I found your channel during my internal viva and today I'm having my external viva and I came directly to your channel playlist for my quick revision...great explanation 🌟
In the receiver's end of the "authentication tied to cipher text part" ..the decryption will only be performed on the message part and not the MAC. although the arrow drawn is from the MAC but it will be from the "cipher text" .P.S: thanks for the great content.
In Authentication tied to CIPHER , at receiver side , we decrypt the CIPHER , only to get the PAIN-TEXT & apply M.A.C FUNCTION , to M.A.C CODE in order to retrieve the MESSAGE only , hence there is no way to compare M.A.C value but comparison between MESSAGES retrieved from 2 ways occurs.
Hello Abhisek, I hope you are doing well. I request you please make a video regarding client - server authentication deeply as I am confused with the public’s key of server and how they communicate if I want to send a message to server
Bro can you tell which exam did you gave pls can you guide me I am in 10th idk what I want to take in 11th pls guide me bro. And pls tell I really want to build my carrier in this field pls tell
Sir authentication means verifying identity of sender 🙄🙄 Is the key unique for each sender???If the third part does change message then by comparison will become equal ???Still it also authentication???
One doubt, as you mentioned at the start of the video, how come the hash function is used for authentication? It's meant for integrity right, hash function only generate fixed value, there is no sender and receiver authenticity
Hash function can also be used as to authenticate whether the data has been manipulated just before receiving by the receiver or not because in Hash, there are order / fixed bits are attached to the data so whenever a hacker will try to do the changes on the data sent by the Sender, that hash will also affect
Iss bande ne mera 6th sem ka cryptology course bacha liya bc. !! Shukriya bhai.. Much respect!!
Right yar 😊😊
mera kal h bhai dekhte hai 🥴🥴
I found your channel during my internal viva and today I'm having my external viva and I came directly to your channel playlist for my quick revision...great explanation 🌟
I love the way you teach...no need to learn from any notes..your one video is enough for understand everything
❤🎉❤🎉thankyou
Thank you so much for this Informative Video SIr.
The easiest explanation till time.
Thnk you so much,whole playlist was really helpful.really appreciating your videos👍
thanks a lot for these videos... your playist will help me nail my exam tomorrow..gbu
This makes it soo much easier to understand! Thank you so much for the explanation! ^_^
bc mujhe to kuch samajh he nhi aaya
thank you it helped me through my college presentation..👍👍👍👍
Surfing for this topic like a vagabond, and finally I found this video very useful. Thank you so much and God Bless you.
Thank you very much sir for the best concept, best explained. Love From Gujarat
Thank you so much bro . It's very helpful for my exams.💖💖💖
THANK YOU soo much easier to understand
very well explained love from jaipur😍
Best. Thank you so much
Keep the good work. Great explanation nd content. 😊
Good explanation !! Thank You !!!
Awesome explanation bro.
very well explained ,thanks allot brother.....🙂
In the receiver's end of the "authentication tied to cipher text part" ..the decryption will only be performed on the message part and not the MAC. although the arrow drawn is from the MAC but it will be from the "cipher text" .P.S: thanks for the great content.
Very great explanation.
Thanks a TON Sir.
Thank You Sir!! for this explanation...
Easy explanation love it
very nicely explained really helpfull 👏👏👏
Excellent lecturers..
Thank you brother 😊
Thank u sir
Just wow
Awesome ❤️
Awalla
Nice explanation!
Well explained....
osm bro.. thnq.. its very helpful
understood
tqq it really amzing v gud explaination
this is some quality content! thankss
thank you so much
Amazing ✨ thanks a lot.
Hi bro, the videos are really awesome and helpful. Can you please upload lectures on HMAC, CMAC, DAA, CCM, GCM?
Nice explanation.
I was expecting to see implementation of MAC function, do you have another video or?
In Authentication tied to CIPHER , at receiver side , we decrypt the CIPHER , only to get the PAIN-TEXT & apply M.A.C FUNCTION , to M.A.C CODE in order to retrieve the MESSAGE only , hence there is no way to compare M.A.C value but comparison between MESSAGES retrieved from 2 ways occurs.
thanks brother😇
bhaiya thank you so much!
SHA par bhi vedio banao
Thank you sir🙏
Nice explanation
thank you ❤️😊
Good job if it's in English it will be more useful
Overall vedio was good ...but explain little bit slowly ..
If want to explain much more data ...just divide the vedio in two part ...thanks
Thanks, brother you are doing a great job keep it up.
Can we expect video on SHA a bit soon exam on 13th
My exams are also going on so it is not possible as of now BRO
But still i will try 👍
@@AbhishekSharmaDit No problem brother you prep for your exam first. I will try from other sources.
No worries,
nice
You should need to join our university 😄 Awesome Video 👌🏻👌🏻
Hello Abhisek, I hope you are doing well. I request you please make a video regarding client - server authentication deeply as I am confused with the public’s key of server and how they communicate if I want to send a message to server
Pls make video on Digital Forensic and Ethical hacking
👌👌
Hash Function aur Hash Algorithm ki bhi video upload krde bhai kal paper hai....baki bhai tu bhut acha kaam kr rha hai!!
Even i have my exam tomorrow so impossible bro
@@AbhishekSharmaDit All the best bro
Bro can you tell which exam did you gave pls can you guide me I am in 10th idk what I want to take in 11th pls guide me bro. And pls tell I really want to build my carrier in this field pls tell
Sir authentication means verifying identity of sender 🙄🙄 Is the key unique for each sender???If the third part does change message then by comparison will become equal ???Still it also authentication???
Method and approaches same hogi kya kyaa message authentication ki????
public key encryption ki video bhi bna dy sir
Bahiia isn't Md5 and SHA and message digest algo part of the playlist?
in authentication tied to cipher, we should send only cipher to get msg back right? not the combination of cipher and mac.....
Yes, you are right ...He has mistakenly taken the arrow from MAC for decryption. It should be from Cipher.
Yes, exactly
Tqqq
do you have any well defined pdf of your notes on the internet? Any link?
One doubt, as you mentioned at the start of the video, how come the hash function is used for authentication? It's meant for integrity right, hash function only generate fixed value, there is no sender and receiver authenticity
Hash function can also be used as to authenticate whether the data has been manipulated just before receiving by the receiver or not because in Hash, there are order / fixed bits are attached to the data so whenever a hacker will try to do the changes on the data sent by the Sender, that hash will also affect
Nice video
hello sir
plz solve the equation p = 10 q = 10 e = 7 and PT = 9 RSA
bhai samjahte sahi ho ,but bht speed mae bolte ho aap
Speed 0.75x krlo ya 0.5x krlo
Quantum se jo padh rha hai woh usse na padhe kripya yeh playlist save kar le
Bhai ..agar msg pd rhe ho to request hai ....X.509 authentication service ...pr detail mai video bnado in hindi
Then what is different between Mac and hash function?
jab exam ke time koi kisika nhi hota, tab youtube pe aise bhagwan log mil hi jate hai....
Shi bola bro
Please post Kerberos video sir before 4/1/23 please sir
@7:12 a timestamp for me
Could you cam scan and upload notes ?
PGP pe bhi video bana lo
Integrity bhi milti hai Na MAC se??
can you provide this material .
Sir mujhe apke videos download krne Hai plzz Help me
Bhai HashFunction ki bhi upload kardo kal exam hai.
Even i have my exam tomorrow 😂
So it is impossible
@@AbhishekSharmaDit never mind ..
Can i get pdf of your notes??
I also want the pdf of this copy
No.
Sath sath me khud hi bana lo… thoda to efforts dalna padega
Sss marlo be
Yes
Message with Key1 = MAC
Sender side : (Message+MAC)-> Encryption with Key2= [Cypher Message]
Receiver Side: [Cypher Message]
Pls translate tamil video. Sir message authentication
Why do you have an english title but a different spoken language ? Just write it in the title please
Bhai aapke notes ki pdf upload kar de
Vo sb to thik hai... But bolte bhut jldi ho jese koi mar ke bhga rha hai... Ap ispr kamm kripa vhin ruki hai..
bhai yha toh mai 2x mai dekh rha hu toh bhi dikkat nhi aa rhi
Ap 0.75 ya 0.5x speed pr dekho
Speak slowly please
Thank sir 🙏
Thanks bhai