NETWORK SECURITY - PGP (E-MAIL SECURITY)

Поделиться
HTML-код
  • Опубликовано: 11 сен 2024
  • PGP - PRETTY GOOD PRIVACY
    THIS IS ONE OF THE EMAIL SECURITY MECHANISM
    PGP SERVICES
    1. AUTHENTICATION WITH DIGITAL SIGNATURE
    2. CONFIDENTIALITY
    3. EMAIL COMPATABILITY
    4. ZIP OR COMPRESSION FUNCTION.

Комментарии • 152

  • @acxd
    @acxd 4 года назад +6

    Order of Operations -> A digest is created from the message and encrypted using the private key of Sender --> The message is compressed --> the message(compressed) along with the digest are encrypted using the shared session key of the sender and receiver --> the encrypted(message and digest) are send along with the shared session key of sender and receiver which itself is encrypted with the public key of the receiver.

  • @maheshb3756
    @maheshb3756 3 года назад +2

    Sir you have helped me a lot sir during my exams time. Your explonation is very goood and clear. Keep maintian that sir. You are one of the best teacher in my study career. I was scared about this subject and i found you on youtube. Now i learned lot of subject. Thank you very much sir.

  • @bhuvanachilla1478
    @bhuvanachilla1478 6 лет назад +30

    Sir your lecture on PGP is pretty good and understandable...along with PGP ,we need S/MIME...if possible plse upload the lecture on S/MIME...

    • @sundeepsaradhi
      @sundeepsaradhi  6 лет назад +5

      hi bhuvana
      thanks for your interest towards our channel and share my sessions with
      your friends and subscribe to our channel.Keep following our channel.

    • @abhishekabhi8076
      @abhishekabhi8076 6 лет назад +6

      Yes sir your explaination was very good sir plz upload vedio on S/MIME

    • @ShubhamPatil..
      @ShubhamPatil.. 6 лет назад +2

      Yes sir plz upload S/MIME

    • @ravindrabind8603
      @ravindrabind8603 5 лет назад +5

      S/MIME pe video bana sir... Good explanation keep it.

  • @Sri_Hari_527
    @Sri_Hari_527 5 лет назад +26

    Sir i want ->
    "Secure/Multipurpose Internet Mail Extensions" (S/MIME)...plse upload the lecture on S/MIME...

  • @thehumanist888
    @thehumanist888 6 лет назад +4

    Thank you very much sir for the tutorial,The concept was presented very well so that I could understand it easily and was able to attend this question succesfully for my university exam...

    • @sundeepsaradhi
      @sundeepsaradhi  6 лет назад

      hi Reshma suresh
      thanks for your interest towards our channel and share my sessions with your friends and subscribe to our channel.Keep following our channel.

  • @sachinkodagali
    @sachinkodagali 4 года назад +1

    Very good explanation of the concepts, showing print out at the end was good too, please keep up this good work of sharing knowledge

  • @arjunsreekumar5293
    @arjunsreekumar5293 5 лет назад +15

    s/mime video please

  • @bhaskarbhasku2921
    @bhaskarbhasku2921 6 лет назад +44

    No need to read text books cause of you sir :)

    • @sundeepsaradhi
      @sundeepsaradhi  6 лет назад +5

      hi bhaskar
      thanks for your interest towards our channel and share my sessions with your friends and subscribe to our channel.Keep following our channel.

  • @aymansuliman5393
    @aymansuliman5393 5 лет назад +1

    thanks to you … best explanations for PGP email security on RUclips.

  • @shivanirao9607
    @shivanirao9607 4 года назад +1

    Thanks sir for great explanation i have exam after 2 days and you save my time 😊

  • @arunkumarravula1719
    @arunkumarravula1719 2 года назад +1

    PGP concept you are mentioning 3 services like authentication,confidentiality and Digital signature. But Digital signature is used to provide the Authentication service Sir. I do not know perfectly. I hope its true according to my knowledge. Please once check and respond sir. Thank You and sorry if any thing wrong from my side Sir.

  • @AshutoshMishra-pk2mo
    @AshutoshMishra-pk2mo 2 года назад

    Your teaching techniques is very good
    It's my humble request please upload little bit short video

  • @chandrakanthgoud969
    @chandrakanthgoud969 6 лет назад +1

    Sir your channel was really very helpful to me and my friends as well thank you very much sir i wrote my exam well because of you.

    • @sundeepsaradhi
      @sundeepsaradhi  6 лет назад

      hi chandrakanth
      thanks for your interest towards our channel and share my sessions with
      your friends and subscribe to our channel.Keep following our channel.

    • @SiddharthGargYT
      @SiddharthGargYT 6 лет назад

      xD haha. Our exam is tomorrow.

  • @harshrathod9162
    @harshrathod9162 5 лет назад

    sir i saw your all lectures of ins,sir your explanation technique is awesome,i can easily understand the concepts.

  • @TonyPSR
    @TonyPSR 3 года назад

    Thank you sir. Your videos helped me a lot in my semester exams.

  • @khaleelkhan9114
    @khaleelkhan9114 5 лет назад

    what a explanation nice very simple understanding sir very very nice

  • @Learnolet
    @Learnolet 3 месяца назад

    Thank for such a good Explanation!

  • @ganeshjaggineni4097
    @ganeshjaggineni4097 7 месяцев назад

    NICE SUPER EXCELLENT MOTIVATED

  • @karthikreddy2548
    @karthikreddy2548 3 года назад

    Can't get better explanation of PGP that this. Damn good.

  • @charansai1133
    @charansai1133 2 года назад

    Struggling with pgp really helpful thank you so much sir

  • @589-KUDUMULARAVITEJA
    @589-KUDUMULARAVITEJA 2 месяца назад

    Nice explanation sir ❤❤❤

  • @ShubhamPatil..
    @ShubhamPatil.. 6 лет назад

    Excellent job... sir... thank you sir for full details of PGP....

  • @networker9304
    @networker9304 Год назад

    Kind hearted Human being

  • @anuradharavuri9889
    @anuradharavuri9889 5 лет назад +2

    Excellent lecture...will u plzz upload a video on S/MIME..I have an exam...

  • @tamilselvanm5780
    @tamilselvanm5780 4 года назад

    Crystalline clear explanation

  • @thejusv.s672
    @thejusv.s672 3 года назад

    It's really helpful sir.. Thanks alot

  • @ravaliguruvelli
    @ravaliguruvelli 4 года назад

    Thankyou so much for your neat and clear explanation sir

  • @mouleshm210
    @mouleshm210 3 года назад

    Your classes are very helpful thanks alot

  • @udaykiranlopinti5771
    @udaykiranlopinti5771 3 года назад

    Very nice explanation sir...

  • @chiraagmayur2707
    @chiraagmayur2707 Год назад

    Sir becoz of your sessions, I'm much able to understand things which i can't do so from reading books.... Thankyou very much
    can you add videos on how to prepare for on campus placement and interview

  • @juan_dero
    @juan_dero 4 года назад +1

    Excellent explanation, thank you very much for sharing your knowledge with us! I just have one question, if the secret key is sent to the recipient in an encrypted form, using an asymmetric encryption algorithm (Public-key Encryption). Where does Diffie Hellman really apply? I don't see it :(

  • @ishankvasania3372
    @ishankvasania3372 6 лет назад +1

    Thanks sir, you are awesome. your videos are amazing.

  • @h.b.7190
    @h.b.7190 9 месяцев назад

    Which hash function is used, do these double (II) mean logical „or“-Operator?
    Thanks for this Video my friend 👍👍

  • @john-we2mz
    @john-we2mz 4 месяца назад

    thankyouu so much sir , it was just outstandingg thankyou

  • @pnkjthapliyal
    @pnkjthapliyal 4 года назад

    A very good lecture Sir.

  • @netrashigwan7377
    @netrashigwan7377 5 лет назад

    Thank you so much Sir
    Lecture help me a lot to clear my concepts
    🤘

  • @pragyanidhi2264
    @pragyanidhi2264 5 лет назад

    Very good explanation.. thanks

  • @sword013
    @sword013 5 лет назад +1

    Cool stuff sir !
    But is that really diffi exchange ? We are not really generating keys. That Ks is our value , its not getting generated and on the receivers side, its getting dectypted ,not generated.
    Idk if its a valid doubt.. But Cool

  • @j4eg3r47
    @j4eg3r47 6 лет назад +1

    Thank you that was a pretty good tutorial.

  • @neelxxx007
    @neelxxx007 4 года назад

    Nice one! Simplified the logic. But in this video, you are doing decryption and then verifying signature. I think whoever wants to decrypt, first check the signature and then they would decrypt. Any suggestion to achieve that?

  • @steamerSama
    @steamerSama Месяц назад

    A bit slow for me, but very clear, thank you!!

  • @abuthahirsha2712
    @abuthahirsha2712 4 года назад

    Tnx for makin it so simple.👌👌

  • @kitz24
    @kitz24 3 месяца назад

    Nice video. All clear

  • @kanumurimanasa6740
    @kanumurimanasa6740 4 года назад +2

    Sir please upload the lecture on S/MIME alsoooo

  • @aganaz
    @aganaz Год назад

    Thanks for your explanation i have one doubt what is the purpose of we using compression and decompression?

  • @varunmeka5625
    @varunmeka5625 6 лет назад

    i passed my CNS subject because of you sir

  • @dr.poornimanv2906
    @dr.poornimanv2906 5 лет назад

    Tq sir, your explanation is very clear and understandable plz give explanation of rc4 and a5 encryption algorithm plzzz

  • @RakeshVerma-yp1gw
    @RakeshVerma-yp1gw 5 лет назад

    Excellent Video Sir.

  • @doomanygf3017
    @doomanygf3017 4 года назад

    Hello. there is wrong small problem.puplic key und private key should be swaped.puplic key just for encryption.

  • @eileenrabbit3367
    @eileenrabbit3367 3 года назад

    thank you,you made it so simple to understand

  • @samkuna3006
    @samkuna3006 6 лет назад

    Hi sir
    Very nice explanation sir
    Want ur video on minme and s/mime

  • @vinodanand9550
    @vinodanand9550 5 лет назад

    Superb explanation

  • @urameshiyusuke85
    @urameshiyusuke85 5 лет назад

    really love your explanation

  • @GenAiStuff
    @GenAiStuff 4 года назад

    When plain text appended with digest what is a need of digest receive can read that plain text easily

  • @Manvitha-srinivasa
    @Manvitha-srinivasa 3 года назад +1

    Please upload the last diagram paper in the description box or comment box sir

  • @Paddy0808
    @Paddy0808 6 лет назад +2

    Sir aapke video bahoot accha hai..but thode short mein bataynge to aapko jyada views bhi mil sakte hai...

    • @sundeepsaradhi
      @sundeepsaradhi  6 лет назад

      hi prashant
      thanks for your interest towards our channel and share my sessions with your friends and subscribe to our channel.Keep following our channel.

  • @nessy3543
    @nessy3543 3 года назад

    Thank you so much sir .you helped me lot .

  • @soumya08in
    @soumya08in 4 года назад

    Very nice explanation . Guess Session key is Ks

  • @a.yashwanth
    @a.yashwanth 4 года назад +1

    can someone give an intuition on how the decryption of the "private key encrypted message" using the public key gives the message?

  • @vishnuvardhan1832
    @vishnuvardhan1832 4 года назад

    Really nice video sir

  • @amanshingare6815
    @amanshingare6815 6 лет назад +2

    is this from Network Security Essentials by william stallings
    ?

    • @sundeepsaradhi
      @sundeepsaradhi  6 лет назад

      hi aman
      yes i have prepared every thing from william stallings.

  • @md.anwarali9686
    @md.anwarali9686 6 лет назад +1

    Dear sir, please give in depth explanation of any new term say " compatibility in PGP" why it is required , how to incorporate it .

    • @sundeepsaradhi
      @sundeepsaradhi  6 лет назад

      hi ali
      thanks for your interest towards our channel and i will definitely try to do that.

  • @areeshaahmed4852
    @areeshaahmed4852 6 лет назад

    On some websites i read that session key is also generated to encrypt the message and then the session key is encrypted by the reciever's public key. But you didn't talk about session key. I am very confuse that session keys are required for pgp or not. Please reply me. I am waiting.

  • @poonamgosavi8111
    @poonamgosavi8111 5 лет назад

    Thax sir it is very usefull for me

  • @SrikanthReddy-ik1ui
    @SrikanthReddy-ik1ui 5 лет назад

    At sender side u encrypted the hash but at receiver side you didn't decrypt the hash function ??

  • @kunalgoyal6206
    @kunalgoyal6206 6 лет назад +1

    owesome man
    great work

    • @sundeepsaradhi
      @sundeepsaradhi  6 лет назад

      hi kunal
      thanks for your interest towards our channel and share my sessions with your friends and subscribe to our channel.Keep following our channel.

  • @ruthvikrajam.v4303
    @ruthvikrajam.v4303 5 лет назад

    super sir
    i have shared to my friends

  • @AshChaudhari
    @AshChaudhari 6 лет назад +2

    sir video is pretty good..

    • @sundeepsaradhi
      @sundeepsaradhi  6 лет назад

      hi ash
      thanks for your interest towards our channel and share my sessions with
      your friends and subscribe to our channel.Keep following our channel.

  • @dhachanamurthydhachanamurt8447
    @dhachanamurthydhachanamurt8447 4 года назад

    U r just amazing sir 😍😍😍😍😍

  • @Krishna-bz5bs
    @Krishna-bz5bs 5 лет назад

    Pretty good lecture

  • @akulaanuradha6202
    @akulaanuradha6202 6 лет назад +2

    Sir upload vedios X.509authentication services ,public key infrastructure .

  • @kutumbakavarsha6716
    @kutumbakavarsha6716 6 лет назад +1

    Tq sir it really helped me a lot tq so much

    • @sundeepsaradhi
      @sundeepsaradhi  6 лет назад

      hi varsha
      thanks for your interest towards our channel and share my sessions with
      your friends and subscribe to our channel.Keep following our channel.

    • @kutumbakavarsha6716
      @kutumbakavarsha6716 6 лет назад

      Sure sir

  • @snehabalajee935
    @snehabalajee935 Год назад

    hey, will the integrity of the message be affected if we compress the message?

  • @sagarg5325
    @sagarg5325 5 лет назад

    Sir how you use piblic key for decryption as per my knowledge we can only use private key for decrypt the message and public key is use for encrypt the message.....

  • @babuo7682
    @babuo7682 5 лет назад

    how we are getting symmetric key ? is that from User A private key or User B`s public key ? Please confirm.

  • @AdityaGupta-ei3di
    @AdityaGupta-ei3di 4 года назад

    could u please tell how it is vulnerable to middle attack and how it can be solved

  • @yeshwanthallampati9460
    @yeshwanthallampati9460 5 лет назад

    Thanks sir! U saved me!

  • @dr.shemalatha7636
    @dr.shemalatha7636 5 лет назад

    sir upload videos on x.509 authentication , public key infrastructure and s/SIME at an earliest. since end semester examination is nearing sir

  • @aisha8938
    @aisha8938 2 года назад

    Thank you so much.

  • @siddheshnaik4956
    @siddheshnaik4956 5 лет назад +1

    god bless youu

  • @chundurupriyanka3980
    @chundurupriyanka3980 4 года назад

    Did u have any material for this subject sir.if yes u can provide materials in website or provide link in description

  • @punithgowda1649
    @punithgowda1649 3 года назад

    Legend 🙌

  • @jyotichopda4011
    @jyotichopda4011 5 лет назад

    Sir pls clear the difference between public key encryption , digital signature and asymmetric encryption

  • @rabeehkt
    @rabeehkt 3 года назад

    Please upload Secure/Multipurpose Internet Mail Extensions (S/MIME) Video

  • @mukeshkumarsharma1571
    @mukeshkumarsharma1571 5 лет назад

    excellent

  • @rakshithaa4535
    @rakshithaa4535 5 лет назад +1

    THANK YOU SIR!!!!!!1

  • @khaleelkhan9114
    @khaleelkhan9114 5 лет назад

    your a huge talant person

  • @habibullah1541
    @habibullah1541 2 года назад

    Thank You So Much

  • @saikrishna2977
    @saikrishna2977 5 лет назад

    how to like all your videos in a single shot..
    its difficult to like every video

  • @bivekmansingh781
    @bivekmansingh781 6 лет назад +2

    Thanks sir...

    • @sundeepsaradhi
      @sundeepsaradhi  6 лет назад

      hi bivek
      thanks for your interest towards our channel and share my sessions with your friends and subscribe to our channel.Keep following our channel.

  • @annpearl2129
    @annpearl2129 2 года назад

    WOW!

  • @niharikasaikrothapalli592
    @niharikasaikrothapalli592 6 лет назад +1

    btw why are we compressing the message and then encrypting? why isn't the message directly encrypted?

    • @sundeepsaradhi
      @sundeepsaradhi  6 лет назад

      hi Niharika
      that was actually done in PGP
      Compression followed by encryption.

    • @keshavkashyap166
      @keshavkashyap166 5 лет назад

      This is used in E-mail so a large chunk of data is compressed followed by segmentation, then it is sent over a network.

  • @shaikadilahamed4139
    @shaikadilahamed4139 5 лет назад

    sir where do we use algorithms here cacn u show in diagram please

  • @sreejasree7427
    @sreejasree7427 3 года назад

    Thank you sir

  • @saranrajd3004
    @saranrajd3004 3 года назад

    What are the books i will read ugc and pgtrb net exam plz refer

  • @Sai-ug2xf
    @Sai-ug2xf 5 лет назад

    sir,please upload IDEA algorithm

  • @Ramy243
    @Ramy243 6 лет назад +1

    Thank u so much sir

    • @sundeepsaradhi
      @sundeepsaradhi  6 лет назад

      hi ramya
      thanks for your interest towards our channel and share my sessions with your friends and subscribe to our channel.Keep following our channel.

  • @1gonsaga.d111
    @1gonsaga.d111 2 года назад

    Thankyou sir

  • @PSRinfo
    @PSRinfo 6 лет назад +1

    sir,board clear ga ledu,its not visible clearly.

    • @sundeepsaradhi
      @sundeepsaradhi  6 лет назад +1

      hi PSR
      i think the brightness of the camera is more so that its not visible i think and i will correct it.

  • @Abhisheksingh-ud8ht
    @Abhisheksingh-ud8ht 5 лет назад

    is PGP working on Asymmetric Key ??