Hash Functions in Cryptography

Поделиться
HTML-код
  • Опубликовано: 2 ноя 2024

Комментарии • 184

  • @PiyushKumar-ec4uc
    @PiyushKumar-ec4uc Год назад +163

    200 like krwa deta hun soch k like karne aya fir dekha bhai bahut aage nikal gya hai 😂😂😂😂

    • @farhansarguroh8680
      @farhansarguroh8680 Год назад +3

      Us bhai us😂

    • @TechLa-69
      @TechLa-69 10 месяцев назад +4

      Ab to lgta h kuch din me is comment p 200 like aa jayenge

    • @mishrabhishek
      @mishrabhishek 9 месяцев назад +2

      ​@@TechLa-69 yahi bolne ja ra tha dekha ye koi pehle hi bol chuka hai

    • @VishalKumar-lw3yh
      @VishalKumar-lw3yh 4 месяца назад

      😂😂😂😂😂😂🗿🗿🗿🗿🗿🗿

    • @nimavatmahesh4419
      @nimavatmahesh4419 Месяц назад

      @@TechLa-69​153 to ho b gaye likes 😂

  • @priyansimishra1961
    @priyansimishra1961 Год назад +6

    Bhai ajj abhi 4baje exam h and mujhe sab concept samjh mein aa raha h... thank you so much...but my bad mujhe pehle kyun nhi apka vdo Mila ...I can not complete all your videos because only 1hr left ...so thank you so much jitna bhi hua😊

  • @BhushanBankar-iz8kq
    @BhushanBankar-iz8kq 6 месяцев назад +3

    Thank you so much, sir ....... I cleared 7 sem university exam subject which is Cryptography and network security.... your videos and your knowledge are helpful to me ....

  • @ShravanS
    @ShravanS 3 года назад +73

    Just need your notes bro 🥺. Amazing teaching !!!

  • @shifaahmad2171
    @shifaahmad2171 Год назад +2

    you are the best tutor of information security on you tube

  • @naeemaibrahim1645
    @naeemaibrahim1645 4 года назад +41

    You break down things beautifully! Thank you!

  • @rohitmakawana7726
    @rohitmakawana7726 Год назад +4

    Mind blowing Sir , You don't know but This is the Bestest Video In RUclips To Understand Hash Function ❤❤❤

  • @kunalsoni7681
    @kunalsoni7681 4 года назад +5

    Really aap toh bhot acche se samjhate ho really ☺️😊 thanks for This video

  • @sunnynuri7191
    @sunnynuri7191 4 года назад +8

    One of the best video on hash functions

  • @siddhi1993
    @siddhi1993 3 года назад +6

    your voice is so sweet. I hear every words and understand everything. thank you! :)

  • @Fatiii
    @Fatiii 2 года назад +9

    You perfectly know how to explain 👌👍👍👍👍👍👍👍👍keep up the good work , explanation was great

  • @JALADISHIRLYSHARONCSC2023
    @JALADISHIRLYSHARONCSC2023 Месяц назад +1

    Thank you sir ....... explained very well👏

  • @samiranroyy1700
    @samiranroyy1700 4 месяца назад +2

    Thanks sir ❤for this...❤❤i watched the full series..
    Thanks a lot sir ❤❤❤❤❤❤❤

  • @bishikamagoo5119
    @bishikamagoo5119 Год назад +3

    Thank you, your notes really helped me for preparation

  • @afrida3351
    @afrida3351 3 года назад +15

    Great explanation! Thank you so much! It helps a lot!

    • @farhanbhutta9587
      @farhanbhutta9587 6 месяцев назад

      Great explanation! Thank you so much! It helps a lot

  • @xyz-pc3tl
    @xyz-pc3tl 2 года назад +3

    Thanks a lot bhiya for your all hardwork and efforts..🎊🙏💐

  • @NotNextron
    @NotNextron 3 года назад +8

    ❤️ UR VIDEOS ARE JUST INCREDIBLE THNX IT HELPED ME FOR MY MCQ XAMS👍

  • @comedyadda7269
    @comedyadda7269 4 месяца назад +3

    Thanks sir 🙏❤

  • @masoncrisp4821
    @masoncrisp4821 2 года назад

    I play your vids whenever my nephews and nieces come over and watch annoying tiktoks over and over and over......they met there match......

    • @rishirajsinghrathorepgi19c56
      @rishirajsinghrathorepgi19c56 2 года назад

      mason chips ohh sorry crisp maybe you should also start doing tiktok by this you will not do this shit talk here in comments ;

  • @manasabs5384
    @manasabs5384 Год назад +3

    Really good explanation 🙌

  • @sanjoysingha4020
    @sanjoysingha4020 3 года назад

    Simple si cheej ko aur complex kar diya bhai tuney

  • @ayushjungkarki2896
    @ayushjungkarki2896 4 года назад +11

    bro need more videos on cryptography
    love form nepal

  • @saumyajaiswal6585
    @saumyajaiswal6585 Год назад +4

    16:20 Hamne apne attacker ko ek tarah se jhand kardiya😂😂

  • @siddhantsingh6578
    @siddhantsingh6578 3 года назад +8

    16:21 hmne attacker ko jhand kr diya😂

  • @aditisheikh2884
    @aditisheikh2884 3 года назад +5

    You just saved my exam ❤️

  • @nirajshivane402
    @nirajshivane402 Год назад +1

    thank u sir and happy teachers day

  • @subhajitpanda2817
    @subhajitpanda2817 4 месяца назад

    Sir your video is very very helpful , can you please provide the handwritten notes that you explain in your video.

  • @rohitvishwkarma8076
    @rohitvishwkarma8076 Год назад +2

    very helpful
    Thankyou

  • @kshitijvarma2566
    @kshitijvarma2566 Год назад +1

    thank you bhaiyaa.... have a great day

  • @omajaybhavsar8039
    @omajaybhavsar8039 2 года назад +1

    Great help before exams :) whole hearted Thanks!!

  • @expertforexandbinary676
    @expertforexandbinary676 Год назад +2

    How we find coefficient of Secure hash algorithm??? Or how we crack Secure hash algorithm????
    These two questions. Please answer???

  • @Rin-dk1oo
    @Rin-dk1oo 2 года назад +5

    like ka aim rakhte hai 200 likes gets 140k views and 4.5k likes.. you deserve more though :D

  • @manaskhatri5803
    @manaskhatri5803 Год назад +1

    Today is my major exam and I am watching this now

  • @ANKITVERMA-fl1zn
    @ANKITVERMA-fl1zn 3 года назад

    Watch it 2x you will hear munna bhaiya voice from Mirzapur believe me. btw great work.

  • @ranaahsaan4663
    @ranaahsaan4663 2 года назад

    Rana Ahsaanullah
    Very good

  • @nityodaytekchandani701
    @nityodaytekchandani701 Год назад +3

    Thank you my man!!

  • @pratikshyapaudel3065
    @pratikshyapaudel3065 2 года назад

    Thank you brother for this vedio from Nepal

  • @lalit3452
    @lalit3452 2 года назад +2

    amazing teaching brother

  • @a8488vv
    @a8488vv 2 года назад +1

    Amazing explanation sir

  • @rahulvaishnav6536
    @rahulvaishnav6536 Месяц назад

    Sir please make video on SHA 512 algorithms with its structure and rounds. Plz 🙏

  • @learnfrompast
    @learnfrompast 2 года назад +7

    why did u use private key to encrypt the hash value ....as we should use public key to encrypt the msg or hash value ......plz explain

  • @sachinsharma-dd9zh
    @sachinsharma-dd9zh 3 года назад +1

    Very nice explanation bro👍👍....but yr ek tiger hash or gear hash pe video bnaa do plz..syllabus me mention hai kuk ke

  • @mohammedjaveed8257
    @mohammedjaveed8257 3 месяца назад

    You are so good but explanation is fast make it slightly slow

  • @yutaitadori7318
    @yutaitadori7318 4 года назад +3

    Thanks ❤️ well explained

  • @minhadtuashimahmed3873
    @minhadtuashimahmed3873 Месяц назад

    It's all theoretical how can we implement this practically ? Is there any numerical examples available?

  • @kumarshivam3661
    @kumarshivam3661 2 года назад +2

    Great explaination

  • @flutter_graphic35
    @flutter_graphic35 2 года назад

    JAZAK ALLAH sir

  • @bhadrik
    @bhadrik 3 года назад +2

    Simple as that, thank you

  • @md.saifulislam5048
    @md.saifulislam5048 2 года назад +2

    I wish if my course teacher saw this video

  • @Findingvibes08
    @Findingvibes08 4 года назад +2

    Best explaining

  • @minttobe4081
    @minttobe4081 2 года назад +1

    What amazing 🙂🙂🙂🙂

  • @lakshsinghania
    @lakshsinghania 7 месяцев назад

    abhishek bhaiya, cant we use hash function tied to cipher text ? just like u explained for MAC ?
    msg -> E with key (cipher text) -> H (h) -> append -> cipher text + h
    ab cipher text ko decrypt with key and hash ko compare kar do

    • @lakshsinghania
      @lakshsinghania 7 месяцев назад

      isme toh dono confidentiality + authentication mil rhe h

  • @Aam-admi2424
    @Aam-admi2424 4 года назад +3

    U said key does not use in hash function at 1.11 but u explained with the help of key for encryption and decryption, how it is ??

    • @AbhishekSharmaDit
      @AbhishekSharmaDit  4 года назад +12

      Hash function me koi key nahi use hui h
      Key is only used after hame apna hashcode mil gyaa h after passing the msg throught the hash function
      And
      Ya to ham key encryption algo me use karre h to encrypt our msg
      I hope now samajh me agya hoga
      ✌️💯

  • @gajjardhruvil9271
    @gajjardhruvil9271 4 года назад +1

    very good sir i clear all concept of cryptography

  • @dhaneshpt8641
    @dhaneshpt8641 Год назад +2

    Thank you..

  • @PareeksAcademy10october2001
    @PareeksAcademy10october2001 Год назад +2

    Jai shree ram 🙏

  • @SUMITSINGH-jx1zh
    @SUMITSINGH-jx1zh 4 года назад +2

    you nailed it bro

  • @mohsinimran3895
    @mohsinimran3895 2 года назад

    love your video all the way from london (

  • @jahanvi9429
    @jahanvi9429 2 года назад +1

    thank you

  • @navdeepsingh5649
    @navdeepsingh5649 4 года назад +2

    bro i neeed answer of this question:- hashing is useful tool in
    (a)prevention of unauthorized file modification
    (b)the development of secure cryptography algorithm

  • @dav-mps-parsa
    @dav-mps-parsa Год назад +1

    Which books i can mention as refrece for this description??

  • @digvijaypatil860
    @digvijaypatil860 Год назад +1

    Bro please video on DSS approach

  • @madamlalarr1119
    @madamlalarr1119 4 года назад +2

    How can we use hash function to design a secure login to prevent eavesdropping?

  • @nandinimishra9153
    @nandinimishra9153 2 года назад

    when blue color pen u use for making notes?

  • @akankshahinduja7629
    @akankshahinduja7629 3 года назад +7

    Hey Abhi, Can u please share the pdf link of your notes?

  • @samarthkvlogs8611
    @samarthkvlogs8611 Год назад

    pls repky i m very confused what are types of hash function ?????

  • @divyathakur7927
    @divyathakur7927 4 года назад +1

    Superbb🤟🤟

  • @armylove9733
    @armylove9733 2 года назад +2

    I have 1 doubt. Authentication by the public key of A and Integrity by hash is the same or not, is it true?

  • @snehanandu8574
    @snehanandu8574 2 года назад

    Its too good but hashing mein to key use nahi karte h na ?

  • @stutijain9254
    @stutijain9254 2 года назад +2

    Can you pls make a playlist for distributed systems? You teach amazing

  • @izzatyaseen4013
    @izzatyaseen4013 4 года назад +1

    Nice

  • @hooriakhan4112
    @hooriakhan4112 2 года назад

    Bro kerberos ki video nhi mil rhi..! Did you made any video on that?

  • @simranraturi3373
    @simranraturi3373 Год назад +1

  • @kdsouza4507
    @kdsouza4507 Год назад

    Thank you so much sir

  • @namanagarwal5687
    @namanagarwal5687 4 года назад +1

    Superb

  • @LOKI-vn8qp
    @LOKI-vn8qp 3 года назад +1

    These are the types of hash functions ??

  • @sahrookhan500
    @sahrookhan500 Год назад

    MashAllah

  • @mohammedzabiulla310
    @mohammedzabiulla310 4 года назад +1

    Thank you brother

  • @sakshibkotian4049
    @sakshibkotian4049 2 года назад +1

    Can u explain the properties of hash function?

  • @wardanaveed4240
    @wardanaveed4240 8 месяцев назад +2

    Mene sha algorithm search kiya ha ye video nikli ha please koi guide krdy ye wahi ha ya nai?

    • @lucifer_netflix
      @lucifer_netflix 5 месяцев назад +1

      Ab to 3 mahiny ho gy guide kru ya na kru😅

  • @vedangjani2412
    @vedangjani2412 2 года назад

    thank you bro.. great work and teri notes ki pdf send karna link mai...

  • @shekharhumane8874
    @shekharhumane8874 3 года назад

    Masta✌️

  • @SHIVAMGUPTA-fp2uc
    @SHIVAMGUPTA-fp2uc 2 года назад

    nice

  • @anujkanojia1450
    @anujkanojia1450 2 года назад +1

    @abhishek bhai notes ki pdf link send krdo..

  • @lakshayjain9337
    @lakshayjain9337 Год назад +1

    Nicee tysm ❤️😎

  • @subhamkumarsah933
    @subhamkumarsah933 4 года назад

    Bhaiya ap ek heap sort algorithm ke upar video bna dijiyena pls.. 13 ko exam hai mera

  • @khanhusnain2165
    @khanhusnain2165 4 года назад +2

    In method 3 should not we use public key for encryption instead of private key?

    • @AbhishekSharmaDit
      @AbhishekSharmaDit  4 года назад +1

      No we are achieving the concept of digital signature here to get authentication.
      So its completely fine!
      Watch digital signature video if u want

  • @ghulamdustgeer9014
    @ghulamdustgeer9014 Год назад

    goood. please tell book name and writter.

  • @puneetmishra9745
    @puneetmishra9745 4 года назад +2

    Inme say kis method. Ko paper me likh kay au ..? Mera 8 jan ko. Paper hai please help

  • @mdafsarali9564
    @mdafsarali9564 Год назад

    why we need to write 5...6 methods for hash function? can we define two method in exam?

  • @ujjwalagrawal2414
    @ujjwalagrawal2414 Год назад

    Abhishek bhai jindabaad

  • @anuragtiwari2511
    @anuragtiwari2511 3 года назад +1

    you are doing great job man! Respect++

  • @SurajKumar-np6zz
    @SurajKumar-np6zz 7 месяцев назад

    Bhai ek lucky jet game hai uska sha 512 algorithm use hota hai usko kaise follow kare jaise

  • @UmerKhan-ro3dy
    @UmerKhan-ro3dy 9 месяцев назад

    ❤❤

  • @chitrapatel5063
    @chitrapatel5063 3 года назад +2

    Hacker ko jhannd kr diya😂😂😂😂

  • @AMANRAJ-rd7iy
    @AMANRAJ-rd7iy 2 года назад

    Thanku so much

  • @RTXAftab
    @RTXAftab 2 года назад

    Hash function me private key se encryption hoti h ya apse ghalti hogyi h????

  • @VivekSingh-gy3zn
    @VivekSingh-gy3zn Год назад

    you said there is no concept of key in hash function to check data integrity but you will used key why so......

  • @soorya_kv0304
    @soorya_kv0304 Год назад

    Does hash function and mac provides non repudiation.. please reply

  • @nishikantshirke273
    @nishikantshirke273 4 года назад

    Method 4 me using symmetric key..encryption and decryption, Private and public key se kaise kiya...same key honi chahiye thi na..?

    • @AbhishekSharmaDit
      @AbhishekSharmaDit  4 года назад +2

      See hamne encryption and decryption same key se kia h ! So isliae Symmetric key Cryprtography ka concept hogya h
      And jo hamne private key se shuru me hashcode ko Encrypt kia h that is used to achieve the authentication by using the concept of digital signature
      Taki receiver ko pata chal sake ki ha yahi person mujhe msg bhejra h
      That it is coming from a authentic source
      I hope ab clear hogya hoga!
      Nahi clear hua h to watch digital signature video also

    • @nitishsharma7545
      @nitishsharma7545 Год назад

      @@AbhishekSharmaDit sir kindly provide notes or material of this video 🥺🥺🥺🥺