what a straight Explaination it was ......!!! Understood the CONCEPTS IN SHOT....BRAVO!!!
@amkeertana97134 жыл бұрын
Thanks a lot sir,all the videos were crystal clear..helped me a lot for my exams.
@EllyHejazi2 жыл бұрын
It is really good explanation . Thanks for wonderful tutorial. 👌👌👌
@syedshakeel28575 жыл бұрын
Sir, This is such easy explanation to follow with example and details. Thank you for such videos.
@ssn5223 Жыл бұрын
i love how he uses the duster after writing anything
@DeveloperJunaid3 жыл бұрын
I Love Your Teaching Style !!
@Baltejgoud2 жыл бұрын
Thanks!
@sundeepsaradhi2 жыл бұрын
Thank You My Friend for your love and support towards our channel. Share our sessions with your friends. Thank You once again.
@parveshtaneja20054 жыл бұрын
Sir, I am going through your videos and it is really helpful to understand the concept and algorithm. Thank you very much.
@imabeapirate5 жыл бұрын
Thank you for this upload and sharing the knowledge!! Learned a lot!
@hiteshgorantla15663 жыл бұрын
In public-key authority 19:42 point 3,6,7 It should be PU instead of KU as it's the public key of a and b not of PKA.
@lks53435 жыл бұрын
Nice explanation , my all doubts get cleared . Thank you sir .
@rajeshkumarrout0141 Жыл бұрын
Nice Explanation 👍👍
@sherymalik58353 жыл бұрын
Where were you man? Awesome explanation..Cleared all my concepts. Thankyou so much .
@ptit9x4 жыл бұрын
Thank you for this lession, it very helpful with me
@gaming_boga4 жыл бұрын
Sir you are great thanks a lot for your teaching
@siripanchadi62885 жыл бұрын
Soooper.. ! U explained it very clearly ..thnkew
@niharikareddy_ars5 жыл бұрын
Very good explanation sir. But if u explain it in less time u will gain more viewers because many of us will see the concepts during exams and we won't get that much time to see each concept.
@a.yashwanth4 жыл бұрын
for the public key distribution, you told that certificates are encrypted by private key of authority so that anyone can verify if the certificate is valid by decrypting with CA public key. But how do you distribute the public key of CA in the first place?
@swagplayzyt6 жыл бұрын
Sir , complete the syllabus of network security as soon as possible . My exams are coming , and l'm waiting to see your video. Thanku u sir
@sundeepsaradhi6 жыл бұрын
hi rishabh thanks for your interest towards our channel. Soon i will upload all the concepts.
@JMacSD2 жыл бұрын
Thanks for this wonderful tutorial on key distribution! But while it shows how authentication is performed in these key exchanges, that part seems exploitable, for instance: In 3) Public Key Authority: A sends his ID(A) to B [encrypted with KU(B)], why is B sure this message came from A? Anybody who knows ID(A) could have sent it, right? For example, say now B wants to talk to F while fooling F to think he's talking to A, so B sends ID(A) where he's supposed to send his his own ID(B): how can F know this is a lie? In 4) Certificate Authority: Now B wants to fool F so B sends C(A) instead of C(B), F can look at the time stamp in the cert and hopefully see it's too old, and B's lie fails.
@rg_arts_81 Жыл бұрын
Nice explained sir
@rinzinnorbu35185 жыл бұрын
wow really nice explanation thank you sir
@sundeepsaradhi5 жыл бұрын
Hi Rinzin Thanks for your support towards our channel share our channel with your friends and keep following our channel
@sajalrastogi39046 жыл бұрын
private key authority will be different for different users right ?..... so we should right KRauthA or KRauthB right?
@yusrameraj915 жыл бұрын
Best lectures..Thank u sir
@pranavkakade74404 жыл бұрын
Thank you sm . Helped a lot
@Soni-Santosh5 жыл бұрын
Best Video ever seen
@Vishva-h6n5 жыл бұрын
Thank you very much sir. i easily understood your class
@niharikaniharika95365 жыл бұрын
sir in last 30.24 cA is encrypted by private key of certificate authority,which is present only at certificate authority,how user A,B C can decrypt message
@krishnaprasath43415 жыл бұрын
Sir, In public key distribution Certification Authority send Certificate to UserA, user B. It will Encrypted by certificate authority, my doubt is who is decrypted user A or user B
@pranavbhokare18663 жыл бұрын
How that encrypted message of authority is decrypted at end of user A and User B , If that msg are encrypted using private key of authority which is not shared to any user ?? And if in case that the msg are decrypted using public key ,then ther will be vulnerabilities in system as everyone can get each other's public key anyone user can decrypt that msg.??? PLZ reply ASAP
@navneetnigam1144 жыл бұрын
how can we decrypt the certificate of any user? it is encrypt with private key of certificate authority.
@aseenaa39314 жыл бұрын
Sir can we compare public key distribution system with public key cryptosystem
@arian74726 жыл бұрын
public key send without any encryption to CA yes ?
@jewel.barman6 жыл бұрын
Can you also Make a video on SSH(Secure Shell) describing all it's key exchange?
@RaviKant-kp9fs6 жыл бұрын
very good video sir
@jajamnagasreeja88353 жыл бұрын
thank you so much sir
@NareshKumar-bl3sy6 жыл бұрын
very Nice !!! as Expected.......
@sundeepsaradhi6 жыл бұрын
hi naresh thanks for your interest towards our channel and share my sessions with your friends and subscribe to our channel.Keep following our channel.
@sushailya6 жыл бұрын
Hello Sundeep garu. In key distribution through Certificate Authority, how is the Public key of the CA distributed among the users? Can you please explain?
@sundeepsaradhi6 жыл бұрын
hi sushailya thanks for your interest towards our channel and share my sessions with your friends and subscribe to our channel.Keep following our channel. soon i will to upload.
@subhendubera73486 жыл бұрын
in asymmetric key encryption techniques support n user want to communicate, how many different public key and private key will be used for this scenario? sir ans. pls
@sundeepsaradhi6 жыл бұрын
in Asymmetric key encryption both the sender and receiver will be having public and private keys. SENDER A = { PUa , PRa } RECEIVER B={ PUb , PRb } hope your doubt has been clarified.
@freddiegellar48395 жыл бұрын
Sir, if public key of authority is available to everyone and the public key authority uses it's private key to encrypt the public key of the intended user, then anyone could decrypt the message and get the public key of the user. Then, what's the use of even encrypting it?
@remyaunnikrishnan20375 жыл бұрын
only the registered users know the public key of the authority
@b2-mani4 жыл бұрын
@@remyaunnikrishnan2037 cool
@satishkumar-vs2xh5 жыл бұрын
Here encryption means which encryption algarithm is used sir?
@gauravthapliyal75235 жыл бұрын
Hi Sandeep Great videos. How ever, if you could please explain using some practical scenarios. Like, in CA case, you say that user A will send its public key to CA and inturn CA will give a CERT to A. Now my question is what if an evil guy gets the public key of say Amazon and ask CA to generate a cert for it. Obviously, CA wont generate a Amazon cert for that hacker. But what exactly happens there and a lot of questions like that.
@a.yashwanth4 жыл бұрын
You need to authenticate with the CA before doing this process. The main point of a CA is to verify if you are the one who you claim to be. For example, if you want a certificate for your website then you need to prove that the domain for which you want the CA belongs to you. Unless you do that you will not get the certificate for https.
@pavant87615 жыл бұрын
Sir. .. actually why a public key should be distributed? Only text can be passed but why the purpose of KEY DISTRIBUTION? Kindly clarify.
@sundeepsaradhi5 жыл бұрын
Hi In order to do the process of encryption and decryption we need a pair of keys. Without the pair of keys these process can't be done.
@devarakondavenkatasuryanag7374 жыл бұрын
Hi Sarahi, your sessions on Network Security topic are very detailed and useful. o you have any sessions on the basic mathematics require like Galios fields abstract algebra
@asemal-abdali97956 жыл бұрын
great job man
@vaskaran16 жыл бұрын
Do u have chinese remainder theorem?
@sundeepsaradhi6 жыл бұрын
hi Vasantha raj garu sorry i dont have the video of Chinese remainder theorem but having an idea to do that video and soon i will try to do that.
@kebedenibretu97114 жыл бұрын
Thank you Sir. for your nice tutorial. but i have 1 question, at the 4th method of public key distribution (certificate authority), how user A and User B know the private key of certificate authority? Because when they start communication, each user encrypt their 'identity' and 'Timestamp' using Private key of Certificate authority.
@haripriya58364 жыл бұрын
Thank you sir
@piyushharshe83395 жыл бұрын
u explain good
@sandeepkonreddy22536 жыл бұрын
Very usefull videos Sir will u plz try to upload web technologies concepts
@sundeepsaradhi6 жыл бұрын
hi sandeep thanks for your interest towards our channel and my sessions. i will try to upload them soon.
@xyz1236365 жыл бұрын
Thank you sir for this lesson..it is helping me lot... please help to share the link if you have any lecture for Multi-tier PKI ( chain of trust) Regards Manish
@DrAmitkumarPathak2 жыл бұрын
very nice
@BharatKumar-ew2yv5 жыл бұрын
Sir You teach very well but too slow.. in fact 2x speed of the video looks slow too. Please increase your speed a little. Thank you
@sundeepsaradhi5 жыл бұрын
hi bharat thanks for your suggestion. Thanks for your support towards our channel.Share our channel with your friends and keep following our channel.
@derickbarthelot6 жыл бұрын
Sir can you please explain ECC-Elliptic curve cryptography
@sundeepsaradhi6 жыл бұрын
hi Derick i will try to upload it soon.
@vishnuvardhan62465 жыл бұрын
Tq so much sir
@sriramphanindrabellapukond55926 жыл бұрын
sir what about pk distridution of secret keys ...... please share the video sir... thank u.....
@sundeepsaradhi6 жыл бұрын
hi phanindra kzbin.info/www/bejne/sH2uhWdjqrd6rZY
@aysheshimashagrie26543 жыл бұрын
very good
@sivapriyagajula53426 жыл бұрын
sir I want okely key management
@sarithathota88466 жыл бұрын
Excellent
@sundeepsaradhi6 жыл бұрын
hi saritha thanks for your interest towards our channel and share my sessions with your friends and subscribe to our channel.Keep following our channel.
@daisonraj95776 жыл бұрын
Thanks sir
@haritha26555 жыл бұрын
sir can you please explain attribute based encryption, cp-atttributed encryption
@chikkantipavani92686 жыл бұрын
Please upload x.509 certificate topic Sir and also please upload all the topics of information security Sir...thank you
@sreenaunnikrishnan31356 жыл бұрын
Thank u sir
@civikamal57794 жыл бұрын
Very 2 thanks
@mapkitchenvlogs6014 жыл бұрын
Sir, plz upload the blowfish and IDEA algorithm if Possible plz
@adarshnair98466 жыл бұрын
Please upload videos on elliptical cryptography sooner!
@whatsapp13945 жыл бұрын
👉This hacker is very good and reliable he very good about private key under 2 hours ADD him on instagram @KINGS_0689 or whatsapp +13153255297
@kokjiaming43636 жыл бұрын
Thanks
@ramaraog46306 жыл бұрын
Sir we need ecc, whirlpool, rc4,cmac
@sundeepsaradhi6 жыл бұрын
hi ramarao i do remember but i am not much confidence about ecc so i am little bit delaying the upload on ecc. so please give me some time i will definitely upload it.
@sachinranganath14006 жыл бұрын
Sir please upload the Data Structures concepts like Stack,Queue,LL,Trees etc...
@sundeepsaradhi6 жыл бұрын
hi sachin thanks for your interest towards our channel and i will definitely try to upload them soon.
@sachinranganath14006 жыл бұрын
Sundeep Saradhi As Soon As Possible sir plz...
@sundeepsaradhi6 жыл бұрын
but i am now uploading the concepts of network security and immediately after that i will upload them.
@sachinranganath14006 жыл бұрын
Thank u sir..
@sundeepsaradhi6 жыл бұрын
welcome sachin
@geetasaisruthi26215 жыл бұрын
Difference between pub and kub
@kainatzafar45733 жыл бұрын
Plzz help me
@jayalakshmi84304 жыл бұрын
Key management explain in tamil sir
@thotanaveenbabu26906 жыл бұрын
Sir public key cryptography video link thotakishore90@gmail.com ki pampandi
@sundeepsaradhi6 жыл бұрын
hi naveen hope you got the link in your email.
@sajalrastogi39046 жыл бұрын
aadharity nhi ... authority hota h sir.... otherwise nice work