IP Security Protocol : Authentication Header (AH) Explained in Hindi

Поділитися
Вставка
  • Опубліковано 9 вер 2024
  • Myself Shridhar Mankar a Engineer l UA-camr l Educational Blogger l Educator l Podcaster.
    My Aim- To Make Engineering Students Life EASY.
    Website - 5minutesengine...
    5 Minutes Engineering English UA-cam Channel - / @5minutesengineeringen...
    Instagram - www.instagram....
    A small donation would mean the world to me and will help me to make AWESOME videos for you.
    • UPI ID : 5minutesengineering@apl
    Playlists :
    • 5 Minutes Engineering Podcast :
    • 5 Minutes Engineering ...
    • Aptitude :
    • Aptitude
    • Machine Learning :
    • Machine Learning
    • Computer Graphics :
    • Computer Graphics
    • C Language Tutorial for Beginners :
    • C Language Tutorial fo...
    • R Tutorial for Beginners :
    • R Tutorial for Beginners
    • Python Tutorial for Beginners :
    • Python Tutorial For Be...
    • Embedded and Real Time Operating Systems (ERTOS) :
    • Embedded and Real Time...
    • Shridhar Live Talks :
    • Shridhar Live Talks
    • Welcome to 5 Minutes Engineering :
    • Welcome To 5 Minutes E...
    • Human Computer Interaction (HCI) :
    • Human Computer Interac...
    • Computer Organization and Architecture :
    • Computer Organization ...
    • Deep Learning :
    • Deep Learning
    • Genetic Algorithm :
    • Genetic Algorithm
    • Cloud Computing :
    • Cloud Computing
    • Information and Cyber Security :
    • Information And Cyber ...
    • Soft Computing and Optimization Algorithms :
    • Soft Computing And Opt...
    • Compiler Design :
    • Compiler Design
    • Operating System :
    • Operating System
    • Hadoop :
    • Hadoop
    • CUDA :
    • CUDA
    • Discrete Mathematics :
    • Discrete Mathematics
    • Theory of Computation (TOC) :
    • Theory Of Computation ...
    • Data Analytics :
    • Data Analytics
    • Software Modeling and Design :
    • Software Modeling And ...
    • Internet Of Things (IOT) :
    • Internet Of Things (IOT)
    • Database Management Systems (DBMS) :
    • Database Management Sy...
    • Computer Network (CN) :
    • Computer Networks (CN)
    • Software Engineering and Project Management :
    • Software Engineering A...
    • Design and Analysis of Algorithm :
    • Design And Analysis Of...
    • Data Mining and Warehouse :
    • Data Mining and Warehouse
    • Mobile Communication :
    • Mobile Communication
    • High Performance Computing :
    • High Performance Compu...
    • Artificial Intelligence and Robotics :
    • Artificial intelligenc...

КОМЕНТАРІ • 42

  • @hindavilande1636
    @hindavilande1636 2 роки тому +7

    nice explanation but their is one mistake.. Payload length field does not define the length of original payload/data; it defines the length of the authentication header in 4-byte multiples,

  • @kanksha_tiwari
    @kanksha_tiwari 3 місяці тому

    Sir literally u r great teacher ❤

  • @mohilgoswami9311
    @mohilgoswami9311 5 років тому +2

    👌👌👌 Very helping in exam thanks sir
    Btw after two days my NS paper and i am totally wach your videos thank you so much once again

    • @abhinavs03
      @abhinavs03 3 роки тому +1

      pass hogya jya

    • @SpawnDev
      @SpawnDev 8 місяців тому

      he sadly passed away@@abhinavs03

  • @amolnikam5010
    @amolnikam5010 5 років тому +5

    How does it confirms on authentication? Not clear, ICV confirms on integrity but how it confirms on Authentication?

  • @Techieegirl12
    @Techieegirl12 4 роки тому

    sir you are the best teacher
    Your every video very helpful during exam..

  • @vaibhavdhiman1083
    @vaibhavdhiman1083 5 років тому +1

    Kya bt hai sir sun li apne hamari good explanation

  • @shivangitripathi4816
    @shivangitripathi4816 4 роки тому

    Way of teaching very nice sir😎😎

  • @vrushaliwaikar6334
    @vrushaliwaikar6334 3 роки тому

    This video is very helpful and thank you for teaching us .

  • @mehul050
    @mehul050 3 роки тому

    About to give Security+ and this video is great!

  • @sunnysingh6163
    @sunnysingh6163 5 років тому +2

    you are doing a wonderful job of explaining the things in local language.. Just a bit of side suggestion.. if you can speak in bit slow pace without hurrying.. it will be even more nicer way of explaining and teaching good stuff.. Thanks and Hope that helps..

  • @netaishvasistha9875
    @netaishvasistha9875 5 років тому

    Sir the video is superb... I would like to know when to use AH as it does not provide encryption.

  • @saweranadeem2040
    @saweranadeem2040 2 роки тому

    JAZAK ALLAH SIR

  • @abhishekcowboy
    @abhishekcowboy 3 роки тому +1

    In previous video you explained that we can use AH for encapsulation as an IPSec header ?

    • @anandbathireddy3178
      @anandbathireddy3178 3 роки тому

      it is based on which mode you are using Only in tunnel mode you use the Ip sec header so, AH is used after IPsec, not as an IPsecHeader here is the sequence: IPsec header, AH, IP header, TCP/others, Payload

  • @Firehard1
    @Firehard1 4 роки тому

    Very nice explanation sir👍

  • @warclown9419
    @warclown9419 4 роки тому

    This video was very helpful and informative, but with all due respect I'd like to point out that u missed about Hashing part and thr creation of a Message Digest (MD)

  • @harshalohana4958
    @harshalohana4958 2 роки тому

    Next header will store next header 's type ? Because all packages will be same type i think it should be nest sequence number of next header..?

  • @monikanegi5952
    @monikanegi5952 4 роки тому

    thanku sir for the video

  • @mansiparulkar5393
    @mansiparulkar5393 5 років тому

    please add videos of ESRTOS & HCI

  • @sohamp5768
    @sohamp5768 2 роки тому +3

    0:30 for those who dislike his videos

  • @manishaSingh-cq1ze
    @manishaSingh-cq1ze 3 роки тому

    Ossm sir 👍

  • @raviprakashgautam6917
    @raviprakashgautam6917 2 роки тому

    Thnk u sir

  • @someshsharma708
    @someshsharma708 4 роки тому

    Thank you sir

  • @karthiktavare2330
    @karthiktavare2330 4 роки тому

    Tq sir🙃

  • @rutujagaikwad1586
    @rutujagaikwad1586 4 роки тому +1

    👍👍👍

  • @anujacodkar8968
    @anujacodkar8968 5 років тому

    Thank you very much sir!!
    You are the best in quick grasping of content!!

  • @shobhitsharma970
    @shobhitsharma970 4 роки тому

    sir u r incredible sometimes u look like the indian cricketer rohit sharma

  • @ajaydixit8264
    @ajaydixit8264 5 років тому

    sir network management k lecture upload kariye sir please

  • @LatestSongHub
    @LatestSongHub 3 роки тому

    Sir agar payload ki size 8 bit se badi huyi to wo data kaise send hoga fir

  • @unknownking8685
    @unknownking8685 4 роки тому

    Sir Sequence no. Ki initial value 1 hoti h not 0

  • @abhijeetraj7952
    @abhijeetraj7952 4 роки тому

    👌 👌 👌 👌 👌 👌 👌

  • @riazek2787
    @riazek2787 29 днів тому

    Rohit the hitman is here to teach us info secuy😂

  • @dekadebashish
    @dekadebashish 3 роки тому

    I think, instead of 2^32 - 1 +> it should be 2^31 - 1

  • @tanmoydutta2332
    @tanmoydutta2332 4 роки тому

    I am sorry to say sir what you say about payload length is not fully correct , this field contain the length of the authentication header .
    thank you.

  • @gibraanjafar1669
    @gibraanjafar1669 4 роки тому

    The length of each layer is not 31 bits . It should be 32 . 31 doesn't make any sense. Don't just blindly copy from Techmax.

  • @muhammedashkarp.a9269
    @muhammedashkarp.a9269 4 роки тому

    saved my cryptography exam

  • @shikhapandey1962
    @shikhapandey1962 3 роки тому

    🥺🥺🥺🥺🥺🥺🥺🥺🥺🥺

  • @TanmayInfotech
    @TanmayInfotech Рік тому

    Should be 0 to 7 and 7 to 15 and 15 to 31 😂😂😂