Asymmetric Key Cryptography ll Information and Cyber Security Course Explained in Hindi

Поделиться
HTML-код
  • Опубликовано: 1 мар 2019
  • Myself Shridhar Mankar a Engineer l RUclipsr l Educational Blogger l Educator l Podcaster.
    My Aim- To Make Engineering Students Life EASY.
    Website - 5minutesengineering.com
    5 Minutes Engineering English RUclips Channel - / @5minutesengineeringen...
    Instagram - 5minuteseng...
    A small donation would mean the world to me and will help me to make AWESOME videos for you.
    • UPI ID : 5minutesengineering@apl
    Playlists :
    • 5 Minutes Engineering Podcast :
    • 5 Minutes Engineering ...
    • Aptitude :
    • Aptitude
    • Machine Learning :
    • Machine Learning
    • Computer Graphics :
    • Computer Graphics
    • C Language Tutorial for Beginners :
    • C Language Tutorial fo...
    • R Tutorial for Beginners :
    • R Tutorial for Beginners
    • Python Tutorial for Beginners :
    • Python Tutorial For Be...
    • Embedded and Real Time Operating Systems (ERTOS) :
    • Embedded and Real Time...
    • Shridhar Live Talks :
    • Shridhar Live Talks
    • Welcome to 5 Minutes Engineering :
    • Welcome To 5 Minutes E...
    • Human Computer Interaction (HCI) :
    • Human Computer Interac...
    • Computer Organization and Architecture :
    • Computer Organization ...
    • Deep Learning :
    • Deep Learning
    • Genetic Algorithm :
    • Genetic Algorithm
    • Cloud Computing :
    • Cloud Computing
    • Information and Cyber Security :
    • Information And Cyber ...
    • Soft Computing and Optimization Algorithms :
    • Soft Computing And Opt...
    • Compiler Design :
    • Compiler Design
    • Operating System :
    • Operating System
    • Hadoop :
    • Hadoop
    • CUDA :
    • CUDA
    • Discrete Mathematics :
    • Discrete Mathematics
    • Theory of Computation (TOC) :
    • Theory Of Computation ...
    • Data Analytics :
    • Data Analytics
    • Software Modeling and Design :
    • Software Modeling And ...
    • Internet Of Things (IOT) :
    • Internet Of Things (IOT)
    • Database Management Systems (DBMS) :
    • Database Management Sy...
    • Computer Network (CN) :
    • Computer Networks (CN)
    • Software Engineering and Project Management :
    • Software Engineering A...
    • Design and Analysis of Algorithm :
    • Design And Analysis Of...
    • Data Mining and Warehouse :
    • Data Mining and Warehouse
    • Mobile Communication :
    • Mobile Communication
    • High Performance Computing :
    • High Performance Compu...
    • Artificial Intelligence and Robotics :
    • Artificial intelligenc...

Комментарии • 155

  • @shivam-dua
    @shivam-dua 4 года назад +66

    This is how everything should be taught. short and precise. Thank You !

  • @riderannu740
    @riderannu740 3 месяца назад +2

    Gajab sir mare 3yr ki it course sirf apki video ki waja sa safal hu lot of thnx ❤

  • @dienzer9098
    @dienzer9098 7 месяцев назад +2

    we are all the same. a day or two, (for me 3 days) before exam, we all come to this channel

  • @jahnviarora8858
    @jahnviarora8858 2 года назад +3

    The only video where I could understand the concept ! Hatts off sir ! Thank you

  • @VishalParmar-nq4cu
    @VishalParmar-nq4cu 5 лет назад +5

    Great job sir. Thank you so much for sharing your knowledge

  • @MemeGlimpse
    @MemeGlimpse 5 лет назад +30

    Sir I just completed 12 class and I have a interest in cyber security so I daily watch your videos it's really helpful for me........
    Thank you so much for giving us your precious time
    - Nishant Tiwari

  • @gurmeetsingh8321
    @gurmeetsingh8321 4 года назад +3

    Thanks sir is video se sari confusion dur ho gyi

  • @amitprajapati4364
    @amitprajapati4364 4 года назад +3

    You are a great sir ..!
    The way you explaining it's easy to understand for everyone even that person's who doesn't know any thing like nothing !
    Once again thanks 🙂

  • @sufiyafatimakhan7301
    @sufiyafatimakhan7301 3 года назад +2

    ur technique of teaching is commendable ...... hats off!!!

  • @jyotipund1813
    @jyotipund1813 4 года назад +1

    Thank u sir.. Ur explanation is very understandable..keep it up👍

  • @RakeshKumar-gk3xk
    @RakeshKumar-gk3xk Год назад +1

    Sirf itna hi kahna chahunga sir....
    Love you Sir ❤️🤗

  • @vedbhanushali5705
    @vedbhanushali5705 8 месяцев назад +1

    Aap bhagwaan ho sir❤ Thank you so much🎉

  • @shubhamvishwakarma9300
    @shubhamvishwakarma9300 5 лет назад +3

    sir you explain too good. i a understanding all the things whatever you are uploading.

  • @armanalirahul
    @armanalirahul 4 года назад +1

    thanks sir .....for video its totally understandable video and your mentos dialogue its awesome dialogue help me in mind fresh ....thank you sir

  • @VickysWeb
    @VickysWeb 2 года назад +8

    Watching this full playlist just 3 hrs before my CSS exam in 2x and it is really useful
    Thanks a lot

    • @kapil.9
      @kapil.9 7 месяцев назад +1

      us moment 🤝

  • @nisharathod175
    @nisharathod175 4 года назад +3

    Thank you sooooooooooooo much for this video sir.this video is very helpful for my exam😊

  • @sapnabhalekar83
    @sapnabhalekar83 5 лет назад +2

    Thank you so much sir
    It's really helpful for exam 😊

  • @fatimaiqra2169
    @fatimaiqra2169 Год назад +1

    quick and easy way....thanks

  • @technicalvines3360
    @technicalvines3360 5 лет назад +3

    Great Explanation Sir

  • @SaileeShingare
    @SaileeShingare 3 года назад +1

    Great explanation. Thank you sir

  • @SRam2468
    @SRam2468 2 года назад +1

    Super explaination bai! Thank u 😊

  • @shefalichauhan3310
    @shefalichauhan3310 Год назад +1

    You explained so clearly!!

  • @sreejeshstark7018
    @sreejeshstark7018 5 лет назад +2

    Your explanation is asome,... Too good sir

  • @ASh-hb1ub
    @ASh-hb1ub 3 года назад +1

    Many thanks to our Shridhar sir for this good video..👌👌👏👏👍👍🧡🧡💙💙💜💜💛💛❣❣💖💖⚘⚘🌸🌸💐🌻💐🌻

  • @dhruvilpatel2886
    @dhruvilpatel2886 3 года назад +1

    Sir fabulous good work i attend your all class
    In this time our exam is come if your video is not on youtube then we can not understand network security in very easy way heartly thanks a lot.....

  • @maxpayne880
    @maxpayne880 5 лет назад +5

    Thank you sir...please try to cover RSA,Diffie Hellman,ECC,key distribution, Authentication methods,Authentication protocol,Digital signatures

  • @fabe-mr5cl
    @fabe-mr5cl 5 лет назад +2

    great sir thanks alot ..............................

  • @cloudyyoutube9844
    @cloudyyoutube9844 Год назад +1

    Thanku so much sir easily understood.

  • @manavjoshi3053
    @manavjoshi3053 3 года назад +1

    Sir fabulous good work i attend your all class
    In this time our exam is come if your video is not on youtube then we can not understand network security in very easy way heartly thanks 😊

  • @mussuDIYcrafts07
    @mussuDIYcrafts07 3 года назад +1

    Awesome teaching sir... Tussi Genious Ho😊

  • @deepakgaroda975
    @deepakgaroda975 3 года назад +1

    Thank you so much sir for easy explain Karne k liye 😊

  • @kushpatel4811
    @kushpatel4811 Год назад +1

    Jordar sir 👍👍

  • @unknownyt3144
    @unknownyt3144 Год назад

    Omg! Too good sir!!!

  • @muditmathur2078
    @muditmathur2078 5 лет назад +2

    Bhot jordar sir kal mere exam hai aur aapke lecture ne doubts clear kr diye

  • @KA-oi4yf
    @KA-oi4yf Год назад +1

    Amazing explanation sir 👏

  • @sudhanshupal4427
    @sudhanshupal4427 5 лет назад +1

    Thanks a lot Sir !!!

  • @syednoorkalim7424
    @syednoorkalim7424 Год назад

    Excellent training

  • @bishnulimbu5499
    @bishnulimbu5499 2 года назад +1

    Thank you sir... Love from Nepal♥️♥️

  • @tayyabhassan1529
    @tayyabhassan1529 4 года назад

    Good. Really Helpful

  • @AmitProgue28
    @AmitProgue28 3 года назад

    Verrrrryyyyy simple and lucid

  • @Itsmeyouranimelover
    @Itsmeyouranimelover 5 лет назад +2

    love the way u teach

  • @afridis3779
    @afridis3779 4 года назад

    SAABASH ! 😎😎😎. Thank you sir

  • @Vishalsharma-cn2nx
    @Vishalsharma-cn2nx 2 года назад

    Too good 👍

  • @hardiksingh4956
    @hardiksingh4956 4 года назад

    Nice work!

  • @deeprattan3781
    @deeprattan3781 2 года назад

    Awesome explanation..

  • @Mycreatop
    @Mycreatop Год назад

    Best explanation 👍

  • @sfdc_cheetah
    @sfdc_cheetah 4 года назад +1

    Love the way he teach

  • @abhinavmishra5334
    @abhinavmishra5334 2 года назад

    Nice video very helpful

  • @md.abdulmonemsarker3711
    @md.abdulmonemsarker3711 4 года назад +1

    Thanks sir..❤❤

  • @nehajoshi6460
    @nehajoshi6460 3 года назад +1

    Very nicely explained

  • @Raj-rw2fk
    @Raj-rw2fk 4 года назад

    osm explanation sir thank u

  • @sohamvirda7914
    @sohamvirda7914 4 года назад

    Grate job sir...

  • @PUZZLE__PROGRAMMER
    @PUZZLE__PROGRAMMER 3 года назад +1

    Thank You sir. ❤️❤️❤️❤️❤️❤️❤️❤️❤️❤️❤️❤️❤️❤️❤️❤️❤️❤️❤️❤️❤️❤️❤️❤️❤️

  • @avisahani8637
    @avisahani8637 5 лет назад +2

    Thank you sir

  • @chaitanyabansode1783
    @chaitanyabansode1783 3 года назад

    Very good👍👍👍

  • @aneeschughtai6725
    @aneeschughtai6725 2 года назад

    Thank u so much sir

  • @vijaysherkhane1437
    @vijaysherkhane1437 3 года назад +3

    Guys 169 subscribers but only 2.2k likes....common he deserves more much more.....lots of love....Vijay

  • @nazarmohammadziarmal3941
    @nazarmohammadziarmal3941 4 года назад

    amazing sir

  • @poojapatidar6787
    @poojapatidar6787 4 года назад +1

    Osam sir

  • @patelyash530
    @patelyash530 5 лет назад +11

    thank you so much sir! by watching ur videos on INS, i learned a lot of topics easily! just because of you i scored AA in my externals in my 7th sem of comp. engg. exam!
    please upload more videos on AI, since i have AI as a main sub. in my final sem!

  • @codeattraction2070
    @codeattraction2070 4 года назад

    Thanks a lot

  • @varunpratap6785
    @varunpratap6785 4 года назад

    Best explanation

  • @kdsouza4507
    @kdsouza4507 Год назад

    Thank you

  • @devendrabhuarya4917
    @devendrabhuarya4917 Год назад

    Thanks 🙏🙏

  • @ashutoshgupta2127
    @ashutoshgupta2127 4 года назад

    Best video

  • @SK-mt2wb
    @SK-mt2wb Год назад +1

    jazallahu khair

  • @ashwanirajput4281
    @ashwanirajput4281 Год назад

    Thanks

  • @AnkitChaurasiyaVlog
    @AnkitChaurasiyaVlog 3 года назад

    best video

  • @kshitijbarapatre6276
    @kshitijbarapatre6276 Год назад +1

    6:28 chotta was great

  • @djprithvi5761
    @djprithvi5761 Год назад

    Thanks sir, now pls explain elliptic curve cryptography...

  • @TheAppAlchemist
    @TheAppAlchemist 2 года назад +1

    thanks for makeing me understand this,
    please don't repeat yourself

  • @SportsGala-ks2xp
    @SportsGala-ks2xp 8 месяцев назад

    Goood sir

  • @nazishsultana5273
    @nazishsultana5273 4 года назад +1

    😊😍🤗🤗 Allah bless you 😇❣️

  • @siddharthvadakkedath6616
    @siddharthvadakkedath6616 4 года назад +1

    Sirji🙏

  • @konanaznin6469
    @konanaznin6469 3 года назад +1

    Sir can you make videos on Hash function Cryptography in details .That will be very helpful.

  • @sheikhshoab4124
    @sheikhshoab4124 4 года назад

    Ty sir .....MAC algorithm study kara do

  • @easy_life345
    @easy_life345 5 лет назад

    sir you are amazing big salute from pakistan

  • @prashantthakur5698
    @prashantthakur5698 5 лет назад

    Sir how the keys r shared plz tell and one more question agr koi attacked vo poory chipher data ko change krky apna data daal de fir kya hoga.... Ya fir aisa ho skta h..

  • @shaheennizam1680
    @shaheennizam1680 4 года назад

    Bro u are joss 😍 from 🇧🇩🇧🇩

  • @mdtipusultan327
    @mdtipusultan327 4 года назад

    sir.... In "Network Security Model II video" U said that key are provide by Trust third party (TTP).
    but in this video u are saying that sender and receiver should have own public and private key.
    please explain sir ................

  • @wildyato3737
    @wildyato3737 3 года назад +1

    Asymmetric encryption example of modem changing analog to digital and vice versa (I know this video is not one of them, it's my point of view)
    Also it is better than symmetric encryption

  • @aakibmajeed6687
    @aakibmajeed6687 3 года назад

    Sir do mention why's and how's of the topic ,☺

  • @lalatenduguru8121
    @lalatenduguru8121 4 месяца назад +1

    chottey...btw i love you bro

  • @NidhiSingh-em8pf
    @NidhiSingh-em8pf 5 лет назад +5

    Thnku so mch sir!! Sir u r amazing...the way u r teaching is awesome...sir, u r the jitu bhaiya of Kota factory 😊

  • @InspiringthePlanet
    @InspiringthePlanet 4 года назад

    Can you please tell in which cases encrypted message is digested ?

  • @JayPatel-qe9sd
    @JayPatel-qe9sd 4 года назад +1

    Digital signature and asymmetric are using public key in opposite parts ???????

  • @freethinkers3680
    @freethinkers3680 4 года назад

    please make video on the unix linux programming 🙏

  • @gouthamv2109
    @gouthamv2109 3 года назад +1

    Private key used in decryption process, how can it correlation with the cipher text, how can he open the message as the private key is not shared

  • @shashantchaudhary5636
    @shashantchaudhary5636 4 года назад

    Sir agr ap notes bhi bnwate to kafi help ho jti exam ke liye notes banane mee

  • @naveenrawal9594
    @naveenrawal9594 4 года назад

    sir agar public key use kar ke enycriotion use kiya jata hai or private se decrypt kiya jata hai to iska matlab hai ki public or private key mein kuch to same hoga na suppose mein aap ko ek mesg bejta hoin hello encrypt kar ke sender ki public key key ke through to aap use private ke through decrypt kaise kar sakte ho .

  • @begooddogood9898
    @begooddogood9898 5 лет назад

    Sir
    I have one doubt for studying cyber security course ur saying full about cryptography..
    Actually you have say abt Linux usage, Metasploitable 2 tools na
    Reply me if possible sir
    And Also say me which topics I have to cover the cyber security

  • @arvindchauhan5214
    @arvindchauhan5214 3 года назад

    Sir, digital signature me thik iska Ulta key use HOTA hai kya

  • @77Thegamer777
    @77Thegamer777 Год назад +1

    le chotte log: aise situtation me bar bar aage kaise aa jata hun !!!!

  • @deepgajera1006
    @deepgajera1006 4 года назад +1

    Aagar privat key sif reciever ko hi pata he to sender ause encrypt kese kare ga
    Quki for encryption and decryption same key is used
    A
    Otherwise it is impossible to encrypt and decrypt

  • @devdatt1823
    @devdatt1823 4 года назад

    Interested vedios

  • @harshalohana4958
    @harshalohana4958 2 года назад

    Encryption key hoti hai vo always decryption key ki reverse hi hogi na to public key ki oposite private hogi. To agar public key sab ko pata hoga to uska reverse karke attack kr sakta hai n. ?

  • @subhashreepr7601
    @subhashreepr7601 3 года назад +1

    Agar attacker ke pass receiver ki public key hai and encrypted message vi hai to wo kya decide nehi kar sakta hai ki aisa kounsa msg hai jisko wo receiver ka public key lagane me ye encrypted msg aya hai?

  • @PankajSharma-cy9lk
    @PankajSharma-cy9lk 5 лет назад

    Sir digital signature me to sender ki private key se encrypt kiya jata h or sender ki public key se decrypt kiya jata h... Kya reason h

  • @devan9718
    @devan9718 2 года назад

    So what is the use of sender private key and public key in it.i'm not getting it

  • @muhammadrehmankhan6073
    @muhammadrehmankhan6073 4 года назад

    if attacker get the msg and encrpt it again with the Reciver public key and and send it to receiver than what?