SIR i am from pakistan literally ap boht boht boht acha phrty han jesy kisi student ko smjnah hoota literally thanku so muchhhhhhhhhh boht zada piyar from pakistan🤩🤩🤩🤩🥰🥰🥰🥰🥰
The video is really informative. And all your classes are really good and easy to understand. Your way of delivering the class is really superb. Thanks for your videos.
Thank you so much for your explanation...really means a lot.... because of this vedio I got 14 marks in my semester exam....thank you so much.... worth watching it👍
Diffi Hellman key exchange process is used to exchange "session keys" or "symmetric keys", but not for "asymmetric key" exchange, as there is no exchange of asymetric-public or private keys in asymetric-encryption (you have mentioned it in pt.iii) PLEASE DO CLEAR MY DOUBT ... anyway Great explanation,I must appreciate
Yb=(Alpha)^Xb % q, in this equation there are total 4 parameters from which 3 are public. the parameter Xb which is private, can easily be calculated by hacker by using this equation
nicely explained, especially useful for the night before the exam.
Yes exactly 🔥
@@shubhamraj5853 got my exam in 2hrs and this is good
Same at this time
Or the hour before exam😅😅
How to check mod?
This is what we need one day before exam , thanku so much 💯🙏
SIR i am from pakistan literally ap boht boht boht acha phrty han jesy kisi student ko smjnah hoota literally thanku so muchhhhhhhhhh boht zada piyar from pakistan🤩🤩🤩🤩🥰🥰🥰🥰🥰
Explained in such a great way so that non tech person can also understand it, Great work you are doing Abhishek, God bless you
I must say , this is the best video on you tube for deffie helman method , far better than LMT video regarding the same .
hats of brother you just saved me from my external exam
😂
Thank you so much sir,its helped me many more before the exams.
I was very confused on this topic ...Thank you so much for this video ❤ It helped me a lot😇
The video is really informative. And all your classes are really good and easy to understand. Your way of delivering the class is really superb. Thanks for your videos.
Bro dropped the smoothest video on this concept
very well explained, thank u so much ❤❤
thanks a lot for this brother
wow yar through your videos i found this subject interesting....... thanks buddy
best crypto tutorial for exams on youtube.....keep up the good work
✌️🤟
Thanks for the crisp clear explaination !
Wow very very very nice explanation sir bhut achccha lga pdhne me thanks a lot sir🙏
bhai ne itna aacha smjhaya ke mere assignment ka question ho gaya. A fulfilled video lecture
way better than any other video of diffi hellman on youtube
125 mod 7 is 6 ..not 7 ...by the way awesome explanation thanku so much
Thank you sir😊... kl mera exam hai apki sary lectures sy achi tiyari hogai..
It was helpful and comprehensive. Thnks bro and love from Pakistan 🇵🇰
Very nice explaination sir.
key is exchanged "So please like the video"
explanation is very good and help me a lot
Thanks a ton,an easiest expln ever..👀!GBU👍
crystal clear explanation .thank you bro...
bestest explanation of all time
Very clear explanation friend, Thanks a ton
great explanation lots of love from nepal
bro youre the saviour. thank you so much for your contribution.
You are great at it, Thanks a lot helped me to understand very nicely ❤🥰
Thank you so much......you explained it so well
Brilliant! Abhishek Sharma Supremacy
Nice explanation but I guess there is no such restriction as Xa
exactly, was thinking the same, you would just need the "public elements" ie alpha and q, with the public key to get the private key.
Can you find it if the prime number is more than 100 digits?
Very Useful videos in cryptography, understand easily
My M tech xms your videos always helpful.. I don’t know Hindi.. but simply understating your explanation. Thanks sir.
malayali?
@@abyjoy4843 yes ✌️
@@Feenaq87667 same here 👍
Wow, Thank you so much...very helpful
The explanation in your videos is really wow bhayya🥳
Love you maan.... You just save my exam.....
🥰🥰🥰🥰
Nice 👍 explaination of a beautiful subject.
Thank you .. very well explained 🤗
Thank You so much for this
Tommorow is my exam
Welcm all the best ✌️🤘
Thank you so much for your explanation...really means a lot.... because of this vedio I got 14 marks in my semester exam....thank you so much.... worth watching it👍
Excellent explanation buddy ,really helpful :-)
Yaar aap bahut mast padhate ho, aap dusre subjects par bhi vedios banao(especially computer science Branch), we are waiting. Thanks
this video is very helpfull for us and all.Its a really superb class
can you scan your notes and upload them somewhere? They are too good
Exactly,wt all of us need,its gonna make our lives easier..!💆♀️
I can if you want. 😅
But then how well he gets views, & earn some bucks ? As then no one will watch his content?
The Best lecture I have ever watched
Explanation with noted tu toh Dev manus nikla re 🥺
Thank you man . This is very helpful for me .👏👏👏
very nicely explained, thank you so much man.
You are too GOOD sir...
Thank you Very Much...
Thank yuh so much sir!! Just a great explanation !! 🥰😇💜Very helpful
Great it's a really helpful video
Thank you so much sir 🙏😊
Nicely explained
Dear sir,
Excellent teaching...
Iwant your notes sir....
Diffi Hellman key exchange process is used to exchange "session keys" or "symmetric keys", but not for "asymmetric key" exchange, as there is no exchange of asymetric-public or private keys in asymetric-encryption (you have mentioned it in pt.iii)
PLEASE DO CLEAR MY DOUBT ...
anyway Great explanation,I must appreciate
perfect explanation...
Great work.. Thank you..
great explanation!! thank u
Ty for explaining notes for exam
Perfect explaination.....thank you
because of you i am going to pass my tomorrow's exam. Thank you so much!!!
Awesome Explanation Bro, Loved it!
Great video helped me a lot luv it❤️🤗
Thankyou sirji ♥️🙏🏼✨
Your vedio is really helpful for us ..
i had online classes abt this and got nothing out of it. u saved me bro
Thanks and love bro from Faisalabad, Pakistan
Thank you so much bro..very nice amd crystal clear explanation ❤
Excellent....
Absolutely clear thanks
Do make videos on MAC, hash function, MD5,SHA,HMAC,CMAC , Digital Signature, DSS, EI Garnal, Schnorr.
Hash functions,MAC, digital signature videos are already there in the playlist
Thank u sir ..aap bhot achhe se explain krte hai....plz ek video ElGamal cryptosystem pe bna dijiye ...plz
Great explanation and notes thanks buddy! May god bless you
Love from New Zealand
You really smashed it !!! Lots of best wishes bro :)
Yb=(Alpha)^Xb % q, in this equation there are total 4 parameters from which 3 are public. the parameter Xb which is private, can easily be calculated by hacker by using this equation
bhi to me soch rha tha brother
Kya kaam ki algorithm jisme har cheej bhi use kar rhe h jo public h.
Bahut easy h crack karna.
Hn but public thing bhi easyly nhi milti.
Excellent bro. 😄😄agr pehle Mila hota toh back nehi hota mera 😂😂😂
great video very helpful
Thank you so much Abhishek sir😍🤗
Thank.you so much you are grt bhai💞very well explnd🤗
Thank you sir
Abhishek bhai, zindagi aasan kar di apne
dil kush kardiya bhai tu...aur vedio banao jii
Thankyou bro..
You have helped me a lot..
very clear explanation
Bhai starting theory samjh gye lekin age ni aya lekin dekh kr acha laga
Very clear explanation 👏👏👏
Well explained 👏🏻👏🏻
Khatrnaak bhai!! Thanku!
Thank you 😊, hatho hath😊😊❤️
Hi sir,
Your videos are very helpful. Please explain how to find out 'd' value using e and n values using RSA algorithm
ruclips.net/video/rlJTMUBXhKE/видео.html
Rsa video link
Thnku this is very helpful,can you make vdeo that how to find ECDLP problem questions
Great yaar ❤️
your videos are really helpful! please put up a video on elgamal algorithm too!
❤❤🔥🔥❣❣✨✨🙌🙌🙏🙏thank you sir
Dhanyabaad bhaiya ji
Thank you😊
best explain respect from Bangladesh
Thanks a lot for this series!
More videos will be uploaded soon in this week