I am an (very) old hand in the field of communications. Having graduated in December 1957, when cryptography device was the Enigma created by the Germans. I was having big problems in understanding cryptographic communications; by pure luck, I chanced today on your excellent tutorials. Thanks a lot for the good work!
Sunny, I keep watching these videos in my spare time. A true master teacher has a way of explaining advanced concept in simple terms, you have that ability in spades!
Sunny: #1 your english is fantastic. While I was learning korean, it was absolutely brutal for me. I still can't pronounce a lot of words. To koreans it sounds like nothing. #2 Thank you very much. I am working on my cryptography cert. I have been going through the text book and it wasn't making sense. Now it makes sense. Thank you for your time and effort..
Thank you Prof. Sunny sun, I have learned a lot from your nice class. I easily understand what you are teaching, just like you're giving us a lecture in the same Classroom in my country Nigeria. I wish you all the best!!!
8745400 My wallet had 12btc which I could not have access to but thanks to *Hotz882* on Instagram. He got me the private key to my wallet at a small price..he will help you to
Thank you so much sir..You are awesome!!..so nice,simple and easy teaching by you sir!! May Gog give you good health,wealth,name,fame and may your all wishes fulfill soon...Salute you sir!!
Thank you so much for this video. Now it makes more sense for me. But I have threee questions please. 1. How is this private key shared between sender and receiver? 2. Whose private key are we talking about, the receivers or the senders? 3. How is the private key generated? Through a tool?
Thanks for the forecast! A bit off-topic, but I wanted to ask: I have a SafePal wallet with USDT, and I have the seed phrase. (alarm fetch churn bridge exercise tape speak race clerk couch crater letter). How should I go about transferring them to Binance?
Hi Sunny, thanks for the good explanation. One question left: When we talk about modern applications: how would they exchange the private key initially?
Hey , I have a question for you , How TOM will share the symmetric to Marry ...? I do understand that Tom generate the two set of keys , But how he will pass the key to Marry ...?
Does symmetric key encription garuntee integrity of the text sent? As in assymetric key encription reciever can verify if the text is tampered or not...
HELLO SIR, I LIKED YOU VIDEOS VERY MUCH AND THESE VIDEOS ARE MUCH HELPFUL FOR ME.. KINDLY MAKE VIDEOS ON CELLULAR NETWORK, SATELLITE NETWORK AND ALSO ON X.25, FRAME RELAY, ATM, SONET ETC AS SOON AS POSSIBLE.. THANKS
Alex Hung My wallet had 12btc which I could not have access to but thanks to *Hotz882* on Instagram. He got me the private key to my wallet at a small price..he will help you to
Nice lecture. How this private key is shared between sender and receiver? During the sharing of the key how the key is ensured to be secure? other wise some one can hack the key. pls explain
I appreciate your efforts! 🙏 I wanted to ask something unrelated: 🤔 I only have these words 🤔. (behave today finger ski upon boy assault summer exhaust beauty stereo over). How do I use this? 🤨
Private key encryption works the same no matter where it is used or what program uses it. It is normally used for exchanging information after validation and verification (like digital signature, or digital certificate, which are normally accomplished by public key encryption). I hope this is helpful. Please let me know if you have any questions.
I am an (very) old hand in the field of communications. Having graduated in December 1957, when cryptography device was the Enigma created by the Germans. I was having big problems in understanding cryptographic communications; by pure luck, I chanced today on your excellent tutorials. Thanks a lot for the good work!
how old are you sir
Sunny, I keep watching these videos in my spare time. A true master teacher has a way of explaining advanced concept in simple terms, you have that ability in spades!
Sunny: #1 your english is fantastic. While I was learning korean, it was absolutely brutal for me. I still can't pronounce a lot of words. To koreans it sounds like nothing. #2 Thank you very much. I am working on my cryptography cert. I have been going through the text book and it wasn't making sense. Now it makes sense. Thank you for your time and effort..
Thank you for your nice compliments! I appreciate . I am glad it helps you.
Tom #roger11121 on !nsta got me private key
Add Metin_Dave on Instagram he’s best hacker he got me back my facebook and instagram with my private key he’s the best
this guy makes it understandable. i have been reading many books trying to understand this but i just understood it within 4 minutes.
Thank you for watching!
Thank you Prof. Sunny sun, I have learned a lot from your nice class. I easily understand what you are teaching, just like you're giving us a lecture in the same Classroom in my country Nigeria. I wish you all the best!!!
Thank you very much for your kind words. I wish you the best in Nigeria!
Plain language explained so clear, thank you, Sunny! I love your streams so well.
i couldn't find any better and clearer explanation than yours
Many thanks, Zheng Yu, for your time to leave comments. Again, many thanks.
Sir, your videos are very easy to understand. Thank you, sir !! keep up the great content
Thank you so much Professor Sunny. You are truly a sun on a winter morning. Very good explanation
I am addicted to your videos😃😅
I am honored.
same hear :):) Addicted is the right word
7 years passed, still a great video
A great start. I'm definitely gonna watch the whole series.
I love all of your videos. All of them are easy to understand.
Many thanks for your time and support. I really appreciate it.
Outstanding! Clear & concise explanations. Thank you!
You are welcome and thank you for your nice comment.
Your way of explanations is awesome, Blowfish that we generally used in rest API communications.
I really like these videos. You now have a new subscriber. :)
Thank you very much, 8745400!
8745400 My wallet had 12btc which I could not have access to but thanks to *Hotz882* on Instagram. He got me the private key to my wallet at a small price..he will help you to
Sunny , your are so professional!!!, you are amazing!!!!
You are an amazing teacher, please keep them coming
thanks!
You are an amazing teacher! I am Computer Science Student!
Very clear explanations with Good examples. Thank you for the videos.
I am just loving these videos! Please keep it going!
Thank you very much for your time and nice comment. I will try my best to upload more videos.
It is very attractive to learn from your presentations...Awesome.
Thanks a lot
Thank you so much sir..You are awesome!!..so nice,simple and easy teaching by you sir!! May Gog give you good health,wealth,name,fame and may your all wishes fulfill soon...Salute you sir!!
Thank you very much for your kindness and heart-warm words. God bless you, Saroj.
First people which do not use bob and Alice in example. Bro you are perfect
Thank you very much Sunny for all the tutorials !!!
Thanks Sunny for an excellent tutorial
Great teacher... Very very easy to understand...
Thank you Sunny. You are awesome!
Thank you !
How you explain things is awesome
Thanks Sunny. These presentations are very clear. Great content
Thank you very much for your encouragement. I will do my best.
Thank you Mr sunny
Your videos has been so helpful for me. Most especially your analogy
I think in symmetric encryption we call it secret key to differentiate between the private key of asymmetric encryption
you are correct.
majid shwkah #roger11121 on !nsta got me private key
I love your video. Please keep doing more!
Thank you so much for this video. Now it makes more sense for me. But I have threee questions please. 1. How is this private key shared between sender and receiver? 2. Whose private key are we talking about, the receivers or the senders? 3. How is the private key generated? Through a tool?
Great Sunny .. very neatly explained. I am very thankful to you.
you are welcome!
i love you mister, thanks for all what are you doing
This man is incredible.
Compliments, Very well explained
Many thanks!
Very interesting and clear presentation, well done!
you're an incredible teacher !! I'm an engineer ..
Thanks a lot. You must be a great engineer.
M Ibrahim #roger11121 on !nsta got me private key
@@sunnyclassroom24 you let me love networking ♡
@@sharujan2413 what?
@@mibrahim4245 Ectha112 on IG helped me out
Awesome videos and explanations. Thanks you so much and you are very much appreciated. Thank y, thanks u...I love your explanations.
You're very welcome!
Nice and clear. Subscribed!
many thanks.
Please make more videos.You are great!!
Thank you for the very clear explanations you far the best!
Thanks for the forecast! A bit off-topic, but I wanted to ask: I have a SafePal wallet with USDT, and I have the seed phrase. (alarm fetch churn bridge exercise tape speak race clerk couch crater letter). How should I go about transferring them to Binance?
Great Sunny...!
🥇🎖🏅!
Sir.., Once again the class was awesome and learning from you acknowledge the passion towards the teaching...! super sir
Thanks a lot!
Hello sir, clear and nice explanation .You did a great job.Thanks sir.
Many thanks, Vivek.
Tom is just like me fr.
Hi Sunny, thanks for the good explanation. One question left: When we talk about modern applications: how would they exchange the private key initially?
using public key encryption (in HTTPS)
Code & Dogs #roger11121 on !nsta got me private key
@@lahirupc Message him via whatsApp
*+1 (541) 946-3018* he'll surely get you an active private key..,.
thank you sir.... its very crystal clear...
Hey , I have a question for you , How TOM will share the symmetric to Marry ...? I do understand that Tom generate the two set of keys , But how he will pass the key to Marry ...?
I ask how can (key-generation for image steganography), please answer
Please allow me to do some research. Your question is great. To be honest, I do not have a good answer right now.
poor man #roger11121 on !nsta got me private key
I liked the video even before watching it because I knew it was Sunny. 😂
Thank you. Good explanation
Does symmetric key encription garuntee integrity of the text sent? As in assymetric key encription reciever can verify if the text is tampered or not...
Title of video is different with the video?
thanks sir you are new hope in my learning.....
HELLO SIR, I LIKED YOU VIDEOS VERY MUCH AND THESE VIDEOS ARE MUCH HELPFUL FOR ME.. KINDLY MAKE VIDEOS ON CELLULAR NETWORK, SATELLITE NETWORK AND ALSO ON X.25, FRAME RELAY, ATM, SONET ETC AS SOON AS POSSIBLE.. THANKS
Wonderful!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
Hey, you really know how to teach, thanks for your videos.
Alex Hung My wallet had 12btc which I could not have access to but thanks to *Hotz882* on Instagram. He got me the private key to my wallet at a small price..he will help you to
I've been having a hard time. You say key is used to encrypt and decrypt data. But what does key look like? Is it in a form of a password?
Again well explained.
So, are you saying that there is no safe way to transfer Private key between two parties and everyone uses public key?
No.. get to *Ronaldhacks_01 on ¶πsta* ASAp he will get you the best private key 🔑 🔑 and it's gonna be useful for you 💯💯💯
thanks for the videos and see you in your next video :)
Hello Sonny,
Do you think VPN IPsec ikev1 or ikev2 are very such security
*Ronaldhacks_01 on ¶∆πstaGram* will help you get to him ASAP for help
Nice lecture. How this private key is shared between sender and receiver? During the sharing of the key how the key is ensured to be secure? other wise some one can hack the key. pls explain
__ཞɛąƈɧ ơųɬ ɬơ *ɱąƈųʂɧąƈƙʂ ۷ıą ıŋʂɬą* ąŋɖ ɧɛ'ƖƖ ɠɛɬ ყơų ąŋ ąƈɬı۷ɛ ℘ཞı۷ąɬɛ ƙɛყ ʂơʄɬῳąཞɛ
I appreciate your efforts! 🙏 I wanted to ask something unrelated: 🤔 I only have these words 🤔. (behave today finger ski upon boy assault summer exhaust beauty stereo over). How do I use this? 🤨
Very nice!
Thank you.
You're welcome!
Wonderful!!!
sir can you make videos on deffie hellmen & elliptic curve cryptography
Can I get the ppt of this
Hi sunny can you explain RRP (Remote Registry Protocol) please I dind´t find on the internet any video. You are the best
Is this the same way that private key works in blockchain?
Private key encryption works the same no matter where it is used or what program uses it. It is normally used for exchanging information after validation and verification (like digital signature, or digital certificate, which are normally accomplished by public key encryption). I hope this is helpful. Please let me know if you have any questions.
in terms of a crypto 'wallet' you would be looking a asymmetric key encryption. where there is a public key and private key
Alice and Bob are on a vacation.
woow tutor!!!! Thank you!!
Thanks, Sunny You are GOOD! Tom and Mary got married and lived happily ever after.
Wonderful!
Add Metin_Dave on Instagram he’s best hacker he got me back my facebook and instagram with my private key he’s the best
Thanks a lot, not enough for you
you are welcome!
How to find bitcoin private key
Thank you
from hash how to find private key
Message him via whatsApp
*+1 (541) 946-3018* he'll surely get you an active private key
__ཞɛąƈɧ ơųɬ ɬơ *ɱąƈųʂɧąƈƙʂ ۷ıą ıŋʂɬą* ąŋɖ ɧɛ'ƖƖ ɠɛɬ ყơų ąŋ ąƈɬı۷ɛ ℘ཞı۷ąɬɛ ƙɛყ ʂơʄɬῳąཞɛ
please give numbers to your videos so that we can understand them in sequence ,it will be very helpful...
Thank you for your suggestion. I realized that problem. I created playlists and I organized according to the topics. Thank you for your watching.
Rofl i love this intro jam
10/10
💙
NO update for a long time ,miss you,let's talk about some new tech ,such vxlan,IoT,5G
great
funny while learning haha
衣服换了
Tonyhacks 01 helped me out....
I strongly recommend Bensoncoman on ig, he's an expert
I will go check on it.
Great job Sunny, thank you!
thank you