Digital signature

Sdílet
Vložit
  • čas přidán 4. 12. 2019
  • #DigitalSignature #Hashing #abhishekdit #NetworkSecurity #Cryptography #InformationSecurity
    Hello friends! Welcome to my channel.
    My name is Abhishek Sharma.
    This is the series of Cryptography and network security.
    Courses on my Website (Huge discounts going on)
    www.abhisheksharmadit.com/s/s...
    In this video, i have explained what is Digital Signature in Cryptography and network security.
    Placement series:
    • Interview process deta...
    If you learned something new do like and share this video with your friends and don't forget to subscribe to my channel :)
    There are lectures related to different subjects on this channel.Do check them out, guys.
    Link is given below:
    Placement series:
    • Interview process deta...
    computer graphics:
    • Computer Graphics
    engineering economics:
    • Engineering Economics
    Cryptography :
    • Playfair Cipher Algorithm
    .Net C# :
    • .NET C#
    Pointers in C :
    • Pointers in C Introduc...
    Linked List for Interviews :
    • Introduction to Linked...
    Java Tricky videos/programs for interviews :
    • Java Labelled For Loop...
    pointers playlist:
    • Pointers in C
    C Programming tips and tricks:
    • C tricky programs/videos
    Abhishek VLOGS :
    • #VLOG-1 Riding through...
    Concerts :
    • Khushboo Grewal concer...

Komentáře • 131

  • @chinnariprasad5177
    @chinnariprasad5177 Před 4 lety +90

    Can you please let me know the text book you are using.

  • @Gaurav-pm5hs
    @Gaurav-pm5hs Před 3 lety +164

    That why I love indian boy explaining things on pen paper

  • @nabeelakbar8255
    @nabeelakbar8255 Před rokem +43

    Integrity= hash function
    authentication= digital signature
    confidentiality= encryption

  • @ShivamTiwari-mo3dj
    @ShivamTiwari-mo3dj Před 3 lety +14

    a very good work and thank you for clearing our concepts . loved your video, it is very useful as semester exam point of view.

  • @RAHULYADAV-dd3yy
    @RAHULYADAV-dd3yy Před 2 lety +2

    Bhai fan ho gaya main tumhara.. Bas tumhare hi lecture se padha hai maine... Love u bro..

  • @kandukurianjani7852
    @kandukurianjani7852 Před 3 lety +2

    Very nice explanation.. thank u so much

  • @ajayshankhwar730
    @ajayshankhwar730 Před 3 lety +19

    This is the best channel for semster preperation .The content is really structural and exact.

  • @syedasyed2688
    @syedasyed2688 Před 2 lety

    Realy like ur way of Teaching thumbs up👍❣️

  • @viraltoovideos
    @viraltoovideos Před rokem +1

    Bahut achha explain kiye hai bhaiya

  • @arjitprakher73
    @arjitprakher73 Před 2 lety

    Thank you bhaiya , ye kafi accha explanation tha

  • @niharjyotibasisth
    @niharjyotibasisth Před rokem +1

    Once again, here one night before the exam. Thank you...

  • @kavitasharma8483
    @kavitasharma8483 Před rokem +1

    Sir ,I like the way you teaching

  • @Yoyo-ck9pm
    @Yoyo-ck9pm Před 2 lety +2

    Sir if we want confidentiality too which algorithm should be used!???Should DESor AES be used??

  • @sahil73626
    @sahil73626 Před rokem

    Well understood .thanku bro!

  • @preyumkumar7404
    @preyumkumar7404 Před 3 lety

    great help thanks great video

  • @shreyabhosale9962
    @shreyabhosale9962 Před 3 lety +1

    Very nice explanation

  • @vipinchaudhary7713
    @vipinchaudhary7713 Před 2 lety

    Nice,explanation bro..👍👍

  • @user-oc3yc1yw1w
    @user-oc3yc1yw1w Před 6 měsíci +1

    thanku bhaya this big and soo... big help for me in my exam shree ram ji aap ko bhala karay bhaya🕣🙏🙏🙏🙏🙏👇👇👇👇👇👇👇👇👇👇👇👇🙏🙏🙏🙏🙏🙏🙏🙏🙏🙏🙏🙏🙏🙏🙏🙏🙏🙏🙏👇👇👇👇👇👇👇👇👇🙏🙏🙏🙏🙏🙏🙏🙏🙏🙏🙏🙏🙏🙏🙏🙏🙏🙏🙏🙏🙏🙏🙏🙏🙏🙏🙏🙏🙏🙏🙏🙏🙏🙏🙏🙏🙏🙏🙏🙏🙏🙏🙏

  • @_NaeemTamboli
    @_NaeemTamboli Před 9 měsíci

    Amazing explanation

  • @kangna55
    @kangna55 Před 4 lety +5

    Can you explain the hash thing it with an example? Explain it with some msg written in email

  • @coming_out_97
    @coming_out_97 Před 3 měsíci +1

    A good explanation 😊

  • @chanchalgupta2259
    @chanchalgupta2259 Před 4 lety +1

    Bhaiya ye hash function se only signature ko digitial signaure me convert krate h ky ,
    Ya fir pura msg bhi convert hota h private key se,

  • @priyanshigupta6178
    @priyanshigupta6178 Před 8 měsíci +1

    Well explained 👍💯

  • @shweta_sharma172
    @shweta_sharma172 Před 3 lety +1

    superb 👍👍

  • @Mohit_mk_
    @Mohit_mk_ Před 2 lety +2

    Superb ♥️

  • @premcontact3230
    @premcontact3230 Před 3 lety +1

    If someone agree and give his concent through email but no signature on agreement is this considered as valid document?

  • @kishangautam1321
    @kishangautam1321 Před 3 lety +1

    U r to good bhai ....❤️

  • @rutujapandule1360
    @rutujapandule1360 Před rokem +1

    Before teaching us our teacher learns from ur video then teach us ..... :)

  • @syedasyed2688
    @syedasyed2688 Před 2 lety +2

    kindly sir upload the lecture on Arbitrated Digital Signature ...

  • @ddr_hritik5823
    @ddr_hritik5823 Před 2 lety +2

    Can you share your notes of all encryption series???

  • @umer6946
    @umer6946 Před rokem +1

    *Great*

  • @sumasri606
    @sumasri606 Před 2 lety +1

    Good explanation liked it can u plz explain about elliptical curve digital signature algorithm......

  • @angelahir8037
    @angelahir8037 Před 3 lety +1

    Very important information you will get

    • @angelahir8037
      @angelahir8037 Před 3 lety

      Kya hum project me use kr sakte he apka knowledge?

  • @garima2128
    @garima2128 Před rokem

    Can u plz make the vdo of kerberos encryption using non-cryptographic tools

  • @shekhar2784
    @shekhar2784 Před rokem +1

    Can we get PDFs? Of your lecture notes

  • @statsgurru5758
    @statsgurru5758 Před rokem

    Bhaiya apne jo general copect ka diagram banaya usme aapne Singing algo toh use he nahi kiya
    toh vo digital signature ka general concept kese hua?

  • @saikun0293
    @saikun0293 Před 4 lety +1

    Even the message also changes right if some hacker attacks.....why will it be the same? @7:53

  • @RishiKumar-tv4jk
    @RishiKumar-tv4jk Před 3 lety

    Agr beech me message alter hua hai to last step me message ko hash function me daalne pr jo hash aaya aur jo first step me message ko hash function me dalne pr hash aaya tha, vo same kse hoga jb message hi change hogya ??

  • @geetikagupta2745
    @geetikagupta2745 Před rokem +12

    If public key is used to decrypt then intruders can attack during transmission because public key can be known to others also..so what is the use of encryption here if you could answer?

    • @khai-vq5hn
      @khai-vq5hn Před 6 měsíci +2

      ya he made blunder out there

    • @shaheryarahmed5151
      @shaheryarahmed5151 Před měsícem

      I think the encryption he is talking about is not about the message,its about the signature. Only sender (let's say A) can create his signature so private key makes sense,anyone can verify that signature belongs to A so public key of A can be used

  • @graphic_designer35
    @graphic_designer35 Před rokem

    JAZAK ALLAH sir

  • @dhaneshpt8641
    @dhaneshpt8641 Před 9 měsíci +1

    Thank you..

  • @himanshugrd
    @himanshugrd Před rokem +1

    Can we get PDFs Of your lecture notes?

  • @lovesingh5105
    @lovesingh5105 Před 3 lety

    Thank you

  • @nikhilchoudhary4705
    @nikhilchoudhary4705 Před 3 měsíci

    msg aur hash dono ko kyu encrypt krenge, only hash ko encrypt krenge na using private key of A ?

  • @vinod420786
    @vinod420786 Před rokem

    thank you sir

  • @jayanthts5198
    @jayanthts5198 Před 2 lety

    bhai jaan bacha liya yaar
    tmro is my end sem exam and this video stopped my cry

  • @gulamsarwar609
    @gulamsarwar609 Před 2 lety +2

    Bro, can u share your book's PDF file?

  • @samandeepkaur691
    @samandeepkaur691 Před rokem

    Please make video on hyperelliptic curve cryptography

  • @utkarshdubey4130
    @utkarshdubey4130 Před 3 lety +1

    Bhai mcqs hr topic pr btado.. Bca final year is mcqs based this time

  • @khusbusahu5881
    @khusbusahu5881 Před 2 lety +2

    Your videos are very helpful to us....thank you... 😊

  • @IamSkyLight
    @IamSkyLight Před 3 lety +5

    in your earlier video of Hash/MAC Function, you didn't mention anything about Integrity. Could you confirm if in any scenario (that you discussed) we would be achieving integrity along with authentication and confidentially?

    • @user-gs5kv2ms3l
      @user-gs5kv2ms3l Před 9 měsíci

      There is the concept of message integrity basis where the message will have the digest if the digest matches the public key of the receiver then the integrity of the message is achieved

  • @gautamsingh9104
    @gautamsingh9104 Před 7 měsíci

    Bhai digital signature ka koi mathematical base example nhi h ky?

  • @sumitbhatt3715
    @sumitbhatt3715 Před 4 lety +1

    Sir app word expand algorithm of rsa ma ek video bna do plxx

  • @user-gs5kv2ms3l
    @user-gs5kv2ms3l Před 9 měsíci +2

    To everyone who is asking about hw we can decrypt the data using the public key. To validate the data's integrity, the recipient first uses the signer's public key to decrypt the digital signature. The recipient then uses the same hashing algorithm that generated the original hash to generate a new one-way hash of the same data.

  • @dheerajsahu4547
    @dheerajsahu4547 Před 9 měsíci

    Vha hash/message ki place pr cipher aayega after encryption

  • @sweta3345
    @sweta3345 Před 3 měsíci

    kya ap oo book author ka name bata sakte hoo ?

  • @geopluse6336
    @geopluse6336 Před 9 měsíci

    kon sa book use karo rahai ho ??

  • @divakar_alig8781
    @divakar_alig8781 Před 3 lety +1

    Sir can you send the notes of cryptography

  • @manasbanjare3198
    @manasbanjare3198 Před rokem

    kass app digital certificate ka bhi bana dete itna aacha sabhji video banate ho aap

  • @pragatisahu4355
    @pragatisahu4355 Před rokem

    Aapne HMAC ki video nhi dali hai kya

  • @anshukumari109
    @anshukumari109 Před 2 lety

    Digital signature bs itna hi h?...sir mjhe Google doc, e-mail, social media handle k classes mil skte h

  • @joydeepbhattacharjee5305
    @joydeepbhattacharjee5305 Před 3 lety +6

    well i'm a bit confused ..as per my knowledge we encrypt data using public key and decrypt data with private key...then why the reverse is being done here?? please explain

    • @joydeepbhattacharjee5305
      @joydeepbhattacharjee5305 Před 3 lety

      @@girisharora945 okk thanks

    • @quotes_man108
      @quotes_man108 Před 2 lety

      Brother it's for authentication Authentication is received if A decrypts with his own private key if a done with b public key then it's not authentic that A send mssg because B public key is all over on Internet

  • @cst001anantharajd2
    @cst001anantharajd2 Před rokem

    Can you solve sums based on this

  • @irfanshaik1302
    @irfanshaik1302 Před 3 lety +1

    bhai....🙏🏻🙏🏻...bachaliya tumne 😪😭

  • @nagamaruthitubati0305
    @nagamaruthitubati0305 Před 3 lety +1

    Sir can you please explain the video in English also ..

  • @alapandas3538
    @alapandas3538 Před 2 lety

    Public key is in encryption and lrivate key in decryption

  • @prodiptamondal1758
    @prodiptamondal1758 Před 3 lety +4

    Any user will have the public key of A, so how the confidentiality will be maintained for second case?

    • @nayanyadav5005
      @nayanyadav5005 Před 2 lety +8

      He missed....
      let me help you (if this exact question u r asking)
      suppose, A as Sender B as Reciever,
      obviously, A has some plain text (PT)
      private key of A (PrKA) and public key of A(PuKA)
      private key of B (PrKB) and public key of B(PuKB)
      {Note---> PuKA ( PrKA =None OR we can say they can cancel one another}..............................................................................(NOTE)
      Now the game begins....
      A--> PT --> PrKA (PT)--> PuKB (PrKA (PT))
      Now (PuKB (PrKA (PT))) becomes a Free Electron and only B can get it.
      now,B has a Free electron, and his private key(PrKB) also.
      B -->PrKB ( PuKB (PrKA (PT)))
      B-->PrKA(PT)......... .............................................(from NOTE)
      Now B goes to google and asks for Public key of A
      B-->PuKA(PrKA(PT))
      B--> (PT)......................................... (from NOTE)
      Hurrah!!!!!!!
      (Pls let me know the feedback, I will erase it otherwise)

  • @CareerWithTech
    @CareerWithTech Před 3 lety +2

    encryption is done through public key
    decryption is done through private key

  • @poojayadav9821
    @poojayadav9821 Před 3 lety +1

    Digital copyrights and search engine pe apne video upload ki h kya sir? If yes then please provide me that link.

  • @purnimagahlot83
    @purnimagahlot83 Před 4 lety +1

    Synopsis kese bnai jati a

  • @vlogplanet5536
    @vlogplanet5536 Před 2 lety +1

    Can you share the notes

  • @mehaksaxena866
    @mehaksaxena866 Před 4 lety +4

    I have a ques sir.. i studied somewhere that we should encrypt the msg with the help of public key of receiver and receiver will decrypt it with his private key to maintain confidentiality but here you said the opposite. I know you said there is no use of confidentiality but still its a doubt. What key should we use to encrypt a msg and vice versa. HOPE YOU WILL REPLY.

    • @AbhishekSharmaDit
      @AbhishekSharmaDit  Před 4 lety +5

      In normal situations it is ok but in digital signature concept we will have to ise the private key of the sender so that hame pata chal sake ki ha yahi banda i.e. sender h jo hame msh bhejra h

    • @AbhishekSharmaDit
      @AbhishekSharmaDit  Před 4 lety +3

      To encrypt the msg we will use hash function concept along with digital signature
      Aage series follow karo sab clear hota jayega

    • @mitulzala6976
      @mitulzala6976 Před 2 lety +1

      10:00

  • @sumitrasar6204
    @sumitrasar6204 Před rokem

    You force me to comment yar! Dam clear all doubt of mine .

  • @syedrakeen7759
    @syedrakeen7759 Před rokem

    Sur can u provide a note for this question for 15 marks!

  • @hamzaalvi3599
    @hamzaalvi3599 Před 3 lety +2

    Why we are using private key of A for encryption ???

    • @nidhijaswani2930
      @nidhijaswani2930 Před 3 měsíci

      It must be public key of B? Correct me if I am wrong

  • @kandukurianjani7852
    @kandukurianjani7852 Před 3 lety

    Please sir.. explain the video English to English all videos

  • @bestshorts_rk2342
    @bestshorts_rk2342 Před rokem

    WHAT IS Digital 33 Signature ?????

  • @vishalmodi5469
    @vishalmodi5469 Před 3 lety

    Please provide notes any video

  • @techhackz2897
    @techhackz2897 Před rokem

    11:57 your using private key of user-A. So, anyone with public key of user-A can decrypt the message and get the msg and hash
    So, how are we achieving confidentiality here.
    And in the last fig @ 12:50 we achieved confidentiality, non-repudiation and integrity.

  • @himachalivloggershipali6299

    Kya apne tcp congestion control algo PE video bnaii haii btaa do

  • @digitalbb1893
    @digitalbb1893 Před 3 lety

    A k public key kahase milega bhai....A ko pblic key v B ko bhejna parega kya?

    • @mr.pranjul_01
      @mr.pranjul_01 Před 3 lety

      Nhi public key toh public hai wo sbko pata hoti hai

  • @poojasankpal9046
    @poojasankpal9046 Před rokem

    Please short me thoda slow explain kare sir

  • @Singham_here
    @Singham_here Před rokem

    It's public key in Encryption

  • @meetkakadia3404
    @meetkakadia3404 Před 2 lety

    yahh

  • @user-ti7jb6xp4n
    @user-ti7jb6xp4n Před 2 měsíci

    But A public key know to everyone so theere is no confidentiality anyone can acess A message

  • @navyajyoti7920
    @navyajyoti7920 Před rokem

    Encryption is a public key and decryption is private key

    • @centerwing2101
      @centerwing2101 Před rokem

      No, Private key is used for encryption and public key for decryption

  • @siddhantsingh6578
    @siddhantsingh6578 Před 3 lety

    How do IAS officers do digital signature?

  • @whois2517
    @whois2517 Před 2 lety

    Ycce gang wya

  • @nischayrawat6216
    @nischayrawat6216 Před 3 lety

    bro concept clear krke btao or har part ko alag alag krke, or yaha waha ye wo shbd mat istmaal kiya kro, kuch clear ni hota,

  • @shivanisahu949
    @shivanisahu949 Před 4 lety

    Are you from Dehradun?

  • @sumitbhatt3715
    @sumitbhatt3715 Před 4 lety +1

    Bhai itna acha video bna ra ho full support ha aapko keep doing the good work . Jo like support ni kar ra chutiya ha

  • @iamgood3406
    @iamgood3406 Před 3 lety

    It's would better that if u did this video in English... there will be people who doesn't know hindhi how can they know??????

  • @touseefsultan
    @touseefsultan Před 3 lety

    Bolny ki speed thori km krlo bss

  • @arjunbunny5424
    @arjunbunny5424 Před 3 lety

    Sir thoda dhire baat kro.....itni jldi jldi kyo boltey ho🙄

  • @SR-jr7bh
    @SR-jr7bh Před 4 měsíci

    Going too fast,for a teacher.

  • @mohammadfareed9482
    @mohammadfareed9482 Před rokem +1

    Bht galat tarike se samjhya hai 😂😂

  • @pakistankikiran481
    @pakistankikiran481 Před 11 měsíci

    Public key encrypt karta and private key decryp🤦‍♀️

  • @thelmarodrigues5774
    @thelmarodrigues5774 Před 3 lety

    Thank you