ElGamal Cryptography in Hindi - Key Generation, Encryption, Decryption Step

Поделиться
HTML-код
  • Опубликовано: 3 дек 2024

Комментарии • 44

  • @shubhamarora6574
    @shubhamarora6574 5 лет назад +10

    awesome sir, please teach in colleges , you are much more qualified and better than many teachers of many colleges.

  • @thabokhabele8459
    @thabokhabele8459 5 лет назад +18

    i wish i knew hindi, the outline of the algorithm is well written and is easy to follow. ..

  • @mrugagodhasara2960
    @mrugagodhasara2960 2 года назад +2

    Thank you sir this is very helpful to me in my exam.... 🙂🙂🙂

  • @SaileeShingare
    @SaileeShingare 3 года назад +2

    Understood well. Thank you, sir

  • @Aaroh8289
    @Aaroh8289 11 месяцев назад

    Thank you Sir🎉

  • @lakshay510
    @lakshay510 6 лет назад +6

    Thanks sir, Please upload for CPA and CCA, Hash Functions(Tiger hash, Gear Hash) and make a playlist

    • @Lyricalmaster
      @Lyricalmaster 6 лет назад

      Bhai yo syllabus me h ?

    • @lakshay510
      @lakshay510 6 лет назад

      @@Lyricalmaster Haan Bhai Unit 3 m Public Key Crypto system m dekh

    • @tomtomdu97
      @tomtomdu97 2 года назад +1

      Kya tum log ye padkar bitcoin ki trah koi coin bana sakte ho

  • @pel513
    @pel513 5 лет назад +1

    Very nice, Thanks

  • @Nobitanobi1010
    @Nobitanobi1010 6 лет назад +1

    Sir make class 12 communication technologies playlist so that we can access all the lecture easily that is been uploaded at your channel

  • @geetanjalijangid876
    @geetanjalijangid876 2 года назад

    Your voice just like a my junior 🤣...

  • @saritha3957
    @saritha3957 11 месяцев назад +2

    Can anyone tell me why is it called second part of encryption not first part ?

  • @renukaushik7225
    @renukaushik7225 5 лет назад

    bohot hard !!!!!

  • @delilachannel4107
    @delilachannel4107 5 лет назад +2

    Thx sir,please sebd me coding elgamal algorithm make to java application😇

  • @nirmalbabu9570
    @nirmalbabu9570 5 лет назад

    Ak number

  • @codewithd6756
    @codewithd6756 5 лет назад

    Super handwriting....

  • @pathanmujahidulla3100
    @pathanmujahidulla3100 2 месяца назад

  • @simranbajaj8443
    @simranbajaj8443 5 лет назад

    Sir , if we use number other than prime number then will it give output????

    • @unnatikharate
      @unnatikharate Год назад

      This algorithm works for prime number only

  • @darshanpatel9131
    @darshanpatel9131 10 месяцев назад

    how will anna university understand in hindi Sir ?

  • @tomtomdu97
    @tomtomdu97 2 года назад

    Kya tum 1 crypto currency bana sakte ho

  • @freethinkers3680
    @freethinkers3680 5 лет назад +1

    sir dusra page lekr smjhatey.....

  • @freethinkers3680
    @freethinkers3680 5 лет назад +1

    sir mod kaise solve kiya h?

    • @Deepak.Dahiya
      @Deepak.Dahiya 5 лет назад +3

      "a mod b" means remainder after dividing 'a' by 'b'. For ex. 16 mod 11 means remainder after dividing 16 by 11... hence 16 mod 11 = 5

    • @freethinkers3680
      @freethinkers3680 5 лет назад +1

      @@Deepak.Dahiya ty

  • @smuhz3944
    @smuhz3944 4 года назад +2

    Plain text S=18, now solve this u ll get the wrong answer

  • @kapzb
    @kapzb 5 лет назад +2

    you are doing encryption using public key and decryption using private key ....which is practically wrong

    • @dhanushnaidu5733
      @dhanushnaidu5733 5 лет назад +4

      No, you are wrong

    • @dhanushnaidu5733
      @dhanushnaidu5733 5 лет назад +2

      This is assymetric key cryptography

    • @dandasaisantoshreddy6388
      @dandasaisantoshreddy6388 5 лет назад

      encryption means converting plain text to cipher text public key is used for this and for this process the sender uses the recipient public key which is available to everyone and encrypts the message which gets converted to cipher
      and now decryption means cipher to plain text here the recipient uses his own private key to decrypt the message which is in the form of cipher back to plain text

    • @abhinavrautela6493
      @abhinavrautela6493 5 лет назад

      @@dandasaisantoshreddy6388 I although agree with you brother but creation of public key should take place at receiver's side and then propogate it to others so that they can encrypt it using it ,,, but here all the keys say it public say it private are created at one side ... how is this possible?

    • @rittikmondal8286
      @rittikmondal8286 5 лет назад

      Both public key and private key can be used for encryption. When private key is used for encryption it provides authentication as in digital signature. During this the corresponding public key is used for decryption.
      When public key is used in encryption it provides confidentiality. During this the corresponding private key is used for decryption.

  • @devansh_4u
    @devansh_4u 2 года назад

    gandi gandi awwaaz kyu nikalta hai muuh se padhate padhate, irritating