Thank you so much sir. I was trying to understand this for last 3-4 hours but everywhere it was over complicated but thanks to you now i'm clear. Thank you again teacher because you are providing and sharing your precious knowledge with us. I'm so inspired by you after seeing you teaching with this passion. Best wishes sir.
Waw awwsome...sir if you guys coming after reading books either kurose and ross or fourozen this is best lecture you found go for it with 1.25× speed.Tq sir
Thank you so much sir. I was very fear about this topic but everywhere it was over complicated but thanks to you now i'm clear. Thank you again teacher because you are providing and sharing your precious knowledge with us.............. I'm so inspired by you after seeing you teaching with this passion. Best wishes sir.
superb teaching sir am following your lecturs for network security the explaination is very simple and easy to understand simply superb........Thank you very much sir
Sir your lectures were really very helpful. You are an outstanding teacher. I would like to suggest that after explaining each of the authentication methods or cipher algorithms you should have explained their advantages and disadvantages. That would have given us more insight. Thanks
Sir you have helped me a lot sir during my exams time. Your explonation is very goood and clear. Keep maintian that sir. You are one of the best teacher in my study career. I was scared about this subject and i found you on youtube. Now i learned lot of subject. Thank you very much sir.
Wow you are a gem... need more people like u in the teaching field who have passion to educate people...I have decided to watch every lecture of yours irrespective of being relevant to my domain of work, I feel I can learn a lot of new things from you... lots of respects and love... thank you!!
hi kulkarni thank you very much. thanks for your interest towards our channel and share my sessions with your friends and subscribe to our channel.Keep following our channel.
@@sundeepsaradhi thank you sir, well explained kindly sir am requesting a tutorial about Pluggable Authentication Modules (PAM) your positive response I will be highly appreciate💪💪💪
Sir, your teaching is really very good, understandable. Please sir also make a separate video for has function, universal hashing and also perfect hashing also.
sir I have a doubt in hash code. in case-2 of hash code the hash code was decrypted by public key of A.Which is available for all users and anyone can decrypt it.there is no use of private key.How this can be achieved.
36:00 there is no need to encrypt hash code separately as the entire plain text and hash are encrypted using the key only known to those 2 people. You encrypt the hash code only when the message is sent in plain text format because anyone can modify the PT and recompute the hash code and the receiver doesn't know if the hash is not encrypted.
Sir. Your classes are excellent. Good to polish fundamentals. Could u give me examples (names) of some algorithm for 2nd and 3rd methods( for Message Authentication Codes and Hash Codes).
hi sachin thanks for your interest towards our channel and share my sessions with your friends and subscribe to our channel.Keep following our channel.
26:00 if we want only authentication, then what's the point of encrypting the plain text. Only encrypting the MAC is enough. If someone wants to change the PT then he cannot recalculate the MAC and modify it as he won't have the key to encrypt it. edit: oh, that's what hash functions do.
Sir can you please tell how come the authentication is achieved in 3rd case of message encryption because there reciever is not recognised by the sender and as you say for authentication both should recognise each other so it fails as per that concept🙄
hi jhansi thanks for your interest towards our channel and share my sessions with your friends and subscribe to our channel.Keep following our channel.
just can you correct me if iam worng hash function is md5 , sha , hmac the first one without shared secret key is md5 or sha the second one with using shared key is hmac
hi naresh thanks for your interest towards our channel and share my sessions with your friends and subscribe to our channel.Keep following our channel.
hi harsha thanks for your interest towards our channel and share my sessions with your friends and subscribe to our channel.Keep following our channel.
hi here the Receiver should know whether the received message is sent from valid and authorized user and this process is called authentication and also the message should not be altered during the transmission and this process is called Integrity. In order to achieve authentication and integrity we will use authentication and hash functions. Hope your doubt has been clarified.
I'm confused...you said no key for hash but in the last type of hash function you have used key for both the hash code and the message... please explain :/
Hi In order to generate hash code we need not use of key on plain text but for acheiving the confidentiality we will encrypt the plain text along with hash code. Hope your doubt has been clarified.
hi Brijesh thanks for your interest towards our channel and share my sessions with your friends and subscribe to our channel.Keep following our channel.
I had so many "Oooohhhh!!" moments during this. Thank you so much!
Thank you so much sir. I was trying to understand this for last 3-4 hours but everywhere it was over complicated but thanks to you now i'm clear. Thank you again teacher because you are providing and sharing your precious knowledge with us. I'm so inspired by you after seeing you teaching with this passion. Best wishes sir.
well explained sir. I was confused with MAC and HASH and now its clear. thank you very much.
Very concise explanation. This is the best general explanation of application security methods I've seen. Many thanks to you for this!
Great Video ...First Time In my 4 Years I have Commented Any Tutorial ...Your A Gem
hi
Thanks for your interest towards our channel and your support towards our channel.
Waw awwsome...sir if you guys coming after reading books either kurose and ross or fourozen this is best lecture you found go for it with 1.25× speed.Tq sir
Thank you so much sir. I was very fear about this topic but everywhere it was over complicated but thanks to you now i'm clear. Thank you again teacher because you are providing and sharing your precious knowledge with us..............
I'm so inspired by you after seeing you teaching with this passion. Best wishes sir.
superb teaching sir am following your lecturs for network security the explaination is very simple and easy to understand simply superb........Thank you very much sir
you are gem... I love your teaching style
Superb teaching iever seen thisi type of techning..
Sir your lectures were really very helpful. You are an outstanding teacher. I would like to suggest that after explaining each of the authentication methods or cipher algorithms you should have explained their advantages and disadvantages. That would have given us more insight. Thanks
Sir you have helped me a lot sir during my exams time. Your explonation is very goood and clear. Keep maintian that sir. You are one of the best teacher in my study career. I was scared about this subject and i found you on youtube. Now i learned lot of subject. Thank you very much sir.
i am cleared all my subjects by watching your videos.......its a small word but, thank you so much sir.😊😊😊😊
Great teacher sir!.. thank you so much... very nice explanation
Thank you for your valuable information ✨✨..
This video.. your video.. ofter 5 years also still... Giving.. Knowledge.. for US...
Thank you...❤
simply great .thanks for the lecture.
Great video, sir. Thank you so much!
U r great sir....tnq u for helping me in examination by these Vedio...tnq u soo much sir.
Wow you are a gem... need more people like u in the teaching field who have passion to educate people...I have decided to watch every lecture of yours irrespective of being relevant to my domain of work, I feel I can learn a lot of new things from you... lots of respects and love... thank you!!
hi kulkarni
thank you very much.
thanks for your interest towards our channel and share my sessions with your friends and subscribe to our channel.Keep following our channel.
@@sundeepsaradhi thank you sir, well explained kindly sir am requesting a tutorial about Pluggable Authentication Modules (PAM) your positive response I will be highly appreciate💪💪💪
Well done! U have explained well!
First Indian Video I never skipped.
Hi
Very nice to see your comment and thanks for your support towards our channel.
Sir , Excellent Lecture..
neat and crystal clear explanation...
Mate, you are awesome
hi alan
thanks for your interest and support towards our channel.
Great explanation sir I appreciate it
Thank you sir...ur videos were of great use ...
Sir, your teaching is really very good, understandable. Please sir also make a separate video for has function, universal hashing and also perfect hashing also.
thank you, sir ......... great video!!
Thanks a bunch, this made things clear
Beautifully explained
Nice vedio I understud every thing WT u r explained
hi divya
thanks for your interest towards our channel and share my sessions with your friends and subscribe to our channel.
Great Video..!
Great explanation thanks
fab video sir thanku
Easy way to understand, thanks teacher
sir I have a doubt in hash code.
in case-2 of hash code the hash code was decrypted by public key of A.Which is available for all users and anyone can decrypt it.there is no use of private key.How this can be achieved.
36:00 there is no need to encrypt hash code separately as the entire plain text and hash are encrypted using the key only known to those 2 people.
You encrypt the hash code only when the message is sent in plain text format because anyone can modify the PT and recompute the hash code and the receiver doesn't know if the hash is not encrypted.
Thank you so much sir
i got clear idea about types of authentication
excellent explanation sir.
EXCELLENT VIDEO
Sir. Your classes are excellent. Good to polish fundamentals. Could u give me examples (names) of some algorithm for 2nd and 3rd methods( for Message Authentication Codes and Hash Codes).
Many thanks for sharing :)
GREAT EXPLANATION
Thank you so much sir😊😊very much useful🙂
Genius ⚡⚡⚡
Thank you sir your teaching is very well
❤ god bless you more
Great Sir.
hi amar
thanks for your interest towards our channel and share my sessions with
your friends and subscribe to our channel.Keep following our channel.
thank you sir great session
Great Sir
Please share the SHA 3 Algo
As soon as possible.
Nicely explained Sir
hi sachin
thanks for your interest towards our channel and share my sessions with
your friends and subscribe to our channel.Keep following our channel.
Thankyou for your explanation sir 😅
thank you!🤯
sir in case of hash function can't we encrypt the hash code using secret key i mean symetric key cryptography technique?
hi chakraborty
of course you can encrypt the hash code with secret key and the same should reflected on receivers side.
Big Big Like Thank you
Your videos are the only sources I depend on.
Thanks a lot🌹
When r u planning to add other videos in this series sir
You are doing awesome job
Excellent Sir
nice work ..
hi Rohit
thanks for your interest towards our channel and share my sessions with
your friends and subscribe to our channel.Keep following our channel.
great one
How does the receiver get to know the MAC code that was applied so that it can it can be compared with the senders MAC?
Good explanation sir tq soooo much
hi divya
thanks for your interest towards our channel and share my sessions with
your friends and subscribe to our channel.Keep following our channel.
thank you sir you are the best
Very nice
nice explanation sir
Great video sir... Sir could u pls explain DES n AES with an example Or its implementation...
superb
Sir please explain s/mime and pgp format. Tomorrow is my exam. I am hoping that u will upload it soon .Thank you :)
26:00 if we want only authentication, then what's the point of encrypting the plain text. Only encrypting the MAC is enough. If someone wants to change the PT then he cannot recalculate the MAC and modify it as he won't have the key to encrypt it.
edit: oh, that's what hash functions do.
i rarely comment on tutorials but this one was really really good.
Sir can you please tell how come the authentication is achieved in 3rd case of message encryption because there reciever is not recognised by the sender and as you say for authentication both should recognise each other so it fails as per that concept🙄
Super ga cheptunaru sir
hi jhansi
thanks for your interest towards our channel and share my sessions with
your friends and subscribe to our channel.Keep following our channel.
👍
Thank you
GURUJI U RRRRRRRRR GREATTTTTTTT
just can you correct me if iam worng
hash function is md5 , sha , hmac
the first one without shared secret key is md5 or sha
the second one with using shared key is hmac
can u plz..tell me real workd example......
email id can be an example of second case in messsage encryption?
Thank you sir
super
God bless you
please complete the playlist. It will be very helpful
keep it up
hi syed
thanks for your interest towards our channel and share my sessions with your friends and subscribe to our channel.Keep following our channel.
Very Nice Lecture Sirji !! Grand Salute!!!
hi naresh
thanks for your interest towards our channel and share my sessions with
your friends and subscribe to our channel.Keep following our channel.
Thanks
hi hasan
thanks for watching my sessions and interest towards our channel.
very nice
hi harsha
thanks for your interest towards our channel and share my sessions with
your friends and subscribe to our channel.Keep following our channel.
What are the authentication functions (c) and hash functions (h) we are applying for the plaintext ?
hi
here the Receiver should know whether the received message is sent from valid and authorized user and this process is called authentication and also the message should not be altered during the transmission and this process is called Integrity.
In order to achieve authentication and integrity we will use authentication and hash functions.
Hope your doubt has been clarified.
Sir What are the types of authentication services and techniques of authentication?
In MAC method, how k1,k2 are exchanged
Tq sir
Thankyou Sir
hello sir,you are saying that hash is independent of key,but in second case your are using secret key for the encryption of the whole message,why?
can you make a video on lamport authentication scheme?
How the secret key will be generated and shared between sender and receiver
thanku sir
30:00 hash function
I'm confused...you said no key for hash but in the last type of hash function you have used key for both the hash code and the message... please explain :/
Hi
In order to generate hash code we need not use of key on plain text but for acheiving the confidentiality we will encrypt the plain text along with hash code.
Hope your doubt has been clarified.
18:11 MAC
love you 3000 sir
Good sir kindly reveal another topics of network security like rc4,linear crypt analysis and different crypt analysis ,blow fish, except alog
hi rama rao
thanks for your interest towards my sessions and soon i will upload them.
Nice lecture Sundeep.
hi Brijesh
thanks for your interest towards our channel and share my sessions with
your friends and subscribe to our channel.Keep following our channel.