Asymmetric Key Cryptography ll Information and Cyber Security Course Explained in Hindi
Vložit
- čas přidán 8. 09. 2024
- Myself Shridhar Mankar a Engineer l CZcamsr l Educational Blogger l Educator l Podcaster.
My Aim- To Make Engineering Students Life EASY.
Website - 5minutesengine...
5 Minutes Engineering English CZcams Channel - / @5minutesengineeringen...
Instagram - www.instagram....
A small donation would mean the world to me and will help me to make AWESOME videos for you.
• UPI ID : 5minutesengineering@apl
Playlists :
• 5 Minutes Engineering Podcast :
• 5 Minutes Engineering ...
• Aptitude :
• Aptitude
• Machine Learning :
• Machine Learning
• Computer Graphics :
• Computer Graphics
• C Language Tutorial for Beginners :
• C Language Tutorial fo...
• R Tutorial for Beginners :
• R Tutorial for Beginners
• Python Tutorial for Beginners :
• Python Tutorial For Be...
• Embedded and Real Time Operating Systems (ERTOS) :
• Embedded and Real Time...
• Shridhar Live Talks :
• Shridhar Live Talks
• Welcome to 5 Minutes Engineering :
• Welcome To 5 Minutes E...
• Human Computer Interaction (HCI) :
• Human Computer Interac...
• Computer Organization and Architecture :
• Computer Organization ...
• Deep Learning :
• Deep Learning
• Genetic Algorithm :
• Genetic Algorithm
• Cloud Computing :
• Cloud Computing
• Information and Cyber Security :
• Information And Cyber ...
• Soft Computing and Optimization Algorithms :
• Soft Computing And Opt...
• Compiler Design :
• Compiler Design
• Operating System :
• Operating System
• Hadoop :
• Hadoop
• CUDA :
• CUDA
• Discrete Mathematics :
• Discrete Mathematics
• Theory of Computation (TOC) :
• Theory Of Computation ...
• Data Analytics :
• Data Analytics
• Software Modeling and Design :
• Software Modeling And ...
• Internet Of Things (IOT) :
• Internet Of Things (IOT)
• Database Management Systems (DBMS) :
• Database Management Sy...
• Computer Network (CN) :
• Computer Networks (CN)
• Software Engineering and Project Management :
• Software Engineering A...
• Design and Analysis of Algorithm :
• Design And Analysis Of...
• Data Mining and Warehouse :
• Data Mining and Warehouse
• Mobile Communication :
• Mobile Communication
• High Performance Computing :
• High Performance Compu...
• Artificial Intelligence and Robotics :
• Artificial intelligenc...
This is how everything should be taught. short and precise. Thank You !
Gajab sir mare 3yr ki it course sirf apki video ki waja sa safal hu lot of thnx ❤
Sir I just completed 12 class and I have a interest in cyber security so I daily watch your videos it's really helpful for me........
Thank you so much for giving us your precious time
- Nishant Tiwari
hello abhi kiya kr rahe ho
@@how__geography__looks__like__ 😂😂🤣🤣
Watching this full playlist just 3 hrs before my CSS exam in 2x and it is really useful
Thanks a lot
us moment 🤝
Thanks sir is video se sari confusion dur ho gyi
we are all the same. a day or two, (for me 3 days) before exam, we all come to this channel
Sir fabulous good work i attend your all class
In this time our exam is come if your video is not on youtube then we can not understand network security in very easy way heartly thanks a lot.....
Sirf itna hi kahna chahunga sir....
Love you Sir ❤️🤗
quick and easy way....thanks
Aap bhagwaan ho sir❤ Thank you so much🎉
Thank you sir...please try to cover RSA,Diffie Hellman,ECC,key distribution, Authentication methods,Authentication protocol,Digital signatures
Bhot jordar sir kal mere exam hai aur aapke lecture ne doubts clear kr diye
Thank you sooooooooooooo much for this video sir.this video is very helpful for my exam😊
The only video where I could understand the concept ! Hatts off sir ! Thank you
ur technique of teaching is commendable ...... hats off!!!
Thanku so much sir easily understood.
thank you so much sir! by watching ur videos on INS, i learned a lot of topics easily! just because of you i scored AA in my externals in my 7th sem of comp. engg. exam!
please upload more videos on AI, since i have AI as a main sub. in my final sem!
Sir fabulous good work i attend your all class
In this time our exam is come if your video is not on youtube then we can not understand network security in very easy way heartly thanks 😊
Guys 169 subscribers but only 2.2k likes....common he deserves more much more.....lots of love....Vijay
Super explaination bai! Thank u 😊
thanks sir .....for video its totally understandable video and your mentos dialogue its awesome dialogue help me in mind fresh ....thank you sir
Great job sir. Thank you so much for sharing your knowledge
You are a great sir ..!
The way you explaining it's easy to understand for everyone even that person's who doesn't know any thing like nothing !
Once again thanks 🙂
Thank you sir... Love from Nepal♥️♥️
Awesome teaching sir... Tussi Genious Ho😊
Many thanks to our Shridhar sir for this good video..👌👌👏👏👍👍🧡🧡💙💙💜💜💛💛❣❣💖💖⚘⚘🌸🌸💐🌻💐🌻
Your explanation is asome,... Too good sir
sir you explain too good. i a understanding all the things whatever you are uploading.
thanks for makeing me understand this,
please don't repeat yourself
Amazing explanation sir 👏
Thank you so much sir for easy explain Karne k liye 😊
You explained so clearly!!
Great explanation. Thank you sir
6:28 chotta was great
Asymmetric encryption example of modem changing analog to digital and vice versa (I know this video is not one of them, it's my point of view)
Also it is better than symmetric encryption
great sir thanks alot ..............................
Jordar sir 👍👍
Great Explanation Sir
Thank you so much sir
It's really helpful for exam 😊
Thank u sir.. Ur explanation is very understandable..keep it up👍
Thank You sir. ❤️❤️❤️❤️❤️❤️❤️❤️❤️❤️❤️❤️❤️❤️❤️❤️❤️❤️❤️❤️❤️❤️❤️❤️❤️
love the way u teach
Excellent training
Omg! Too good sir!!!
Thnku so mch sir!! Sir u r amazing...the way u r teaching is awesome...sir, u r the jitu bhaiya of Kota factory 😊
Hehe... right 😁
Lmao noobs 😪
jazallahu khair
Osam sir
Sir can you make videos on Hash function Cryptography in details .That will be very helpful.
Very nicely explained
Best explanation 👍
Verrrrryyyyy simple and lucid
Nice video very helpful
Thanks sir, now pls explain elliptic curve cryptography...
Thanks sir..❤❤
Too good 👍
Aagar privat key sif reciever ko hi pata he to sender ause encrypt kese kare ga
Quki for encryption and decryption same key is used
A
Otherwise it is impossible to encrypt and decrypt
Thanks a lot Sir !!!
Love the way he teach
Very good👍👍👍
Sirji🙏
Public key of sender is sent by receiver to sender. It is not the public key of sender. Receiver ke private key corresponds to his own public key not to the public key of sender.
Private key used in decryption process, how can it correlation with the cipher text, how can he open the message as the private key is not shared
Thank you sir
chottey...btw i love you bro
Best video
Awesome explanation..
sir you are amazing big salute from pakistan
Encryption key hoti hai vo always decryption key ki reverse hi hogi na to public key ki oposite private hogi. To agar public key sab ko pata hoga to uska reverse karke attack kr sakta hai n. ?
SAABASH ! 😎😎😎. Thank you sir
😊😍🤗🤗 Allah bless you 😇❣️
Digital signature and asymmetric are using public key in opposite parts ???????
Thank u so much sir
Thank you
Good. Really Helpful
Thanks alot sir
Agar attacker ke pass receiver ki public key hai and encrypted message vi hai to wo kya decide nehi kar sakta hai ki aisa kounsa msg hai jisko wo receiver ka public key lagane me ye encrypted msg aya hai?
Thanks 🙏🙏
Sir
I have one doubt for studying cyber security course ur saying full about cryptography..
Actually you have say abt Linux usage, Metasploitable 2 tools na
Reply me if possible sir
And Also say me which topics I have to cover the cyber security
sir.... In "Network Security Model II video" U said that key are provide by Trust third party (TTP).
but in this video u are saying that sender and receiver should have own public and private key.
please explain sir ................
Sir agr ap notes bhi bnwate to kafi help ho jti exam ke liye notes banane mee
Thanks
osm explanation sir thank u
Ty sir .....MAC algorithm study kara do
if sending through public key how the receiver decrypt using private key
There's a protocol, that's like for a particular user Public & Private keys are related by some relations and they're known as Key companions. So, if sender A is using sender B's Public key to encrypt a plain text, then B will use its private key to decrypt the message(as there's is a relation between the Public-Private key of the same user).
Grate job sir...
Sir do mention why's and how's of the topic ,☺
Best explanation
Goood sir
Sir how the keys r shared plz tell and one more question agr koi attacked vo poory chipher data ko change krky apna data daal de fir kya hoga.... Ya fir aisa ho skta h..
sir agar public key use kar ke enycriotion use kiya jata hai or private se decrypt kiya jata hai to iska matlab hai ki public or private key mein kuch to same hoga na suppose mein aap ko ek mesg bejta hoin hello encrypt kar ke sender ki public key key ke through to aap use private ke through decrypt kaise kar sakte ho .
Kindly, tell if an intruder has sent a msg to the receiver while using the public key of B on behalf of Sender. So, in this case, confidentially will affect?
Digital Signature can be used to verify the sender’s identity
Nice work!
Mentos seles after this video 📈
Sir, digital signature me thik iska Ulta key use HOTA hai kya
Bro u are joss 😍 from 🇧🇩🇧🇩
amazing sir
Mentos khata rahega dimag ki batti jlata rhega 😂😂
Was In search of this comment😂😂😂
@@srushtibhujbal7111 engineering chal rhi hai na.
@@vatsalkachhiya5796 yes😂😭
Why Can't the attacker decrypt the encrypted message(encrypted using R's public key) using R's public key?
It will try to do it using the public key but it can't get the private key from the other side so it can't spoil anything. If you understand then like my comment ♥️.
Thanks a lot
So what is the use of sender private key and public key in it.i'm not getting it