HI VIEWERS THERE IS A SMALL MISTAKE WHILE WRITING THE FORMULA AND IN THE EXAMPLE PROBLEM. At THE TIME 9:18 CORRECT ONE : PUBLIC KEY OF USER A WRONG ONE : WRITTEN AS PUBLIC KEY OF USER B AT THE TIME 25:01 CORRECT ONE : POWER IS XB WRONG ONE : WRITTEN POWER AS XA PLEASE MAKE A CORRECTION AND I AM SORRY FOR THE MISTAKE.
What a nice explanation, a person who even does every small calculations (multiplications and divisions) to make the student understand. Thank you sir, you efforts were well received and appreciated.
hi aravind thanks for your interest towards our channel and share my sessions with your friends and subscribe to our channel.Keep following our channel.
That is the indian teacher talent. Nowhere in the world like India guru. Only demon lacking is lack of technology. Otherwise India could be in number one position in the world with moral education. You are superb sir. You have lot patiency and did wonderful job to make sense me by crystal clear explanation. You are the wonderfull hero and true guru.
Sir you have helped me a lot sir during my exams time. Your explonation is very goood and clear. Keep maintian that sir. You are one of the best teacher in my study career. I was scared about this subject and i found you on youtube. Now i learned lot of subject. Thank you very much sir.
wonderfully explained. one small doubt. how do the sender and receiver choose the same q and alpha values or how the sender and reciver exchange the q and alpha values
Sir i have watched your many video. You are superb in explaining thing. I have query here, prime numer q is selected by sender and alpha is selected as a premitive root of q. How does receiver get this q and alpha. Whole calculation is based on these two value only. Kindly explain sir. Thanks in advance
@sundeepsaradhi sir , I have one doubt like in the lecture it is mention we have to use "q" on both side to find the sceret key , how q is shared between sender and receiver in real time
hi jyotirmay thanks for your interest towards our channel and share my sessions with your friends and subscribe to our channel.Keep following our channel.
Thanks very much for your video , but I have a question we are going to calculate alpha on both sides (the receiver and the sender) this may lead with two different alpha values on both sides will the final result will be the same ?
hi hafeez thanks for your interest towards our channel and share my sessions with your friends and subscribe to our channel.Keep following our channel.
Sir I have watched your video and it is very helpful for me my one query is, by using this calculation any one can get the key and any one can decrypt massage so how it is safe to exchange key
Thanks your video in Network security is awesome and very easy to understand. In this video i think Ya is the public key of A not B.(May be a writing mistake of you). please clarify.
hi saleh you are correct and thanks for observation and correction. thanks for your interest towards our channel and share my sessions with your friends and subscribe to our channel.Keep following our channel.
Sir, I want to know how many values will be shared in network? q,alpha will be shared with each-other on network?Is there any feasible technique to calculate primitive number for huge prime number(q>100)
Sir Which calculation is done on sender side and which is done on receiver side? Like how much part of calculation is done on sender side and receiver side in your explanation. Please respond sir
hi Krupal thanks for your interest towards our channel and share my sessions with your friends and subscribe to our channel.Keep following our channel.
HI VIEWERS THERE IS A SMALL MISTAKE WHILE WRITING THE FORMULA AND IN THE EXAMPLE PROBLEM.
At THE TIME 9:18
CORRECT ONE : PUBLIC KEY OF USER A
WRONG ONE : WRITTEN AS PUBLIC KEY OF USER B
AT THE TIME 25:01
CORRECT ONE : POWER IS XB
WRONG ONE : WRITTEN POWER AS XA
PLEASE MAKE A CORRECTION AND I AM SORRY FOR THE MISTAKE.
it's ok sir
thanks for teaching
sir, can u give me notes about topic
Sundeep Saradhi Kanthety
Sir how will both the user come to know the value of q?
@@rishi1987ful lol mindfk
Alice and Bob agree to use a modulus p = 23 and base g = 5 (which is a primitive root modulo 23).(wiki)
Words can't explain how glad I am to have found your channel the day before my exam. Thank you soo much!!
What a nice explanation, a person who even does every small calculations (multiplications and divisions) to make the student understand. Thank you sir, you efforts were well received and appreciated.
You’re awesome bloke! Some faculties are struggling to explain this but you did it in ease! Thank you!
hi aravind
thanks for your interest towards our channel and share my sessions with your friends and subscribe to our channel.Keep following our channel.
Thank you sir i like your teaching method. Please explain for me about A5/1 of stream cipher
That is the indian teacher talent. Nowhere in the world like India guru. Only demon lacking is lack of technology. Otherwise India could be in number one position in the world with moral education. You are superb sir. You have lot patiency and did wonderful job to make sense me by crystal clear explanation. You are the wonderfull hero and true guru.
SIR YOUR WAY OF EXPLAINING THE CONCEPT IS GOOD
Slow and Nice...such complex problems need longer explanations...I am not disappointed clicking on this video Thanks a lot, Sir... 😊👍
Good one sir... Your explanation is far better than my lecturer at college...👌
What a wonderful explanation... Simply loved it Sir
Thanks
Thank you Sir. Easy Steps to find K.
K =5^8 mod 11
= (625 x 625) mod 11
= (9 x 9) mod 11 ( Divide 625 by 11, rem=9)
= 81 mod 11
K = 4
Sir you have helped me a lot sir during my exams time. Your explonation is very goood and clear. Keep maintian that sir. You are one of the best teacher in my study career. I was scared about this subject and i found you on youtube. Now i learned lot of subject. Thank you very much sir.
Really excellent presentation sir and easy to understand 👍
thankyou sir, you are a lifesaver
Your videos are great man! They do not go unappreciated!!!
hi thanks for watching my sessions and giving support to our channel.
Great.....your teaching style fabulous......very helpful for us.
Awesome explanation sir,very clear 👏👏👏
Very good explanation sir..I never seen these detailed and clear explanation by anyone so far
Salute to your teaching and way of explaining!!
nice video sir i have learned a lot. and I will score a good grade because of you sir. thanks sir
Your explanations are very clear
Thank you
Sir...i am really delighted by your class... your videos are very informative and useful
hi karun
thanks for your interest towards our channel and share my sessions with your friends and subscribe to our channel.Keep following our channel.
@@sundeepsaradhi come to our college as teacher
Excellent presentation and your knowledge is superior. Thanks a Million. Harry
Fantastic explanation Sandeep...THanks alot..easy method of explaining.
Thank you very much sir, i like the way of your teaching , u explain very nicely ..
Sir, Really helpful for me your valuable lecture
Thank you very much sir
This was very very helpful. Your videos really helped me with my assignment.
Nice explanation... 👏👏👏Thank you sir👍
Hi, a couple of minor errors but overall an excellent video. Thank You!
Really superb explanation sir ......
last min i got this before exam!!! thank u soo much!
superb explanation
thank you so much sir ,very nice explanation
thank you sir for these videos because of them i was able to clear my subject easliy
thanks you so much sir, You teach fabulous
thnks you sundee saradhi kanthety guru g
wonderfully explained. one small doubt. how do the sender and receiver choose the same q and alpha values or how the sender and reciver exchange the q and alpha values
Sir please upload number theory, format and Euler therom..Ur teaching is good and I shared Ur video with my friends
Awesome explanation sir
Sir i have watched your many video. You are superb in explaining thing. I have query here, prime numer q is selected by sender and alpha is selected as a premitive root of q. How does receiver get this q and alpha. Whole calculation is based on these two value only. Kindly explain sir. Thanks in advance
Super sir tqu for conveying with patience
very nice explanation sir
Sir what an explanation 🙇🏻🙏🏻
Thank you for this valuable lecture sir...
thank you so much Sir..you are the best
Thank you for this amazing video, you basically saved me.
Thank u sir....!!! loved your graphics lectures also
hi Arka
thanks for your interest towards our channel and share my sessions with your friends and subscribe to our channel.Keep following our channel.
great channel thanks sir you are hardly teaching
@sundeepsaradhi sir , I have one doubt like in the lecture it is mention we have to use "q" on both side to find the sceret key , how q is shared between sender and receiver in real time
Nice teaching sir tq for ur teaching sir and tq so much sir
Well said, i appreciate your efforts 👍
Thank you sir easy to understand we hope you talk about elgamal cryptosystem and signature for rsa and elgamal best regards❤
Hi night walker thank you and definitely soon I will try to upload them soon.
Thanks for watching my sessions and supporting our channel.
super sir your teaching, but if both sender and receiver uses different q then also they will get same key value(k)??
Lot of thanks sir
Understood😊👍 thank you sir
i passed my exam only because of u
Hi
Thank you very much for your support towards our channel share our channel with your friends and keep following our channel
Super sir.. Keep rocking 🎸🎶🎶
Good sir after the video u refer the video is ther is any mistake and correct it.nice
Very well explained, thank you
Thank u sir for this video.. can you explain elliptic curve cryptography?
hi remya
thanks for your interest towards our channel and i will try to upload it.
Thanks a Lot Sir.!! ❣️
Nice lecture good concept very helpful...Keep it up sir....
hi jyotirmay
thanks for your interest towards our channel and share my sessions with your friends and subscribe to our channel.Keep following our channel.
thanks for the detailed explanation sir
Very very very helpful
Thanku very much sir
Very helpful sirr tq so much😍😍😍
Good explanation sir that made me feel easy.
Thanks very much for your video , but I have a question we are going to calculate alpha on both sides (the receiver and the sender) this may lead with two different alpha values on both sides will the final result will be the same ?
thank you very much Sir... Most useful
thank you sir...... please make more tutorial on Network Security....
also..... your methodology is superb as compared to other,s
hi hafeez
thanks for your interest towards our channel and share my sessions with your friends and subscribe to our channel.Keep following our channel.
Kindly make a video on ECC algorithm
You are awesome sir !
So basically summary is that
=> 2^8*4 mod 11 (where 8 is private key of A. and 4 is private key of B)
=> 2^32 mod 11
=> 4
thank you so much sir !! best lecture ever
Thanks sir Please up date More videos Network Security
hi kishore
definitely i will upload almost all concepts of security.
Sir I have watched your video and it is very helpful for me my one query is, by using this calculation any one can get the key and any one can decrypt massage so how it is safe to exchange key
others don't have the private keys.. hence cannot generate the same key.
Thanks your video in Network security is awesome and very easy to understand. In this video i think Ya is the public key of A not B.(May be a writing mistake of you). please clarify.
hi saleh
you are correct and thanks for observation and correction.
thanks for your interest towards our channel and share my sessions with
your friends and subscribe to our channel.Keep following our channel.
Thanks for quick reply and clarification.
In the example problem, how did you find XA=8(private key), or is it like, you have assumed it to be 8?.. please clarify 24:10
It uses Asymmetric encryption method ,right?
So,why you said it uses symmetric encryption method at the end of the video??
Hi
This method is used to find symmetric key using asymmetric method.
Hope your doubt has been clarified.
@@sundeepsaradhi Yes
Thankyou so much for the video. :)
super explaination sir
Sir, I want to know how many values will be shared in network? q,alpha will be shared with each-other on network?Is there any feasible technique to calculate primitive number for huge prime number(q>100)
Thank u sir.... Very useful
Thank you 💐💐💐
sir can you explain about the difference between the diffie hellimen and man in middle attack
Sir, values of q & alpha are shared between sender n receiver
Wonderful..thanx a lot
Sir Which calculation is done on sender side and which is done on receiver side?
Like how much part of calculation is done on sender side and receiver side in your explanation.
Please respond sir
great explanation,,,,,,,,
Great Video !!!!!!!!!!!!!!!!!!!
now the k vale will be used for sending the Symmetric key across VPN? m i right?
Sandeep you the man. Keep up the excellent work and keep on helping losers like me pass.
Cipher - davqkxUx
Key - sandyrox
Thank you sir..
thankyou sir
Well explained
Sir I think you should use calculator because It will decrease the length of your video ...Thank you
Thank you very much sir
Excellent
How the same q value ie prime number is selected between sender and receiver
Thanks for the detailed explanation. Much needed one. Could you please explain PBES Encryption too? I need this much.
hi Krupal
thanks for your interest towards our channel and share my sessions with your friends and subscribe to our channel.Keep following our channel.
Thanks a lot sir but my question is that in my question paper p and q value are mentioned how to handle it
Sir, at 9:18 its public key of user A and at 25:01 its xB power not xA :-)
hi Himanshu
You are absolutely correct and thanks for your correction.
Sir I have one doubt
Can we assume wheather any value for Xa and Xb