Asymmetric Key Cryptography ll Information and Cyber Security Course Explained in Hindi
HTML-код
- Опубликовано: 1 мар 2019
- Myself Shridhar Mankar a Engineer l RUclipsr l Educational Blogger l Educator l Podcaster.
My Aim- To Make Engineering Students Life EASY.
Website - 5minutesengineering.com
5 Minutes Engineering English RUclips Channel - / @5minutesengineeringen...
Instagram - 5minuteseng...
A small donation would mean the world to me and will help me to make AWESOME videos for you.
• UPI ID : 5minutesengineering@apl
Playlists :
• 5 Minutes Engineering Podcast :
• 5 Minutes Engineering ...
• Aptitude :
• Aptitude
• Machine Learning :
• Machine Learning
• Computer Graphics :
• Computer Graphics
• C Language Tutorial for Beginners :
• C Language Tutorial fo...
• R Tutorial for Beginners :
• R Tutorial for Beginners
• Python Tutorial for Beginners :
• Python Tutorial For Be...
• Embedded and Real Time Operating Systems (ERTOS) :
• Embedded and Real Time...
• Shridhar Live Talks :
• Shridhar Live Talks
• Welcome to 5 Minutes Engineering :
• Welcome To 5 Minutes E...
• Human Computer Interaction (HCI) :
• Human Computer Interac...
• Computer Organization and Architecture :
• Computer Organization ...
• Deep Learning :
• Deep Learning
• Genetic Algorithm :
• Genetic Algorithm
• Cloud Computing :
• Cloud Computing
• Information and Cyber Security :
• Information And Cyber ...
• Soft Computing and Optimization Algorithms :
• Soft Computing And Opt...
• Compiler Design :
• Compiler Design
• Operating System :
• Operating System
• Hadoop :
• Hadoop
• CUDA :
• CUDA
• Discrete Mathematics :
• Discrete Mathematics
• Theory of Computation (TOC) :
• Theory Of Computation ...
• Data Analytics :
• Data Analytics
• Software Modeling and Design :
• Software Modeling And ...
• Internet Of Things (IOT) :
• Internet Of Things (IOT)
• Database Management Systems (DBMS) :
• Database Management Sy...
• Computer Network (CN) :
• Computer Networks (CN)
• Software Engineering and Project Management :
• Software Engineering A...
• Design and Analysis of Algorithm :
• Design And Analysis Of...
• Data Mining and Warehouse :
• Data Mining and Warehouse
• Mobile Communication :
• Mobile Communication
• High Performance Computing :
• High Performance Compu...
• Artificial Intelligence and Robotics :
• Artificial intelligenc...
This is how everything should be taught. short and precise. Thank You !
Gajab sir mare 3yr ki it course sirf apki video ki waja sa safal hu lot of thnx ❤
we are all the same. a day or two, (for me 3 days) before exam, we all come to this channel
The only video where I could understand the concept ! Hatts off sir ! Thank you
Great job sir. Thank you so much for sharing your knowledge
Sir I just completed 12 class and I have a interest in cyber security so I daily watch your videos it's really helpful for me........
Thank you so much for giving us your precious time
- Nishant Tiwari
hello abhi kiya kr rahe ho
@@how__geography__looks__like__ 😂😂🤣🤣
Thanks sir is video se sari confusion dur ho gyi
You are a great sir ..!
The way you explaining it's easy to understand for everyone even that person's who doesn't know any thing like nothing !
Once again thanks 🙂
ur technique of teaching is commendable ...... hats off!!!
Thank u sir.. Ur explanation is very understandable..keep it up👍
Sirf itna hi kahna chahunga sir....
Love you Sir ❤️🤗
Aap bhagwaan ho sir❤ Thank you so much🎉
sir you explain too good. i a understanding all the things whatever you are uploading.
thanks sir .....for video its totally understandable video and your mentos dialogue its awesome dialogue help me in mind fresh ....thank you sir
Watching this full playlist just 3 hrs before my CSS exam in 2x and it is really useful
Thanks a lot
us moment 🤝
Thank you sooooooooooooo much for this video sir.this video is very helpful for my exam😊
Thank you so much sir
It's really helpful for exam 😊
quick and easy way....thanks
Great Explanation Sir
Great explanation. Thank you sir
Super explaination bai! Thank u 😊
You explained so clearly!!
Your explanation is asome,... Too good sir
Many thanks to our Shridhar sir for this good video..👌👌👏👏👍👍🧡🧡💙💙💜💜💛💛❣❣💖💖⚘⚘🌸🌸💐🌻💐🌻
Sir fabulous good work i attend your all class
In this time our exam is come if your video is not on youtube then we can not understand network security in very easy way heartly thanks a lot.....
Thank you sir...please try to cover RSA,Diffie Hellman,ECC,key distribution, Authentication methods,Authentication protocol,Digital signatures
great sir thanks alot ..............................
Thanku so much sir easily understood.
Sir fabulous good work i attend your all class
In this time our exam is come if your video is not on youtube then we can not understand network security in very easy way heartly thanks 😊
Awesome teaching sir... Tussi Genious Ho😊
Thank you so much sir for easy explain Karne k liye 😊
Jordar sir 👍👍
Omg! Too good sir!!!
Bhot jordar sir kal mere exam hai aur aapke lecture ne doubts clear kr diye
Amazing explanation sir 👏
Thanks a lot Sir !!!
Excellent training
Thank you sir... Love from Nepal♥️♥️
Good. Really Helpful
Verrrrryyyyy simple and lucid
love the way u teach
SAABASH ! 😎😎😎. Thank you sir
Too good 👍
Nice work!
Awesome explanation..
Best explanation 👍
Love the way he teach
Nice video very helpful
Thanks sir..❤❤
Very nicely explained
osm explanation sir thank u
Grate job sir...
Thank You sir. ❤️❤️❤️❤️❤️❤️❤️❤️❤️❤️❤️❤️❤️❤️❤️❤️❤️❤️❤️❤️❤️❤️❤️❤️❤️
Thank you sir
Very good👍👍👍
Thank u so much sir
Guys 169 subscribers but only 2.2k likes....common he deserves more much more.....lots of love....Vijay
amazing sir
Osam sir
thank you so much sir! by watching ur videos on INS, i learned a lot of topics easily! just because of you i scored AA in my externals in my 7th sem of comp. engg. exam!
please upload more videos on AI, since i have AI as a main sub. in my final sem!
Thanks a lot
Best explanation
Thank you
Thanks 🙏🙏
Best video
jazallahu khair
Thanks
best video
6:28 chotta was great
Thanks sir, now pls explain elliptic curve cryptography...
thanks for makeing me understand this,
please don't repeat yourself
Goood sir
😊😍🤗🤗 Allah bless you 😇❣️
Sirji🙏
Sir can you make videos on Hash function Cryptography in details .That will be very helpful.
Ty sir .....MAC algorithm study kara do
sir you are amazing big salute from pakistan
Sir how the keys r shared plz tell and one more question agr koi attacked vo poory chipher data ko change krky apna data daal de fir kya hoga.... Ya fir aisa ho skta h..
Bro u are joss 😍 from 🇧🇩🇧🇩
sir.... In "Network Security Model II video" U said that key are provide by Trust third party (TTP).
but in this video u are saying that sender and receiver should have own public and private key.
please explain sir ................
Asymmetric encryption example of modem changing analog to digital and vice versa (I know this video is not one of them, it's my point of view)
Also it is better than symmetric encryption
Sir do mention why's and how's of the topic ,☺
chottey...btw i love you bro
Thnku so mch sir!! Sir u r amazing...the way u r teaching is awesome...sir, u r the jitu bhaiya of Kota factory 😊
Hehe... right 😁
Lmao noobs 😪
Can you please tell in which cases encrypted message is digested ?
Digital signature and asymmetric are using public key in opposite parts ???????
please make video on the unix linux programming 🙏
Private key used in decryption process, how can it correlation with the cipher text, how can he open the message as the private key is not shared
Sir agr ap notes bhi bnwate to kafi help ho jti exam ke liye notes banane mee
sir agar public key use kar ke enycriotion use kiya jata hai or private se decrypt kiya jata hai to iska matlab hai ki public or private key mein kuch to same hoga na suppose mein aap ko ek mesg bejta hoin hello encrypt kar ke sender ki public key key ke through to aap use private ke through decrypt kaise kar sakte ho .
Sir
I have one doubt for studying cyber security course ur saying full about cryptography..
Actually you have say abt Linux usage, Metasploitable 2 tools na
Reply me if possible sir
And Also say me which topics I have to cover the cyber security
Sir, digital signature me thik iska Ulta key use HOTA hai kya
le chotte log: aise situtation me bar bar aage kaise aa jata hun !!!!
Aagar privat key sif reciever ko hi pata he to sender ause encrypt kese kare ga
Quki for encryption and decryption same key is used
A
Otherwise it is impossible to encrypt and decrypt
Interested vedios
Encryption key hoti hai vo always decryption key ki reverse hi hogi na to public key ki oposite private hogi. To agar public key sab ko pata hoga to uska reverse karke attack kr sakta hai n. ?
Agar attacker ke pass receiver ki public key hai and encrypted message vi hai to wo kya decide nehi kar sakta hai ki aisa kounsa msg hai jisko wo receiver ka public key lagane me ye encrypted msg aya hai?
Sir digital signature me to sender ki private key se encrypt kiya jata h or sender ki public key se decrypt kiya jata h... Kya reason h
So what is the use of sender private key and public key in it.i'm not getting it
if attacker get the msg and encrpt it again with the Reciver public key and and send it to receiver than what?