thanku bhaya this big and soo... big help for me in my exam shree ram ji aap ko bhala karay bhaya🕣🙏🙏🙏🙏🙏👇👇👇👇👇👇👇👇👇👇👇👇🙏🙏🙏🙏🙏🙏🙏🙏🙏🙏🙏🙏🙏🙏🙏🙏🙏🙏🙏👇👇👇👇👇👇👇👇👇🙏🙏🙏🙏🙏🙏🙏🙏🙏🙏🙏🙏🙏🙏🙏🙏🙏🙏🙏🙏🙏🙏🙏🙏🙏🙏🙏🙏🙏🙏🙏🙏🙏🙏🙏🙏🙏🙏🙏🙏🙏🙏🙏
If public key is used to decrypt then intruders can attack during transmission because public key can be known to others also..so what is the use of encryption here if you could answer?
I think the encryption he is talking about is not about the message,its about the signature. Only sender (let's say A) can create his signature so private key makes sense,anyone can verify that signature belongs to A so public key of A can be used
You are thinking in right direction as per cryptography but here we are checking the authenticity of the msg that A has sent the msg or not. So for data security purpose we use double encryption first msg encrypted with B's public key then encrypted with A's private key. And now at receiver end B first decrypt with A' public key ( these authentic that it's coming from A) then he decrypt the msg with its(B) private key.
well i'm a bit confused ..as per my knowledge we encrypt data using public key and decrypt data with private key...then why the reverse is being done here?? please explain
Brother it's for authentication Authentication is received if A decrypts with his own private key if a done with b public key then it's not authentic that A send mssg because B public key is all over on Internet
He missed.... let me help you (if this exact question u r asking) suppose, A as Sender B as Reciever, obviously, A has some plain text (PT) private key of A (PrKA) and public key of A(PuKA) private key of B (PrKB) and public key of B(PuKB) {Note---> PuKA ( PrKA =None OR we can say they can cancel one another}..............................................................................(NOTE) Now the game begins.... A--> PT --> PrKA (PT)--> PuKB (PrKA (PT)) Now (PuKB (PrKA (PT))) becomes a Free Electron and only B can get it. now,B has a Free electron, and his private key(PrKB) also. B -->PrKB ( PuKB (PrKA (PT))) B-->PrKA(PT)......... .............................................(from NOTE) Now B goes to google and asks for Public key of A B-->PuKA(PrKA(PT)) B--> (PT)......................................... (from NOTE) Hurrah!!!!!!! (Pls let me know the feedback, I will erase it otherwise)
To everyone who is asking about hw we can decrypt the data using the public key. To validate the data's integrity, the recipient first uses the signer's public key to decrypt the digital signature. The recipient then uses the same hashing algorithm that generated the original hash to generate a new one-way hash of the same data.
Agr beech me message alter hua hai to last step me message ko hash function me daalne pr jo hash aaya aur jo first step me message ko hash function me dalne pr hash aaya tha, vo same kse hoga jb message hi change hogya ??
11:57 your using private key of user-A. So, anyone with public key of user-A can decrypt the message and get the msg and hash So, how are we achieving confidentiality here. And in the last fig @ 12:50 we achieved confidentiality, non-repudiation and integrity.
I have a ques sir.. i studied somewhere that we should encrypt the msg with the help of public key of receiver and receiver will decrypt it with his private key to maintain confidentiality but here you said the opposite. I know you said there is no use of confidentiality but still its a doubt. What key should we use to encrypt a msg and vice versa. HOPE YOU WILL REPLY.
In normal situations it is ok but in digital signature concept we will have to ise the private key of the sender so that hame pata chal sake ki ha yahi banda i.e. sender h jo hame msh bhejra h
in your earlier video of Hash/MAC Function, you didn't mention anything about Integrity. Could you confirm if in any scenario (that you discussed) we would be achieving integrity along with authentication and confidentially?
There is the concept of message integrity basis where the message will have the digest if the digest matches the public key of the receiver then the integrity of the message is achieved
Can you please let me know the text book you are using.
Cryptography and network security by behrouz A Forouzan
@@AbhishekSharmaDit thanks a lot
@@AbhishekSharmaDit thanks again
yeah it was good
you are from pakistan
That why I love indian boy explaining things on pen paper
Bhai fan ho gaya main tumhara.. Bas tumhare hi lecture se padha hai maine... Love u bro..
This is the best channel for semster preperation .The content is really structural and exact.
Integrity= hash function
authentication= digital signature
confidentiality= encryption
Waah kya baat hai
Authentication=Mac 🤔
waise availibility hota hai a ke lie
@@tejas_machchhar yes signature and mac both provide authentication, but digital signature provides non repudiation and mac do not
a very good work and thank you for clearing our concepts . loved your video, it is very useful as semester exam point of view.
thanku bhaya this big and soo... big help for me in my exam shree ram ji aap ko bhala karay bhaya🕣🙏🙏🙏🙏🙏👇👇👇👇👇👇👇👇👇👇👇👇🙏🙏🙏🙏🙏🙏🙏🙏🙏🙏🙏🙏🙏🙏🙏🙏🙏🙏🙏👇👇👇👇👇👇👇👇👇🙏🙏🙏🙏🙏🙏🙏🙏🙏🙏🙏🙏🙏🙏🙏🙏🙏🙏🙏🙏🙏🙏🙏🙏🙏🙏🙏🙏🙏🙏🙏🙏🙏🙏🙏🙏🙏🙏🙏🙏🙏🙏🙏
Thnk u sir really helpfull .. ❤❤
Bahut achha explain kiye hai bhaiya
Before teaching us our teacher learns from ur video then teach us ..... :)
Well explained 👍💯
Very important information you will get
Kya hum project me use kr sakte he apka knowledge?
Realy like ur way of Teaching thumbs up👍❣️
Sir ,I like the way you teaching
A good explanation 😊
Very nice explanation.. thank u so much
Thank you bhaiya , ye kafi accha explanation tha
Once again, here one night before the exam. Thank you...
Amazing explanation
If public key is used to decrypt then intruders can attack during transmission because public key can be known to others also..so what is the use of encryption here if you could answer?
ya he made blunder out there
I think the encryption he is talking about is not about the message,its about the signature. Only sender (let's say A) can create his signature so private key makes sense,anyone can verify that signature belongs to A so public key of A can be used
Public key is used for encription while private key is used for decription.
You are thinking in right direction as per cryptography but here we are checking the authenticity of the msg that A has sent the msg or not.
So for data security purpose we use double encryption first msg encrypted with B's public key then encrypted with A's private key. And now at receiver end B first decrypt with A' public key ( these authentic that it's coming from A) then he decrypt the msg with its(B) private key.
It is not used for confidentiality …used for non repudiation only
superb 👍👍
U r to good bhai ....❤️
Very nice explanation
Your videos are very helpful to us....thank you... 😊
Well understood .thanku bro!
Nice,explanation bro..👍👍
Superb ♥️
*Great*
At 5:58 only the hash must be encrypted using the private key of A and not the message.
bhai jaan bacha liya yaar
tmro is my end sem exam and this video stopped my cry
great help thanks great video
well i'm a bit confused ..as per my knowledge we encrypt data using public key and decrypt data with private key...then why the reverse is being done here?? please explain
@@girisharora945 okk thanks
Brother it's for authentication Authentication is received if A decrypts with his own private key if a done with b public key then it's not authentic that A send mssg because B public key is all over on Internet
thank you so much
kindly sir upload the lecture on Arbitrated Digital Signature ...
Good explanation liked it can u plz explain about elliptical curve digital signature algorithm......
Can you explain the hash thing it with an example? Explain it with some msg written in email
ye notes ka pdf milega kya
encryption is done through public key
decryption is done through private key
pls check your video again
Thank you..
Even the message also changes right if some hacker attacks.....why will it be the same? @7:53
Can you share your notes of all encryption series???
Which book you use in video
Please make video on hyperelliptic curve cryptography
JAZAK ALLAH sir
bhai....🙏🏻🙏🏻...bachaliya tumne 😪😭
thank you sir
Why we are using private key of A for encryption ???
It must be public key of B? Correct me if I am wrong
Can u plz make the vdo of kerberos encryption using non-cryptographic tools
Is this dsa method ?
kass app digital certificate ka bhi bana dete itna aacha sabhji video banate ho aap
Sir if we want confidentiality too which algorithm should be used!???Should DESor AES be used??
If someone agree and give his concent through email but no signature on agreement is this considered as valid document?
Vha hash/message ki place pr cipher aayega after encryption
Bhaiya apne jo general copect ka diagram banaya usme aapne Singing algo toh use he nahi kiya
toh vo digital signature ka general concept kese hua?
Public key is in encryption and lrivate key in decryption
Justice for person B 🙏 ❤️
Any user will have the public key of A, so how the confidentiality will be maintained for second case?
He missed....
let me help you (if this exact question u r asking)
suppose, A as Sender B as Reciever,
obviously, A has some plain text (PT)
private key of A (PrKA) and public key of A(PuKA)
private key of B (PrKB) and public key of B(PuKB)
{Note---> PuKA ( PrKA =None OR we can say they can cancel one another}..............................................................................(NOTE)
Now the game begins....
A--> PT --> PrKA (PT)--> PuKB (PrKA (PT))
Now (PuKB (PrKA (PT))) becomes a Free Electron and only B can get it.
now,B has a Free electron, and his private key(PrKB) also.
B -->PrKB ( PuKB (PrKA (PT)))
B-->PrKA(PT)......... .............................................(from NOTE)
Now B goes to google and asks for Public key of A
B-->PuKA(PrKA(PT))
B--> (PT)......................................... (from NOTE)
Hurrah!!!!!!!
(Pls let me know the feedback, I will erase it otherwise)
You force me to comment yar! Dam clear all doubt of mine .
To everyone who is asking about hw we can decrypt the data using the public key. To validate the data's integrity, the recipient first uses the signer's public key to decrypt the digital signature. The recipient then uses the same hashing algorithm that generated the original hash to generate a new one-way hash of the same data.
Bhai mcqs hr topic pr btado.. Bca final year is mcqs based this time
msg aur hash dono ko kyu encrypt krenge, only hash ko encrypt krenge na using private key of A ?
Bhai public key se encryption hota hai and private se decryption
Can you solve sums based on this
Bhaiya ye hash function se only signature ko digitial signaure me convert krate h ky ,
Ya fir pura msg bhi convert hota h private key se,
Aapne HMAC ki video nhi dali hai kya
Can we get PDFs? Of your lecture notes
Sir app word expand algorithm of rsa ma ek video bna do plxx
kya ap oo book author ka name bata sakte hoo ?
Bhai digital signature ka koi mathematical base example nhi h ky?
WHAT IS Digital 33 Signature ?????
Agr beech me message alter hua hai to last step me message ko hash function me daalne pr jo hash aaya aur jo first step me message ko hash function me dalne pr hash aaya tha, vo same kse hoga jb message hi change hogya ??
Synopsis kese bnai jati a
Cryptography and network security ke book ki pdf mil sakati hai kya??
Bro, can u share your book's PDF file?
11:57 your using private key of user-A. So, anyone with public key of user-A can decrypt the message and get the msg and hash
So, how are we achieving confidentiality here.
And in the last fig @ 12:50 we achieved confidentiality, non-repudiation and integrity.
It's public key in Encryption
No, Private key is used for encryption
Can you share the notes
Sir can you send the notes of cryptography
I have a ques sir.. i studied somewhere that we should encrypt the msg with the help of public key of receiver and receiver will decrypt it with his private key to maintain confidentiality but here you said the opposite. I know you said there is no use of confidentiality but still its a doubt. What key should we use to encrypt a msg and vice versa. HOPE YOU WILL REPLY.
In normal situations it is ok but in digital signature concept we will have to ise the private key of the sender so that hame pata chal sake ki ha yahi banda i.e. sender h jo hame msh bhejra h
To encrypt the msg we will use hash function concept along with digital signature
Aage series follow karo sab clear hota jayega
10:00
in your earlier video of Hash/MAC Function, you didn't mention anything about Integrity. Could you confirm if in any scenario (that you discussed) we would be achieving integrity along with authentication and confidentially?
There is the concept of message integrity basis where the message will have the digest if the digest matches the public key of the receiver then the integrity of the message is achieved
Kya apne tcp congestion control algo PE video bnaii haii btaa do
No nahi dali h
@@AbhishekSharmaDit ohkkk 😔
@@himachalivloggershipali6299 kisi or channel m dekh lo ..isko vse b smjhana nhi aata
Thank you
Encryption is a public key and decryption is private key
No, Private key is used for encryption and public key for decryption
Sir can you please explain the video in English also ..
Digital signature bs itna hi h?...sir mjhe Google doc, e-mail, social media handle k classes mil skte h
kon sa book use karo rahai ho ??
Fourozon dcna and security
Please short me thoda slow explain kare sir
Digital copyrights and search engine pe apne video upload ki h kya sir? If yes then please provide me that link.
Please sir.. explain the video English to English all videos
Sur can u provide a note for this question for 15 marks!
A k public key kahase milega bhai....A ko pblic key v B ko bhejna parega kya?
Nhi public key toh public hai wo sbko pata hoti hai
Please provide notes any video
But A public key know to everyone so theere is no confidentiality anyone can acess A message
Sub thik hai
Vo baingan ka hand writing change Karo Bhai
yahh
Are you from Dehradun?
Yes
Areh sahuu tum bhi Yaha😂😂✋✋
@@tenabisht sab doon se hi ho kya? 😂
@@AbhishekSharmaDit Haan mtlb hum teeno Doon se hi hn😂
Abe yar😂😂
bro concept clear krke btao or har part ko alag alag krke, or yaha waha ye wo shbd mat istmaal kiya kro, kuch clear ni hota,
Ycce gang wya
Smjhaty ap bht acha hyn but apki handwriting smjh nahi ati r kuch words miss ho jty hyn kindly esi handwritting kryn k smjh bhi to ay kia likha hy
Bhai itna acha video bna ra ho full support ha aapko keep doing the good work . Jo like support ni kar ra chutiya ha