Bhai ajj abhi 4baje exam h and mujhe sab concept samjh mein aa raha h... thank you so much...but my bad mujhe pehle kyun nhi apka vdo Mila ...I can not complete all your videos because only 1hr left ...so thank you so much jitna bhi hua😊
Thank you so much, sir ....... I cleared 7 sem university exam subject which is Cryptography and network security.... your videos and your knowledge are helpful to me ....
abhishek bhaiya, cant we use hash function tied to cipher text ? just like u explained for MAC ? msg -> E with key (cipher text) -> H (h) -> append -> cipher text + h ab cipher text ko decrypt with key and hash ko compare kar do
Hash function me koi key nahi use hui h Key is only used after hame apna hashcode mil gyaa h after passing the msg throught the hash function And Ya to ham key encryption algo me use karre h to encrypt our msg I hope now samajh me agya hoga ✌️💯
bro i neeed answer of this question:- hashing is useful tool in (a)prevention of unauthorized file modification (b)the development of secure cryptography algorithm
See hamne encryption and decryption same key se kia h ! So isliae Symmetric key Cryprtography ka concept hogya h And jo hamne private key se shuru me hashcode ko Encrypt kia h that is used to achieve the authentication by using the concept of digital signature Taki receiver ko pata chal sake ki ha yahi person mujhe msg bhejra h That it is coming from a authentic source I hope ab clear hogya hoga! Nahi clear hua h to watch digital signature video also
200 like krwa deta hun soch k like karne aya fir dekha bhai bahut aage nikal gya hai 😂😂😂😂
Us bhai us😂
Ab to lgta h kuch din me is comment p 200 like aa jayenge
@@TechLa-69 yahi bolne ja ra tha dekha ye koi pehle hi bol chuka hai
😂😂😂😂😂😂🗿🗿🗿🗿🗿🗿
@@TechLa-69153 to ho b gaye likes 😂
Bhai ajj abhi 4baje exam h and mujhe sab concept samjh mein aa raha h... thank you so much...but my bad mujhe pehle kyun nhi apka vdo Mila ...I can not complete all your videos because only 1hr left ...so thank you so much jitna bhi hua😊
Thank you so much, sir ....... I cleared 7 sem university exam subject which is Cryptography and network security.... your videos and your knowledge are helpful to me ....
Just need your notes bro 🥺. Amazing teaching !!!
you are the best tutor of information security on you tube
You break down things beautifully! Thank you!
Mind blowing Sir , You don't know but This is the Bestest Video In RUclips To Understand Hash Function ❤❤❤
Really aap toh bhot acche se samjhate ho really ☺️😊 thanks for This video
One of the best video on hash functions
your voice is so sweet. I hear every words and understand everything. thank you! :)
Hiiii
You perfectly know how to explain 👌👍👍👍👍👍👍👍👍keep up the good work , explanation was great
Thank you sir ....... explained very well👏
Thanks sir ❤for this...❤❤i watched the full series..
Thanks a lot sir ❤❤❤❤❤❤❤
Thank you, your notes really helped me for preparation
Great explanation! Thank you so much! It helps a lot!
Great explanation! Thank you so much! It helps a lot
Thanks a lot bhiya for your all hardwork and efforts..🎊🙏💐
❤️ UR VIDEOS ARE JUST INCREDIBLE THNX IT HELPED ME FOR MY MCQ XAMS👍
Thanks sir 🙏❤
I play your vids whenever my nephews and nieces come over and watch annoying tiktoks over and over and over......they met there match......
mason chips ohh sorry crisp maybe you should also start doing tiktok by this you will not do this shit talk here in comments ;
Really good explanation 🙌
Simple si cheej ko aur complex kar diya bhai tuney
bro need more videos on cryptography
love form nepal
16:20 Hamne apne attacker ko ek tarah se jhand kardiya😂😂
16:21 hmne attacker ko jhand kr diya😂
Funniest part lol
You just saved my exam ❤️
thank u sir and happy teachers day
Sir your video is very very helpful , can you please provide the handwritten notes that you explain in your video.
very helpful
Thankyou
thank you bhaiyaa.... have a great day
Great help before exams :) whole hearted Thanks!!
How we find coefficient of Secure hash algorithm??? Or how we crack Secure hash algorithm????
These two questions. Please answer???
like ka aim rakhte hai 200 likes gets 140k views and 4.5k likes.. you deserve more though :D
Today is my major exam and I am watching this now
Watch it 2x you will hear munna bhaiya voice from Mirzapur believe me. btw great work.
Rana Ahsaanullah
Very good
Thank you my man!!
Thank you brother for this vedio from Nepal
amazing teaching brother
Amazing explanation sir
Sir please make video on SHA 512 algorithms with its structure and rounds. Plz 🙏
why did u use private key to encrypt the hash value ....as we should use public key to encrypt the msg or hash value ......plz explain
U can use both private key and public key for encryption ..
Waah kya soch hai re teri
Very nice explanation bro👍👍....but yr ek tiger hash or gear hash pe video bnaa do plz..syllabus me mention hai kuk ke
You are so good but explanation is fast make it slightly slow
Thanks ❤️ well explained
It's all theoretical how can we implement this practically ? Is there any numerical examples available?
Great explaination
JAZAK ALLAH sir
Simple as that, thank you
I wish if my course teacher saw this video
Best explaining
What amazing 🙂🙂🙂🙂
abhishek bhaiya, cant we use hash function tied to cipher text ? just like u explained for MAC ?
msg -> E with key (cipher text) -> H (h) -> append -> cipher text + h
ab cipher text ko decrypt with key and hash ko compare kar do
isme toh dono confidentiality + authentication mil rhe h
U said key does not use in hash function at 1.11 but u explained with the help of key for encryption and decryption, how it is ??
Hash function me koi key nahi use hui h
Key is only used after hame apna hashcode mil gyaa h after passing the msg throught the hash function
And
Ya to ham key encryption algo me use karre h to encrypt our msg
I hope now samajh me agya hoga
✌️💯
very good sir i clear all concept of cryptography
Thank you..
Jai shree ram 🙏
you nailed it bro
love your video all the way from london (
thank you
bro i neeed answer of this question:- hashing is useful tool in
(a)prevention of unauthorized file modification
(b)the development of secure cryptography algorithm
both
Which books i can mention as refrece for this description??
Bro please video on DSS approach
How can we use hash function to design a secure login to prevent eavesdropping?
when blue color pen u use for making notes?
Hey Abhi, Can u please share the pdf link of your notes?
+1
pls repky i m very confused what are types of hash function ?????
Superbb🤟🤟
I have 1 doubt. Authentication by the public key of A and Integrity by hash is the same or not, is it true?
Its too good but hashing mein to key use nahi karte h na ?
Can you pls make a playlist for distributed systems? You teach amazing
Nice
Bro kerberos ki video nhi mil rhi..! Did you made any video on that?
❤
Thank you so much sir
Superb
These are the types of hash functions ??
MashAllah
Thank you brother
Can u explain the properties of hash function?
Mene sha algorithm search kiya ha ye video nikli ha please koi guide krdy ye wahi ha ya nai?
Ab to 3 mahiny ho gy guide kru ya na kru😅
thank you bro.. great work and teri notes ki pdf send karna link mai...
Masta✌️
nice
@abhishek bhai notes ki pdf link send krdo..
Nicee tysm ❤️😎
Bhaiya ap ek heap sort algorithm ke upar video bna dijiyena pls.. 13 ko exam hai mera
In method 3 should not we use public key for encryption instead of private key?
No we are achieving the concept of digital signature here to get authentication.
So its completely fine!
Watch digital signature video if u want
goood. please tell book name and writter.
Inme say kis method. Ko paper me likh kay au ..? Mera 8 jan ko. Paper hai please help
why we need to write 5...6 methods for hash function? can we define two method in exam?
Abhishek bhai jindabaad
you are doing great job man! Respect++
Bhai ek lucky jet game hai uska sha 512 algorithm use hota hai usko kaise follow kare jaise
❤❤
Hacker ko jhannd kr diya😂😂😂😂
Thanku so much
Hash function me private key se encryption hoti h ya apse ghalti hogyi h????
you said there is no concept of key in hash function to check data integrity but you will used key why so......
Does hash function and mac provides non repudiation.. please reply
No non repudiation
Method 4 me using symmetric key..encryption and decryption, Private and public key se kaise kiya...same key honi chahiye thi na..?
See hamne encryption and decryption same key se kia h ! So isliae Symmetric key Cryprtography ka concept hogya h
And jo hamne private key se shuru me hashcode ko Encrypt kia h that is used to achieve the authentication by using the concept of digital signature
Taki receiver ko pata chal sake ki ha yahi person mujhe msg bhejra h
That it is coming from a authentic source
I hope ab clear hogya hoga!
Nahi clear hua h to watch digital signature video also
@@AbhishekSharmaDit sir kindly provide notes or material of this video 🥺🥺🥺🥺