Asymmetric Key Cryptography ll Information and Cyber Security Course Explained in Hindi

Sdílet
Vložit
  • čas přidán 8. 09. 2024
  • Myself Shridhar Mankar a Engineer l CZcamsr l Educational Blogger l Educator l Podcaster.
    My Aim- To Make Engineering Students Life EASY.
    Website - 5minutesengine...
    5 Minutes Engineering English CZcams Channel - / @5minutesengineeringen...
    Instagram - www.instagram....
    A small donation would mean the world to me and will help me to make AWESOME videos for you.
    • UPI ID : 5minutesengineering@apl
    Playlists :
    • 5 Minutes Engineering Podcast :
    • 5 Minutes Engineering ...
    • Aptitude :
    • Aptitude
    • Machine Learning :
    • Machine Learning
    • Computer Graphics :
    • Computer Graphics
    • C Language Tutorial for Beginners :
    • C Language Tutorial fo...
    • R Tutorial for Beginners :
    • R Tutorial for Beginners
    • Python Tutorial for Beginners :
    • Python Tutorial For Be...
    • Embedded and Real Time Operating Systems (ERTOS) :
    • Embedded and Real Time...
    • Shridhar Live Talks :
    • Shridhar Live Talks
    • Welcome to 5 Minutes Engineering :
    • Welcome To 5 Minutes E...
    • Human Computer Interaction (HCI) :
    • Human Computer Interac...
    • Computer Organization and Architecture :
    • Computer Organization ...
    • Deep Learning :
    • Deep Learning
    • Genetic Algorithm :
    • Genetic Algorithm
    • Cloud Computing :
    • Cloud Computing
    • Information and Cyber Security :
    • Information And Cyber ...
    • Soft Computing and Optimization Algorithms :
    • Soft Computing And Opt...
    • Compiler Design :
    • Compiler Design
    • Operating System :
    • Operating System
    • Hadoop :
    • Hadoop
    • CUDA :
    • CUDA
    • Discrete Mathematics :
    • Discrete Mathematics
    • Theory of Computation (TOC) :
    • Theory Of Computation ...
    • Data Analytics :
    • Data Analytics
    • Software Modeling and Design :
    • Software Modeling And ...
    • Internet Of Things (IOT) :
    • Internet Of Things (IOT)
    • Database Management Systems (DBMS) :
    • Database Management Sy...
    • Computer Network (CN) :
    • Computer Networks (CN)
    • Software Engineering and Project Management :
    • Software Engineering A...
    • Design and Analysis of Algorithm :
    • Design And Analysis Of...
    • Data Mining and Warehouse :
    • Data Mining and Warehouse
    • Mobile Communication :
    • Mobile Communication
    • High Performance Computing :
    • High Performance Compu...
    • Artificial Intelligence and Robotics :
    • Artificial intelligenc...

Komentáře • 156

  • @shivam-dua
    @shivam-dua Před 5 lety +68

    This is how everything should be taught. short and precise. Thank You !

  • @riderannu740
    @riderannu740 Před 4 měsíci +2

    Gajab sir mare 3yr ki it course sirf apki video ki waja sa safal hu lot of thnx ❤

  • @MemeGlimpse
    @MemeGlimpse Před 5 lety +31

    Sir I just completed 12 class and I have a interest in cyber security so I daily watch your videos it's really helpful for me........
    Thank you so much for giving us your precious time
    - Nishant Tiwari

  • @VickysWeb
    @VickysWeb Před 2 lety +9

    Watching this full playlist just 3 hrs before my CSS exam in 2x and it is really useful
    Thanks a lot

    • @kapil.9
      @kapil.9 Před 9 měsíci +1

      us moment 🤝

  • @gurmeetsingh8321
    @gurmeetsingh8321 Před 4 lety +3

    Thanks sir is video se sari confusion dur ho gyi

  • @dienzer9098
    @dienzer9098 Před 9 měsíci +2

    we are all the same. a day or two, (for me 3 days) before exam, we all come to this channel

  • @dhruvilpatel2886
    @dhruvilpatel2886 Před 3 lety +1

    Sir fabulous good work i attend your all class
    In this time our exam is come if your video is not on youtube then we can not understand network security in very easy way heartly thanks a lot.....

  • @RakeshKumar-gk3xk
    @RakeshKumar-gk3xk Před rokem +1

    Sirf itna hi kahna chahunga sir....
    Love you Sir ❤️🤗

  • @fatimaiqra2169
    @fatimaiqra2169 Před rokem +1

    quick and easy way....thanks

  • @vedbhanushali5705
    @vedbhanushali5705 Před 9 měsíci +1

    Aap bhagwaan ho sir❤ Thank you so much🎉

  • @maxpayne880
    @maxpayne880 Před 5 lety +5

    Thank you sir...please try to cover RSA,Diffie Hellman,ECC,key distribution, Authentication methods,Authentication protocol,Digital signatures

  • @muditmathur2078
    @muditmathur2078 Před 5 lety +2

    Bhot jordar sir kal mere exam hai aur aapke lecture ne doubts clear kr diye

  • @nisharathod175
    @nisharathod175 Před 4 lety +3

    Thank you sooooooooooooo much for this video sir.this video is very helpful for my exam😊

  • @jahnviarora8858
    @jahnviarora8858 Před 2 lety +3

    The only video where I could understand the concept ! Hatts off sir ! Thank you

  • @sufiyafatimakhan7301
    @sufiyafatimakhan7301 Před 3 lety +2

    ur technique of teaching is commendable ...... hats off!!!

  • @cloudyyoutube9844
    @cloudyyoutube9844 Před rokem +1

    Thanku so much sir easily understood.

  • @patelyash530
    @patelyash530 Před 5 lety +11

    thank you so much sir! by watching ur videos on INS, i learned a lot of topics easily! just because of you i scored AA in my externals in my 7th sem of comp. engg. exam!
    please upload more videos on AI, since i have AI as a main sub. in my final sem!

  • @manavjoshi3053
    @manavjoshi3053 Před 4 lety +1

    Sir fabulous good work i attend your all class
    In this time our exam is come if your video is not on youtube then we can not understand network security in very easy way heartly thanks 😊

  • @vijaysherkhane1437
    @vijaysherkhane1437 Před 3 lety +3

    Guys 169 subscribers but only 2.2k likes....common he deserves more much more.....lots of love....Vijay

  • @SRam2468
    @SRam2468 Před 3 lety +1

    Super explaination bai! Thank u 😊

  • @armanalirahul
    @armanalirahul Před 4 lety +1

    thanks sir .....for video its totally understandable video and your mentos dialogue its awesome dialogue help me in mind fresh ....thank you sir

  • @VishalParmar-nq4cu
    @VishalParmar-nq4cu Před 5 lety +5

    Great job sir. Thank you so much for sharing your knowledge

  • @amitprajapati4364
    @amitprajapati4364 Před 4 lety +3

    You are a great sir ..!
    The way you explaining it's easy to understand for everyone even that person's who doesn't know any thing like nothing !
    Once again thanks 🙂

  • @bishnulimbu5499
    @bishnulimbu5499 Před 2 lety +1

    Thank you sir... Love from Nepal♥️♥️

  • @mussuDIYcrafts07
    @mussuDIYcrafts07 Před 4 lety +1

    Awesome teaching sir... Tussi Genious Ho😊

  • @ASh-hb1ub
    @ASh-hb1ub Před 3 lety +1

    Many thanks to our Shridhar sir for this good video..👌👌👏👏👍👍🧡🧡💙💙💜💜💛💛❣❣💖💖⚘⚘🌸🌸💐🌻💐🌻

  • @sreejeshstark7018
    @sreejeshstark7018 Před 5 lety +2

    Your explanation is asome,... Too good sir

  • @shubhamvishwakarma9300
    @shubhamvishwakarma9300 Před 5 lety +3

    sir you explain too good. i a understanding all the things whatever you are uploading.

  • @TheAppAlchemist
    @TheAppAlchemist Před 2 lety +1

    thanks for makeing me understand this,
    please don't repeat yourself

  • @KA-oi4yf
    @KA-oi4yf Před 2 lety +1

    Amazing explanation sir 👏

  • @deepakgaroda975
    @deepakgaroda975 Před 3 lety +1

    Thank you so much sir for easy explain Karne k liye 😊

  • @shefalichauhan3310
    @shefalichauhan3310 Před rokem +1

    You explained so clearly!!

  • @SaileeShingare
    @SaileeShingare Před 3 lety +1

    Great explanation. Thank you sir

  • @kshitijbarapatre6276
    @kshitijbarapatre6276 Před rokem +1

    6:28 chotta was great

  • @wildyato3737
    @wildyato3737 Před 4 lety +1

    Asymmetric encryption example of modem changing analog to digital and vice versa (I know this video is not one of them, it's my point of view)
    Also it is better than symmetric encryption

  • @fabe-mr5cl
    @fabe-mr5cl Před 5 lety +2

    great sir thanks alot ..............................

  • @kushpatel4811
    @kushpatel4811 Před 2 lety +1

    Jordar sir 👍👍

  • @technicalvines3360
    @technicalvines3360 Před 5 lety +3

    Great Explanation Sir

  • @sapnabhalekar83
    @sapnabhalekar83 Před 5 lety +2

    Thank you so much sir
    It's really helpful for exam 😊

  • @jyotipund1813
    @jyotipund1813 Před 4 lety +1

    Thank u sir.. Ur explanation is very understandable..keep it up👍

  • @PUZZLE__PROGRAMMER
    @PUZZLE__PROGRAMMER Před 4 lety +1

    Thank You sir. ❤️❤️❤️❤️❤️❤️❤️❤️❤️❤️❤️❤️❤️❤️❤️❤️❤️❤️❤️❤️❤️❤️❤️❤️❤️

  • @Itsmeyouranimelover
    @Itsmeyouranimelover Před 5 lety +2

    love the way u teach

  • @syednoorkalim7424
    @syednoorkalim7424 Před rokem

    Excellent training

  • @unknownyt3144
    @unknownyt3144 Před rokem

    Omg! Too good sir!!!

  • @NidhiSingh-em8pf
    @NidhiSingh-em8pf Před 5 lety +5

    Thnku so mch sir!! Sir u r amazing...the way u r teaching is awesome...sir, u r the jitu bhaiya of Kota factory 😊

  • @SK-mt2wb
    @SK-mt2wb Před rokem +1

    jazallahu khair

  • @poojapatidar6787
    @poojapatidar6787 Před 4 lety +1

    Osam sir

  • @konanaznin6469
    @konanaznin6469 Před 3 lety +1

    Sir can you make videos on Hash function Cryptography in details .That will be very helpful.

  • @nehajoshi6460
    @nehajoshi6460 Před 3 lety +1

    Very nicely explained

  • @Mycreatop
    @Mycreatop Před rokem

    Best explanation 👍

  • @AmitProgue28
    @AmitProgue28 Před 3 lety

    Verrrrryyyyy simple and lucid

  • @abhinavmishra5334
    @abhinavmishra5334 Před 2 lety

    Nice video very helpful

  • @djprithvi5761
    @djprithvi5761 Před rokem

    Thanks sir, now pls explain elliptic curve cryptography...

  • @md.abdulmonemsarker3711
    @md.abdulmonemsarker3711 Před 4 lety +1

    Thanks sir..❤❤

  • @Vishalsharma-cn2nx
    @Vishalsharma-cn2nx Před 2 lety

    Too good 👍

  • @deepgajera1006
    @deepgajera1006 Před 4 lety +1

    Aagar privat key sif reciever ko hi pata he to sender ause encrypt kese kare ga
    Quki for encryption and decryption same key is used
    A
    Otherwise it is impossible to encrypt and decrypt

  • @sudhanshupal4427
    @sudhanshupal4427 Před 5 lety +1

    Thanks a lot Sir !!!

  • @SD_CHeerta
    @SD_CHeerta Před 4 lety +1

    Love the way he teach

  • @chaitanyabansode1783
    @chaitanyabansode1783 Před 3 lety

    Very good👍👍👍

  • @siddharthvadakkedath6616
    @siddharthvadakkedath6616 Před 4 lety +1

    Sirji🙏

  • @InspiringthePlanet
    @InspiringthePlanet Před 4 lety

    Public key of sender is sent by receiver to sender. It is not the public key of sender. Receiver ke private key corresponds to his own public key not to the public key of sender.

  • @gouthamv2109
    @gouthamv2109 Před 3 lety +1

    Private key used in decryption process, how can it correlation with the cipher text, how can he open the message as the private key is not shared

  • @avisahani8637
    @avisahani8637 Před 5 lety +2

    Thank you sir

  • @lalatenduguru8121
    @lalatenduguru8121 Před 6 měsíci +1

    chottey...btw i love you bro

  • @ashutoshgupta2127
    @ashutoshgupta2127 Před 4 lety

    Best video

  • @deeprattan3781
    @deeprattan3781 Před 2 lety

    Awesome explanation..

  • @easy_life345
    @easy_life345 Před 5 lety

    sir you are amazing big salute from pakistan

  • @harshalohana4958
    @harshalohana4958 Před 2 lety

    Encryption key hoti hai vo always decryption key ki reverse hi hogi na to public key ki oposite private hogi. To agar public key sab ko pata hoga to uska reverse karke attack kr sakta hai n. ?

  • @afridis3779
    @afridis3779 Před 4 lety

    SAABASH ! 😎😎😎. Thank you sir

  • @nazishsultana5273
    @nazishsultana5273 Před 4 lety +1

    😊😍🤗🤗 Allah bless you 😇❣️

  • @JayPatel-qe9sd
    @JayPatel-qe9sd Před 5 lety +1

    Digital signature and asymmetric are using public key in opposite parts ???????

  • @aneeschughtai6725
    @aneeschughtai6725 Před 2 lety

    Thank u so much sir

  • @kdsouza4507
    @kdsouza4507 Před rokem

    Thank you

  • @tayyabhassan1529
    @tayyabhassan1529 Před 4 lety

    Good. Really Helpful

  • @usamashafique6540
    @usamashafique6540 Před 5 lety +1

    Thanks alot sir

  • @subhashreepr7601
    @subhashreepr7601 Před 3 lety +1

    Agar attacker ke pass receiver ki public key hai and encrypted message vi hai to wo kya decide nehi kar sakta hai ki aisa kounsa msg hai jisko wo receiver ka public key lagane me ye encrypted msg aya hai?

  • @devendrabhuarya4917
    @devendrabhuarya4917 Před rokem

    Thanks 🙏🙏

  • @begooddogood9898
    @begooddogood9898 Před 5 lety

    Sir
    I have one doubt for studying cyber security course ur saying full about cryptography..
    Actually you have say abt Linux usage, Metasploitable 2 tools na
    Reply me if possible sir
    And Also say me which topics I have to cover the cyber security

  • @mdtipusultan327
    @mdtipusultan327 Před 4 lety

    sir.... In "Network Security Model II video" U said that key are provide by Trust third party (TTP).
    but in this video u are saying that sender and receiver should have own public and private key.
    please explain sir ................

  • @shashantchaudhary5636
    @shashantchaudhary5636 Před 4 lety

    Sir agr ap notes bhi bnwate to kafi help ho jti exam ke liye notes banane mee

  • @ashwanirajput4281
    @ashwanirajput4281 Před rokem

    Thanks

  • @Raj-rw2fk
    @Raj-rw2fk Před 4 lety

    osm explanation sir thank u

  • @sheikhshoab4124
    @sheikhshoab4124 Před 5 lety

    Ty sir .....MAC algorithm study kara do

  • @sivaprasadsivanandan650
    @sivaprasadsivanandan650 Před 4 lety +3

    if sending through public key how the receiver decrypt using private key

    • @samarjitdebnath5996
      @samarjitdebnath5996 Před 3 lety +1

      There's a protocol, that's like for a particular user Public & Private keys are related by some relations and they're known as Key companions. So, if sender A is using sender B's Public key to encrypt a plain text, then B will use its private key to decrypt the message(as there's is a relation between the Public-Private key of the same user).

  • @sohamvirda7914
    @sohamvirda7914 Před 4 lety

    Grate job sir...

  • @aakibmajeed6687
    @aakibmajeed6687 Před 4 lety

    Sir do mention why's and how's of the topic ,☺

  • @varunpratap6785
    @varunpratap6785 Před 4 lety

    Best explanation

  • @SportsGala-ks2xp
    @SportsGala-ks2xp Před 9 měsíci

    Goood sir

  • @prashantthakur5698
    @prashantthakur5698 Před 5 lety

    Sir how the keys r shared plz tell and one more question agr koi attacked vo poory chipher data ko change krky apna data daal de fir kya hoga.... Ya fir aisa ho skta h..

  • @naveenrawal9594
    @naveenrawal9594 Před 4 lety

    sir agar public key use kar ke enycriotion use kiya jata hai or private se decrypt kiya jata hai to iska matlab hai ki public or private key mein kuch to same hoga na suppose mein aap ko ek mesg bejta hoin hello encrypt kar ke sender ki public key key ke through to aap use private ke through decrypt kaise kar sakte ho .

  • @baqri14
    @baqri14 Před rokem

    Kindly, tell if an intruder has sent a msg to the receiver while using the public key of B on behalf of Sender. So, in this case, confidentially will affect?

    • @PatilAdi
      @PatilAdi Před 9 měsíci

      Digital Signature can be used to verify the sender’s identity

  • @hardiksingh4956
    @hardiksingh4956 Před 4 lety

    Nice work!

  • @cricket_dhamaka_
    @cricket_dhamaka_ Před rokem

    Mentos seles after this video 📈

  • @arvindchauhan5214
    @arvindchauhan5214 Před 3 lety

    Sir, digital signature me thik iska Ulta key use HOTA hai kya

  • @shaheennizam1680
    @shaheennizam1680 Před 4 lety

    Bro u are joss 😍 from 🇧🇩🇧🇩

  • @nazarmohammadziarmal3941

    amazing sir

  • @vatsalkachhiya5796
    @vatsalkachhiya5796 Před 4 lety +3

    Mentos khata rahega dimag ki batti jlata rhega 😂😂

  • @madmen9577
    @madmen9577 Před 2 lety +1

    Why Can't the attacker decrypt the encrypted message(encrypted using R's public key) using R's public key?

    • @shreypatel_
      @shreypatel_ Před 2 lety +1

      It will try to do it using the public key but it can't get the private key from the other side so it can't spoil anything. If you understand then like my comment ♥️.

  • @codeattraction2070
    @codeattraction2070 Před 4 lety

    Thanks a lot

  • @devan9718
    @devan9718 Před 2 lety

    So what is the use of sender private key and public key in it.i'm not getting it