Order of Operations -> A digest is created from the message and encrypted using the private key of Sender --> The message is compressed --> the message(compressed) along with the digest are encrypted using the shared session key of the sender and receiver --> the encrypted(message and digest) are send along with the shared session key of sender and receiver which itself is encrypted with the public key of the receiver.
Thank you very much sir for the tutorial,The concept was presented very well so that I could understand it easily and was able to attend this question succesfully for my university exam...
hi Reshma suresh thanks for your interest towards our channel and share my sessions with your friends and subscribe to our channel.Keep following our channel.
Sir you have helped me a lot sir during my exams time. Your explonation is very goood and clear. Keep maintian that sir. You are one of the best teacher in my study career. I was scared about this subject and i found you on youtube. Now i learned lot of subject. Thank you very much sir.
hi bhuvana thanks for your interest towards our channel and share my sessions with your friends and subscribe to our channel.Keep following our channel.
hi bhaskar thanks for your interest towards our channel and share my sessions with your friends and subscribe to our channel.Keep following our channel.
hi chandrakanth thanks for your interest towards our channel and share my sessions with your friends and subscribe to our channel.Keep following our channel.
Excellent explanation, thank you very much for sharing your knowledge with us! I just have one question, if the secret key is sent to the recipient in an encrypted form, using an asymmetric encryption algorithm (Public-key Encryption). Where does Diffie Hellman really apply? I don't see it :(
Nice one! Simplified the logic. But in this video, you are doing decryption and then verifying signature. I think whoever wants to decrypt, first check the signature and then they would decrypt. Any suggestion to achieve that?
Cool stuff sir ! But is that really diffi exchange ? We are not really generating keys. That Ks is our value , its not getting generated and on the receivers side, its getting dectypted ,not generated. Idk if its a valid doubt.. But Cool
Sir becoz of your sessions, I'm much able to understand things which i can't do so from reading books.... Thankyou very much can you add videos on how to prepare for on campus placement and interview
hi varsha thanks for your interest towards our channel and share my sessions with your friends and subscribe to our channel.Keep following our channel.
Sir how you use piblic key for decryption as per my knowledge we can only use private key for decrypt the message and public key is use for encrypt the message.....
PGP concept you are mentioning 3 services like authentication,confidentiality and Digital signature. But Digital signature is used to provide the Authentication service Sir. I do not know perfectly. I hope its true according to my knowledge. Please once check and respond sir. Thank You and sorry if any thing wrong from my side Sir.
On some websites i read that session key is also generated to encrypt the message and then the session key is encrypted by the reciever's public key. But you didn't talk about session key. I am very confuse that session keys are required for pgp or not. Please reply me. I am waiting.
hi prashant thanks for your interest towards our channel and share my sessions with your friends and subscribe to our channel.Keep following our channel.
Order of Operations -> A digest is created from the message and encrypted using the private key of Sender --> The message is compressed --> the message(compressed) along with the digest are encrypted using the shared session key of the sender and receiver --> the encrypted(message and digest) are send along with the shared session key of sender and receiver which itself is encrypted with the public key of the receiver.
Thank you very much sir for the tutorial,The concept was presented very well so that I could understand it easily and was able to attend this question succesfully for my university exam...
hi Reshma suresh
thanks for your interest towards our channel and share my sessions with your friends and subscribe to our channel.Keep following our channel.
Sir you have helped me a lot sir during my exams time. Your explonation is very goood and clear. Keep maintian that sir. You are one of the best teacher in my study career. I was scared about this subject and i found you on youtube. Now i learned lot of subject. Thank you very much sir.
Sir i want ->
"Secure/Multipurpose Internet Mail Extensions" (S/MIME)...plse upload the lecture on S/MIME...
s/mime video please
thanks to you … best explanations for PGP email security on UA-cam.
Very good explanation of the concepts, showing print out at the end was good too, please keep up this good work of sharing knowledge
Sir your lecture on PGP is pretty good and understandable...along with PGP ,we need S/MIME...if possible plse upload the lecture on S/MIME...
hi bhuvana
thanks for your interest towards our channel and share my sessions with
your friends and subscribe to our channel.Keep following our channel.
Yes sir your explaination was very good sir plz upload vedio on S/MIME
Yes sir plz upload S/MIME
S/MIME pe video bana sir... Good explanation keep it.
Thanks sir for great explanation i have exam after 2 days and you save my time 😊
I also having exam in 2 days.
Thank you sir. Your videos helped me a lot in my semester exams.
No need to read text books cause of you sir :)
hi bhaskar
thanks for your interest towards our channel and share my sessions with your friends and subscribe to our channel.Keep following our channel.
Sir your channel was really very helpful to me and my friends as well thank you very much sir i wrote my exam well because of you.
hi chandrakanth
thanks for your interest towards our channel and share my sessions with
your friends and subscribe to our channel.Keep following our channel.
xD haha. Our exam is tomorrow.
what a explanation nice very simple understanding sir very very nice
Struggling with pgp really helpful thank you so much sir
Your classes are very helpful thanks alot
Excellent job... sir... thank you sir for full details of PGP....
Thankyou so much for your neat and clear explanation sir
sir i saw your all lectures of ins,sir your explanation technique is awesome,i can easily understand the concepts.
It's really helpful sir.. Thanks alot
Thank for such a good Explanation!
Very nice explanation sir...
Very good explanation.. thanks
Your teaching techniques is very good
It's my humble request please upload little bit short video
Nice explanation sir ❤❤❤
Crystalline clear explanation
Thanks sir, you are awesome. your videos are amazing.
Can't get better explanation of PGP that this. Damn good.
Excellent explanation, thank you very much for sharing your knowledge with us! I just have one question, if the secret key is sent to the recipient in an encrypted form, using an asymmetric encryption algorithm (Public-key Encryption). Where does Diffie Hellman really apply? I don't see it :(
A very good lecture Sir.
is this from Network Security Essentials by william stallings
?
hi aman
yes i have prepared every thing from william stallings.
Thanks for your explanation i have one doubt what is the purpose of we using compression and decompression?
When plain text appended with digest what is a need of digest receive can read that plain text easily
Hello. there is wrong small problem.puplic key und private key should be swaped.puplic key just for encryption.
thankyouu so much sir , it was just outstandingg thankyou
NICE SUPER EXCELLENT MOTIVATED
Excellent lecture...will u plzz upload a video on S/MIME..I have an exam...
Thank you so much Sir
Lecture help me a lot to clear my concepts
🤘
Thank you that was a pretty good tutorial.
Tnx for makin it so simple.👌👌
Which hash function is used, do these double (II) mean logical „or“-Operator?
Thanks for this Video my friend 👍👍
can someone give an intuition on how the decryption of the "private key encrypted message" using the public key gives the message?
A bit slow for me, but very clear, thank you!!
Kind hearted Human being
Thank you so much sir .you helped me lot .
Nice one! Simplified the logic. But in this video, you are doing decryption and then verifying signature. I think whoever wants to decrypt, first check the signature and then they would decrypt. Any suggestion to achieve that?
Cool stuff sir !
But is that really diffi exchange ? We are not really generating keys. That Ks is our value , its not getting generated and on the receivers side, its getting dectypted ,not generated.
Idk if its a valid doubt.. But Cool
i passed my CNS subject because of you sir
At sender side u encrypted the hash but at receiver side you didn't decrypt the hash function ??
how we are getting symmetric key ? is that from User A private key or User B`s public key ? Please confirm.
really love your explanation
thank you,you made it so simple to understand
Sir please upload the lecture on S/MIME alsoooo
could u please tell how it is vulnerable to middle attack and how it can be solved
Very nice explanation . Guess Session key is Ks
Sir upload vedios X.509authentication services ,public key infrastructure .
hi anuradha
sure i will try to upload.
Thax sir it is very usefull for me
Tq sir, your explanation is very clear and understandable plz give explanation of rc4 and a5 encryption algorithm plzzz
Superb explanation
Excellent Video Sir.
Please upload the last diagram paper in the description box or comment box sir
Sir becoz of your sessions, I'm much able to understand things which i can't do so from reading books.... Thankyou very much
can you add videos on how to prepare for on campus placement and interview
hey, will the integrity of the message be affected if we compress the message?
is PGP working on Asymmetric Key ??
Tq sir it really helped me a lot tq so much
hi varsha
thanks for your interest towards our channel and share my sessions with
your friends and subscribe to our channel.Keep following our channel.
Sure sir
Dear sir, please give in depth explanation of any new term say " compatibility in PGP" why it is required , how to incorporate it .
hi ali
thanks for your interest towards our channel and i will definitely try to do that.
btw why are we compressing the message and then encrypting? why isn't the message directly encrypted?
hi Niharika
that was actually done in PGP
Compression followed by encryption.
This is used in E-mail so a large chunk of data is compressed followed by segmentation, then it is sent over a network.
Sir how you use piblic key for decryption as per my knowledge we can only use private key for decrypt the message and public key is use for encrypt the message.....
Hi sir
Very nice explanation sir
Want ur video on minme and s/mime
super sir
i have shared to my friends
PGP concept you are mentioning 3 services like authentication,confidentiality and Digital signature. But Digital signature is used to provide the Authentication service Sir. I do not know perfectly. I hope its true according to my knowledge. Please once check and respond sir. Thank You and sorry if any thing wrong from my side Sir.
Please upload Secure/Multipurpose Internet Mail Extensions (S/MIME) Video
Really nice video sir
Please explain the concept s/mime
owesome man
great work
hi kunal
thanks for your interest towards our channel and share my sessions with your friends and subscribe to our channel.Keep following our channel.
Sir pls clear the difference between public key encryption , digital signature and asymmetric encryption
sir where do we use algorithms here cacn u show in diagram please
Pretty good lecture
Nice video. All clear
sir can u upload the video for modes of operation in block cipher
Hi Sophia thanks for your interest towards our channel and definitely I will try to upload it in a couple of days. Keep following our channel.
sir tk u sir
U r just amazing sir 😍😍😍😍😍
excellent
sir,please upload IDEA algorithm
On some websites i read that session key is also generated to encrypt the message and then the session key is encrypted by the reciever's public key. But you didn't talk about session key. I am very confuse that session keys are required for pgp or not. Please reply me. I am waiting.
What are the books i will read ugc and pgtrb net exam plz refer
Sir aapke video bahoot accha hai..but thode short mein bataynge to aapko jyada views bhi mil sakte hai...
hi prashant
thanks for your interest towards our channel and share my sessions with your friends and subscribe to our channel.Keep following our channel.
Did u have any material for this subject sir.if yes u can provide materials in website or provide link in description
sir,board clear ga ledu,its not visible clearly.
hi PSR
i think the brightness of the camera is more so that its not visible i think and i will correct it.
sir upload videos on x.509 authentication , public key infrastructure and s/SIME at an earliest. since end semester examination is nearing sir
your a huge talant person
how to like all your videos in a single shot..
its difficult to like every video
sirr plzz present a lecture about MIME/RFC5322
Thank you so much.
sir video is pretty good..
hi ash
thanks for your interest towards our channel and share my sessions with
your friends and subscribe to our channel.Keep following our channel.
S/MIME pe video banao sir...
What actually is digital signature?
hi NIharika
If the encryption process is done using SENDER PRIVATE KEY then we call it as Signature.
Hope your doubt has been clarified.
Sir I want pem explained
This pgp is good
sir can plz upload s/mime topic sir
ANY ... ADITYA DEGREE COLLEGE STUDENTS 🙋♂️❤
god bless youu
sir plz upload x509 certification, cant find anywhere .......!!!, actually i am having exam tmro