NETWORK SECURITY - PUBLIC KEY DISTRIBUTION

  Рет қаралды 103,862

Sundeep Saradhi Kanthety

Sundeep Saradhi Kanthety

Күн бұрын

Пікірлер: 101
@glensaldanha3485
@glensaldanha3485 3 жыл бұрын
Love the passion of this gentleman...
@pavitrasinghtomar1979
@pavitrasinghtomar1979 2 жыл бұрын
what a straight Explaination it was ......!!! Understood the CONCEPTS IN SHOT....BRAVO!!!
@amkeertana9713
@amkeertana9713 4 жыл бұрын
Thanks a lot sir,all the videos were crystal clear..helped me a lot for my exams.
@EllyHejazi
@EllyHejazi 2 жыл бұрын
It is really good explanation . Thanks for wonderful tutorial. 👌👌👌
@syedshakeel2857
@syedshakeel2857 5 жыл бұрын
Sir, This is such easy explanation to follow with example and details. Thank you for such videos.
@ssn5223
@ssn5223 Жыл бұрын
i love how he uses the duster after writing anything
@DeveloperJunaid
@DeveloperJunaid 3 жыл бұрын
I Love Your Teaching Style !!
@Baltejgoud
@Baltejgoud 2 жыл бұрын
Thanks!
@sundeepsaradhi
@sundeepsaradhi 2 жыл бұрын
Thank You My Friend for your love and support towards our channel. Share our sessions with your friends. Thank You once again.
@parveshtaneja2005
@parveshtaneja2005 4 жыл бұрын
Sir, I am going through your videos and it is really helpful to understand the concept and algorithm. Thank you very much.
@imabeapirate
@imabeapirate 5 жыл бұрын
Thank you for this upload and sharing the knowledge!! Learned a lot!
@hiteshgorantla1566
@hiteshgorantla1566 3 жыл бұрын
In public-key authority 19:42 point 3,6,7 It should be PU instead of KU as it's the public key of a and b not of PKA.
@lks5343
@lks5343 5 жыл бұрын
Nice explanation , my all doubts get cleared . Thank you sir .
@rajeshkumarrout0141
@rajeshkumarrout0141 Жыл бұрын
Nice Explanation 👍👍
@sherymalik5835
@sherymalik5835 3 жыл бұрын
Where were you man? Awesome explanation..Cleared all my concepts. Thankyou so much .
@ptit9x
@ptit9x 4 жыл бұрын
Thank you for this lession, it very helpful with me
@gaming_boga
@gaming_boga 4 жыл бұрын
Sir you are great thanks a lot for your teaching
@siripanchadi6288
@siripanchadi6288 5 жыл бұрын
Soooper.. ! U explained it very clearly ..thnkew
@niharikareddy_ars
@niharikareddy_ars 5 жыл бұрын
Very good explanation sir. But if u explain it in less time u will gain more viewers because many of us will see the concepts during exams and we won't get that much time to see each concept.
@a.yashwanth
@a.yashwanth 4 жыл бұрын
for the public key distribution, you told that certificates are encrypted by private key of authority so that anyone can verify if the certificate is valid by decrypting with CA public key. But how do you distribute the public key of CA in the first place?
@swagplayzyt
@swagplayzyt 6 жыл бұрын
Sir , complete the syllabus of network security as soon as possible . My exams are coming , and l'm waiting to see your video. Thanku u sir
@sundeepsaradhi
@sundeepsaradhi 6 жыл бұрын
hi rishabh thanks for your interest towards our channel. Soon i will upload all the concepts.
@JMacSD
@JMacSD 2 жыл бұрын
Thanks for this wonderful tutorial on key distribution! But while it shows how authentication is performed in these key exchanges, that part seems exploitable, for instance: In 3) Public Key Authority: A sends his ID(A) to B [encrypted with KU(B)], why is B sure this message came from A? Anybody who knows ID(A) could have sent it, right? For example, say now B wants to talk to F while fooling F to think he's talking to A, so B sends ID(A) where he's supposed to send his his own ID(B): how can F know this is a lie? In 4) Certificate Authority: Now B wants to fool F so B sends C(A) instead of C(B), F can look at the time stamp in the cert and hopefully see it's too old, and B's lie fails.
@rg_arts_81
@rg_arts_81 Жыл бұрын
Nice explained sir
@rinzinnorbu3518
@rinzinnorbu3518 5 жыл бұрын
wow really nice explanation thank you sir
@sundeepsaradhi
@sundeepsaradhi 5 жыл бұрын
Hi Rinzin Thanks for your support towards our channel share our channel with your friends and keep following our channel
@sajalrastogi3904
@sajalrastogi3904 6 жыл бұрын
private key authority will be different for different users right ?..... so we should right KRauthA or KRauthB right?
@yusrameraj91
@yusrameraj91 5 жыл бұрын
Best lectures..Thank u sir
@pranavkakade7440
@pranavkakade7440 4 жыл бұрын
Thank you sm . Helped a lot
@Soni-Santosh
@Soni-Santosh 5 жыл бұрын
Best Video ever seen
@Vishva-h6n
@Vishva-h6n 5 жыл бұрын
Thank you very much sir. i easily understood your class
@niharikaniharika9536
@niharikaniharika9536 5 жыл бұрын
sir in last 30.24 cA is encrypted by private key of certificate authority,which is present only at certificate authority,how user A,B C can decrypt message
@krishnaprasath4341
@krishnaprasath4341 5 жыл бұрын
Sir, In public key distribution Certification Authority send Certificate to UserA, user B. It will Encrypted by certificate authority, my doubt is who is decrypted user A or user B
@pranavbhokare1866
@pranavbhokare1866 3 жыл бұрын
How that encrypted message of authority is decrypted at end of user A and User B , If that msg are encrypted using private key of authority which is not shared to any user ?? And if in case that the msg are decrypted using public key ,then ther will be vulnerabilities in system as everyone can get each other's public key anyone user can decrypt that msg.??? PLZ reply ASAP
@navneetnigam114
@navneetnigam114 4 жыл бұрын
how can we decrypt the certificate of any user? it is encrypt with private key of certificate authority.
@aseenaa3931
@aseenaa3931 4 жыл бұрын
Sir can we compare public key distribution system with public key cryptosystem
@arian7472
@arian7472 6 жыл бұрын
public key send without any encryption to CA yes ?
@jewel.barman
@jewel.barman 6 жыл бұрын
Can you also Make a video on SSH(Secure Shell) describing all it's key exchange?
@RaviKant-kp9fs
@RaviKant-kp9fs 6 жыл бұрын
very good video sir
@jajamnagasreeja8835
@jajamnagasreeja8835 3 жыл бұрын
thank you so much sir
@NareshKumar-bl3sy
@NareshKumar-bl3sy 6 жыл бұрын
very Nice !!! as Expected.......
@sundeepsaradhi
@sundeepsaradhi 6 жыл бұрын
hi naresh thanks for your interest towards our channel and share my sessions with your friends and subscribe to our channel.Keep following our channel.
@sushailya
@sushailya 6 жыл бұрын
Hello Sundeep garu. In key distribution through Certificate Authority, how is the Public key of the CA distributed among the users? Can you please explain?
@sundeepsaradhi
@sundeepsaradhi 6 жыл бұрын
hi sushailya thanks for your interest towards our channel and share my sessions with your friends and subscribe to our channel.Keep following our channel. soon i will to upload.
@subhendubera7348
@subhendubera7348 6 жыл бұрын
in asymmetric key encryption techniques support n user want to communicate, how many different public key and private key will be used for this scenario? sir ans. pls
@sundeepsaradhi
@sundeepsaradhi 6 жыл бұрын
in Asymmetric key encryption both the sender and receiver will be having public and private keys. SENDER A = { PUa , PRa } RECEIVER B={ PUb , PRb } hope your doubt has been clarified.
@freddiegellar4839
@freddiegellar4839 5 жыл бұрын
Sir, if public key of authority is available to everyone and the public key authority uses it's private key to encrypt the public key of the intended user, then anyone could decrypt the message and get the public key of the user. Then, what's the use of even encrypting it?
@remyaunnikrishnan2037
@remyaunnikrishnan2037 5 жыл бұрын
only the registered users know the public key of the authority
@b2-mani
@b2-mani 4 жыл бұрын
@@remyaunnikrishnan2037 cool
@satishkumar-vs2xh
@satishkumar-vs2xh 5 жыл бұрын
Here encryption means which encryption algarithm is used sir?
@gauravthapliyal7523
@gauravthapliyal7523 5 жыл бұрын
Hi Sandeep Great videos. How ever, if you could please explain using some practical scenarios. Like, in CA case, you say that user A will send its public key to CA and inturn CA will give a CERT to A. Now my question is what if an evil guy gets the public key of say Amazon and ask CA to generate a cert for it. Obviously, CA wont generate a Amazon cert for that hacker. But what exactly happens there and a lot of questions like that.
@a.yashwanth
@a.yashwanth 4 жыл бұрын
You need to authenticate with the CA before doing this process. The main point of a CA is to verify if you are the one who you claim to be. For example, if you want a certificate for your website then you need to prove that the domain for which you want the CA belongs to you. Unless you do that you will not get the certificate for https.
@pavant8761
@pavant8761 5 жыл бұрын
Sir. .. actually why a public key should be distributed? Only text can be passed but why the purpose of KEY DISTRIBUTION? Kindly clarify.
@sundeepsaradhi
@sundeepsaradhi 5 жыл бұрын
Hi In order to do the process of encryption and decryption we need a pair of keys. Without the pair of keys these process can't be done.
@devarakondavenkatasuryanag737
@devarakondavenkatasuryanag737 4 жыл бұрын
Hi Sarahi, your sessions on Network Security topic are very detailed and useful. o you have any sessions on the basic mathematics require like Galios fields abstract algebra
@asemal-abdali9795
@asemal-abdali9795 6 жыл бұрын
great job man
@vaskaran1
@vaskaran1 6 жыл бұрын
Do u have chinese remainder theorem?
@sundeepsaradhi
@sundeepsaradhi 6 жыл бұрын
hi Vasantha raj garu sorry i dont have the video of Chinese remainder theorem but having an idea to do that video and soon i will try to do that.
@kebedenibretu9711
@kebedenibretu9711 4 жыл бұрын
Thank you Sir. for your nice tutorial. but i have 1 question, at the 4th method of public key distribution (certificate authority), how user A and User B know the private key of certificate authority? Because when they start communication, each user encrypt their 'identity' and 'Timestamp' using Private key of Certificate authority.
@haripriya5836
@haripriya5836 4 жыл бұрын
Thank you sir
@piyushharshe8339
@piyushharshe8339 5 жыл бұрын
u explain good
@sandeepkonreddy2253
@sandeepkonreddy2253 6 жыл бұрын
Very usefull videos Sir will u plz try to upload web technologies concepts
@sundeepsaradhi
@sundeepsaradhi 6 жыл бұрын
hi sandeep thanks for your interest towards our channel and my sessions. i will try to upload them soon.
@xyz123636
@xyz123636 5 жыл бұрын
Thank you sir for this lesson..it is helping me lot... please help to share the link if you have any lecture for Multi-tier PKI ( chain of trust) Regards Manish
@DrAmitkumarPathak
@DrAmitkumarPathak 2 жыл бұрын
very nice
@BharatKumar-ew2yv
@BharatKumar-ew2yv 5 жыл бұрын
Sir You teach very well but too slow.. in fact 2x speed of the video looks slow too. Please increase your speed a little. Thank you
@sundeepsaradhi
@sundeepsaradhi 5 жыл бұрын
hi bharat thanks for your suggestion. Thanks for your support towards our channel.Share our channel with your friends and keep following our channel.
@derickbarthelot
@derickbarthelot 6 жыл бұрын
Sir can you please explain ECC-Elliptic curve cryptography
@sundeepsaradhi
@sundeepsaradhi 6 жыл бұрын
hi Derick i will try to upload it soon.
@vishnuvardhan6246
@vishnuvardhan6246 5 жыл бұрын
Tq so much sir
@sriramphanindrabellapukond5592
@sriramphanindrabellapukond5592 6 жыл бұрын
sir what about pk distridution of secret keys ...... please share the video sir... thank u.....
@sundeepsaradhi
@sundeepsaradhi 6 жыл бұрын
hi phanindra kzbin.info/www/bejne/sH2uhWdjqrd6rZY
@aysheshimashagrie2654
@aysheshimashagrie2654 3 жыл бұрын
very good
@sivapriyagajula5342
@sivapriyagajula5342 6 жыл бұрын
sir I want okely key management
@sarithathota8846
@sarithathota8846 6 жыл бұрын
Excellent
@sundeepsaradhi
@sundeepsaradhi 6 жыл бұрын
hi saritha thanks for your interest towards our channel and share my sessions with your friends and subscribe to our channel.Keep following our channel.
@daisonraj9577
@daisonraj9577 6 жыл бұрын
Thanks sir
@haritha2655
@haritha2655 5 жыл бұрын
sir can you please explain attribute based encryption, cp-atttributed encryption
@chikkantipavani9268
@chikkantipavani9268 6 жыл бұрын
Please upload x.509 certificate topic Sir and also please upload all the topics of information security Sir...thank you
@sreenaunnikrishnan3135
@sreenaunnikrishnan3135 6 жыл бұрын
Thank u sir
@civikamal5779
@civikamal5779 4 жыл бұрын
Very 2 thanks
@mapkitchenvlogs601
@mapkitchenvlogs601 4 жыл бұрын
Sir, plz upload the blowfish and IDEA algorithm if Possible plz
@adarshnair9846
@adarshnair9846 6 жыл бұрын
Please upload videos on elliptical cryptography sooner!
@whatsapp1394
@whatsapp1394 5 жыл бұрын
👉This hacker is very good and reliable he very good about private key under 2 hours ADD him on instagram @KINGS_0689 or whatsapp +13153255297
@kokjiaming4363
@kokjiaming4363 6 жыл бұрын
Thanks
@ramaraog4630
@ramaraog4630 6 жыл бұрын
Sir we need ecc, whirlpool, rc4,cmac
@sundeepsaradhi
@sundeepsaradhi 6 жыл бұрын
hi ramarao i do remember but i am not much confidence about ecc so i am little bit delaying the upload on ecc. so please give me some time i will definitely upload it.
@sachinranganath1400
@sachinranganath1400 6 жыл бұрын
Sir please upload the Data Structures concepts like Stack,Queue,LL,Trees etc...
@sundeepsaradhi
@sundeepsaradhi 6 жыл бұрын
hi sachin thanks for your interest towards our channel and i will definitely try to upload them soon.
@sachinranganath1400
@sachinranganath1400 6 жыл бұрын
Sundeep Saradhi As Soon As Possible sir plz...
@sundeepsaradhi
@sundeepsaradhi 6 жыл бұрын
but i am now uploading the concepts of network security and immediately after that i will upload them.
@sachinranganath1400
@sachinranganath1400 6 жыл бұрын
Thank u sir..
@sundeepsaradhi
@sundeepsaradhi 6 жыл бұрын
welcome sachin
@geetasaisruthi2621
@geetasaisruthi2621 5 жыл бұрын
Difference between pub and kub
@kainatzafar4573
@kainatzafar4573 3 жыл бұрын
Plzz help me
@jayalakshmi8430
@jayalakshmi8430 4 жыл бұрын
Key management explain in tamil sir
@thotanaveenbabu2690
@thotanaveenbabu2690 6 жыл бұрын
Sir public key cryptography video link thotakishore90@gmail.com ki pampandi
@sundeepsaradhi
@sundeepsaradhi 6 жыл бұрын
hi naveen hope you got the link in your email.
@sajalrastogi3904
@sajalrastogi3904 6 жыл бұрын
aadharity nhi ... authority hota h sir.... otherwise nice work
@wintox4089
@wintox4089 5 жыл бұрын
Thanks sir
@fathimaththasneemvv4012
@fathimaththasneemvv4012 4 жыл бұрын
Thank u sir
NETWORK SECURITY - DIGITAL SIGNATURE ALGORITHM (DSA)
33:00
Sundeep Saradhi Kanthety
Рет қаралды 203 М.
NETWORK SECURITY - DIFFIE HELLMAN KEY EXCHANGE ALGORITHM
34:11
Sundeep Saradhi Kanthety
Рет қаралды 236 М.
Гениальное изобретение из обычного стаканчика!
00:31
Лютая физика | Олимпиадная физика
Рет қаралды 4,8 МЛН
We Attempted The Impossible 😱
00:54
Topper Guild
Рет қаралды 56 МЛН
IL'HAN - Qalqam | Official Music Video
03:17
Ilhan Ihsanov
Рет қаралды 700 М.
Каха и дочка
00:28
К-Media
Рет қаралды 3,4 МЛН
NETWORK SECURITY - IP SECURITY PART 1 (AUTHENTICATION HEADER)
31:22
Sundeep Saradhi Kanthety
Рет қаралды 196 М.
X.509 AUTHENTICATION SERVICE PART 1 - NETWORK SECURITY
22:57
Sundeep Saradhi Kanthety
Рет қаралды 121 М.
NETWORK SECURITY - PGP (E-MAIL SECURITY)
23:36
Sundeep Saradhi Kanthety
Рет қаралды 212 М.
Symmetric Key Distribution using Symmetric Encryption | Key Distribution
24:14
NETWORK SECURITY - BLOCK CIPHER MODES OF OPERATION
26:15
Sundeep Saradhi Kanthety
Рет қаралды 165 М.
Гениальное изобретение из обычного стаканчика!
00:31
Лютая физика | Олимпиадная физика
Рет қаралды 4,8 МЛН