No, Private key is used for encryption and public key for decryption
@shivanisahu949
@shivanisahu949 4 жыл бұрын
Are you from Dehradun?
@AbhishekSharmaDit
@AbhishekSharmaDit 4 жыл бұрын
Yes
@tenabisht
@tenabisht 4 жыл бұрын
Areh sahuu tum bhi Yaha😂😂✋✋
@AbhishekSharmaDit
@AbhishekSharmaDit 4 жыл бұрын
@@tenabisht sab doon se hi ho kya? 😂
@tenabisht
@tenabisht 4 жыл бұрын
@@AbhishekSharmaDit Haan mtlb hum teeno Doon se hi hn😂
@shivanisahu949
@shivanisahu949 4 жыл бұрын
Abe yar😂😂
@kandukurianjani7852
@kandukurianjani7852 3 жыл бұрын
Please sir.. explain the video English to English all videos
@vishalmodi5469
@vishalmodi5469 4 жыл бұрын
Please provide notes any video
@sufiyansyed2846
@sufiyansyed2846 16 күн бұрын
Sub thik hai Vo baingan ka hand writing change Karo Bhai
@Funduniyatv
@Funduniyatv 6 ай бұрын
Smjhaty ap bht acha hyn but apki handwriting smjh nahi ati r kuch words miss ho jty hyn kindly esi handwritting kryn k smjh bhi to ay kia likha hy
@nischayrawat6216
@nischayrawat6216 3 жыл бұрын
bro concept clear krke btao or har part ko alag alag krke, or yaha waha ye wo shbd mat istmaal kiya kro, kuch clear ni hota,
@GauravDuseja-t6q
@GauravDuseja-t6q 8 ай бұрын
But A public key know to everyone so theere is no confidentiality anyone can acess A message
@meetkakadia3404
@meetkakadia3404 2 жыл бұрын
yahh
@iamgood3406
@iamgood3406 3 жыл бұрын
It's would better that if u did this video in English... there will be people who doesn't know hindhi how can they know??????
Basics Of Digital Signature Explained in Hindi
8:01
5 Minutes Engineering
Рет қаралды 677 М.
진짜✅ 아님 가짜❌???
0:21
승비니 Seungbini
Рет қаралды 10 МЛН
КОНЦЕРТЫ:  2 сезон | 1 выпуск | Камызяки
46:36
ТНТ Смотри еще!
Рет қаралды 3,7 МЛН
ВЛОГ ДИАНА В ТУРЦИИ
1:31:22
Lady Diana VLOG
Рет қаралды 1,2 МЛН
What are Digital Signatures? - Computerphile
10:17
Computerphile
Рет қаралды 353 М.
Digital Signatures Explained - Keep your's Safe!!!
6:08
Technical Guruji
Рет қаралды 552 М.
Diffi Hellman Key Exchange Algorithm | Cryptography and Network Security
15:25
Hash Functions in Cryptography
16:59
Abhishek Sharma
Рет қаралды 485 М.
Digital Signature Algorithm (DSA) in Network Security
12:17
Chirag Bhalodia
Рет қаралды 63 М.
Cracking Enigma in 2021 - Computerphile
21:20
Computerphile
Рет қаралды 2,5 МЛН
CIA Triad
16:08
Neso Academy
Рет қаралды 344 М.
진짜✅ 아님 가짜❌???
0:21
승비니 Seungbini
Рет қаралды 10 МЛН