Digital signature

Поділитися
Вставка
  • Опубліковано 26 жов 2024

КОМЕНТАРІ • 134

  • @chinnariprasad5177
    @chinnariprasad5177 4 роки тому +93

    Can you please let me know the text book you are using.

  • @Gaurav-pm5hs
    @Gaurav-pm5hs 3 роки тому +167

    That why I love indian boy explaining things on pen paper

  • @nabeelakbar8255
    @nabeelakbar8255 2 роки тому +48

    Integrity= hash function
    authentication= digital signature
    confidentiality= encryption

  • @ajayshankhwar730
    @ajayshankhwar730 3 роки тому +19

    This is the best channel for semster preperation .The content is really structural and exact.

  • @RAHULYADAV-dd3yy
    @RAHULYADAV-dd3yy 2 роки тому +2

    Bhai fan ho gaya main tumhara.. Bas tumhare hi lecture se padha hai maine... Love u bro..

  • @ShivamTiwari-mo3dj
    @ShivamTiwari-mo3dj 4 роки тому +14

    a very good work and thank you for clearing our concepts . loved your video, it is very useful as semester exam point of view.

  • @govindkumar-f3x2b
    @govindkumar-f3x2b 10 місяців тому +1

    thanku bhaya this big and soo... big help for me in my exam shree ram ji aap ko bhala karay bhaya🕣🙏🙏🙏🙏🙏👇👇👇👇👇👇👇👇👇👇👇👇🙏🙏🙏🙏🙏🙏🙏🙏🙏🙏🙏🙏🙏🙏🙏🙏🙏🙏🙏👇👇👇👇👇👇👇👇👇🙏🙏🙏🙏🙏🙏🙏🙏🙏🙏🙏🙏🙏🙏🙏🙏🙏🙏🙏🙏🙏🙏🙏🙏🙏🙏🙏🙏🙏🙏🙏🙏🙏🙏🙏🙏🙏🙏🙏🙏🙏🙏🙏

  • @rutujapandule1360
    @rutujapandule1360 2 роки тому +1

    Before teaching us our teacher learns from ur video then teach us ..... :)

  • @niharjyotibasisth
    @niharjyotibasisth Рік тому +1

    Once again, here one night before the exam. Thank you...

  • @viraltoovideos
    @viraltoovideos Рік тому +1

    Bahut achha explain kiye hai bhaiya

  • @kavitasharma8483
    @kavitasharma8483 Рік тому +1

    Sir ,I like the way you teaching

  • @TeachCraft4
    @TeachCraft4 13 днів тому +1

    thank you so much

  • @coming_out_97
    @coming_out_97 7 місяців тому +1

    A good explanation 😊

  • @syedasyed2688
    @syedasyed2688 2 роки тому +2

    kindly sir upload the lecture on Arbitrated Digital Signature ...

  • @angelahir8037
    @angelahir8037 3 роки тому +1

    Very important information you will get

    • @angelahir8037
      @angelahir8037 3 роки тому

      Kya hum project me use kr sakte he apka knowledge?

  • @priyanshigupta6178
    @priyanshigupta6178 Рік тому +1

    Well explained 👍💯

  • @jayanthts5198
    @jayanthts5198 2 роки тому

    bhai jaan bacha liya yaar
    tmro is my end sem exam and this video stopped my cry

  • @umer6946
    @umer6946 Рік тому +1

    *Great*

  • @syedasyed2688
    @syedasyed2688 2 роки тому

    Realy like ur way of Teaching thumbs up👍❣️

  • @geetikagupta2745
    @geetikagupta2745 2 роки тому +12

    If public key is used to decrypt then intruders can attack during transmission because public key can be known to others also..so what is the use of encryption here if you could answer?

    • @khai-vq5hn
      @khai-vq5hn 10 місяців тому +2

      ya he made blunder out there

    • @shaheryarahmed5151
      @shaheryarahmed5151 5 місяців тому

      I think the encryption he is talking about is not about the message,its about the signature. Only sender (let's say A) can create his signature so private key makes sense,anyone can verify that signature belongs to A so public key of A can be used

    • @avishekkumar829
      @avishekkumar829 23 дні тому

      Public key is used for encription while private key is used for decription.

  • @sumasri606
    @sumasri606 2 роки тому +1

    Good explanation liked it can u plz explain about elliptical curve digital signature algorithm......

  • @_NaeemTamboli
    @_NaeemTamboli Рік тому

    Amazing explanation

  • @NottyPriyal
    @NottyPriyal Рік тому +2

    To everyone who is asking about hw we can decrypt the data using the public key. To validate the data's integrity, the recipient first uses the signer's public key to decrypt the digital signature. The recipient then uses the same hashing algorithm that generated the original hash to generate a new one-way hash of the same data.

  • @manasbanjare3198
    @manasbanjare3198 Рік тому

    kass app digital certificate ka bhi bana dete itna aacha sabhji video banate ho aap

  • @arjitprakher73
    @arjitprakher73 3 роки тому

    Thank you bhaiya , ye kafi accha explanation tha

  • @shreyabhosale9962
    @shreyabhosale9962 4 роки тому +1

    Very nice explanation

  • @kishangautam1321
    @kishangautam1321 3 роки тому +1

    U r to good bhai ....❤️

  • @garima2128
    @garima2128 Рік тому

    Can u plz make the vdo of kerberos encryption using non-cryptographic tools

  • @kangna55
    @kangna55 4 роки тому +5

    Can you explain the hash thing it with an example? Explain it with some msg written in email

  • @samandeepkaur691
    @samandeepkaur691 2 роки тому

    Please make video on hyperelliptic curve cryptography

  • @ddr_hritik5823
    @ddr_hritik5823 2 роки тому +2

    Can you share your notes of all encryption series???

  • @kandukurianjani7852
    @kandukurianjani7852 3 роки тому +2

    Very nice explanation.. thank u so much

  • @joydeepbhattacharjee5305
    @joydeepbhattacharjee5305 3 роки тому +6

    well i'm a bit confused ..as per my knowledge we encrypt data using public key and decrypt data with private key...then why the reverse is being done here?? please explain

    • @joydeepbhattacharjee5305
      @joydeepbhattacharjee5305 3 роки тому

      @@girisharora945 okk thanks

    • @gautamgoyal108
      @gautamgoyal108 2 роки тому

      Brother it's for authentication Authentication is received if A decrypts with his own private key if a done with b public key then it's not authentic that A send mssg because B public key is all over on Internet

  • @dhaneshpt8641
    @dhaneshpt8641 Рік тому +1

    Thank you..

  • @CareerWithTech
    @CareerWithTech 3 роки тому +2

    encryption is done through public key
    decryption is done through private key

  • @sahil73626
    @sahil73626 2 роки тому

    Well understood .thanku bro!

  • @khusbusahu5881
    @khusbusahu5881 3 роки тому +2

    Your videos are very helpful to us....thank you... 😊

  • @shweta_sharma172
    @shweta_sharma172 3 роки тому +1

    superb 👍👍

  • @preyumkumar7404
    @preyumkumar7404 3 роки тому

    great help thanks great video

  • @vipinchaudhary7713
    @vipinchaudhary7713 3 роки тому

    Nice,explanation bro..👍👍

  • @utkarshdubey4130
    @utkarshdubey4130 4 роки тому +1

    Bhai mcqs hr topic pr btado.. Bca final year is mcqs based this time

  • @flutter_graphic35
    @flutter_graphic35 2 роки тому

    JAZAK ALLAH sir

  • @himanshugrd
    @himanshugrd Рік тому +1

    Can we get PDFs Of your lecture notes?

  • @sumitrasar6204
    @sumitrasar6204 Рік тому

    You force me to comment yar! Dam clear all doubt of mine .

  • @vinod420786
    @vinod420786 Рік тому

    thank you sir

  • @Mohit_mk_
    @Mohit_mk_ 2 роки тому +2

    Superb ♥️

  • @Yoyo-ck9pm
    @Yoyo-ck9pm 3 роки тому +2

    Sir if we want confidentiality too which algorithm should be used!???Should DESor AES be used??

  • @alapandas3538
    @alapandas3538 2 роки тому

    Public key is in encryption and lrivate key in decryption

  • @hamzaalvi3599
    @hamzaalvi3599 3 роки тому +2

    Why we are using private key of A for encryption ???

    • @nidhijaswani2930
      @nidhijaswani2930 6 місяців тому

      It must be public key of B? Correct me if I am wrong

  • @sumitbhatt3715
    @sumitbhatt3715 4 роки тому +1

    Sir app word expand algorithm of rsa ma ek video bna do plxx

  • @saikun0293
    @saikun0293 4 роки тому +1

    Even the message also changes right if some hacker attacks.....why will it be the same? @7:53

  • @statsgurru5758
    @statsgurru5758 Рік тому

    Bhaiya apne jo general copect ka diagram banaya usme aapne Singing algo toh use he nahi kiya
    toh vo digital signature ka general concept kese hua?

  • @novyajyoti7920
    @novyajyoti7920 Рік тому

    Encryption is a public key and decryption is private key

    • @centerwing2101
      @centerwing2101 Рік тому

      No, Private key is used for encryption and public key for decryption

  • @prodiptamondal1758
    @prodiptamondal1758 3 роки тому +4

    Any user will have the public key of A, so how the confidentiality will be maintained for second case?

    • @nayanyadav5005
      @nayanyadav5005 3 роки тому +8

      He missed....
      let me help you (if this exact question u r asking)
      suppose, A as Sender B as Reciever,
      obviously, A has some plain text (PT)
      private key of A (PrKA) and public key of A(PuKA)
      private key of B (PrKB) and public key of B(PuKB)
      {Note---> PuKA ( PrKA =None OR we can say they can cancel one another}..............................................................................(NOTE)
      Now the game begins....
      A--> PT --> PrKA (PT)--> PuKB (PrKA (PT))
      Now (PuKB (PrKA (PT))) becomes a Free Electron and only B can get it.
      now,B has a Free electron, and his private key(PrKB) also.
      B -->PrKB ( PuKB (PrKA (PT)))
      B-->PrKA(PT)......... .............................................(from NOTE)
      Now B goes to google and asks for Public key of A
      B-->PuKA(PrKA(PT))
      B--> (PT)......................................... (from NOTE)
      Hurrah!!!!!!!
      (Pls let me know the feedback, I will erase it otherwise)

  • @pragatisahu4355
    @pragatisahu4355 Рік тому

    Aapne HMAC ki video nhi dali hai kya

  • @mehaksaxena866
    @mehaksaxena866 4 роки тому +4

    I have a ques sir.. i studied somewhere that we should encrypt the msg with the help of public key of receiver and receiver will decrypt it with his private key to maintain confidentiality but here you said the opposite. I know you said there is no use of confidentiality but still its a doubt. What key should we use to encrypt a msg and vice versa. HOPE YOU WILL REPLY.

    • @AbhishekSharmaDit
      @AbhishekSharmaDit  4 роки тому +5

      In normal situations it is ok but in digital signature concept we will have to ise the private key of the sender so that hame pata chal sake ki ha yahi banda i.e. sender h jo hame msh bhejra h

    • @AbhishekSharmaDit
      @AbhishekSharmaDit  4 роки тому +3

      To encrypt the msg we will use hash function concept along with digital signature
      Aage series follow karo sab clear hota jayega

    • @mitulzala6976
      @mitulzala6976 2 роки тому +1

      10:00

  • @geopluse6336
    @geopluse6336 Рік тому

    kon sa book use karo rahai ho ??

  • @gautamsingh9104
    @gautamsingh9104 11 місяців тому

    Bhai digital signature ka koi mathematical base example nhi h ky?

  • @thelmarodrigues5774
    @thelmarodrigues5774 3 роки тому

    Thank you

  • @cst001anantharajd2
    @cst001anantharajd2 Рік тому

    Can you solve sums based on this

  • @techhackz2897
    @techhackz2897 Рік тому

    11:57 your using private key of user-A. So, anyone with public key of user-A can decrypt the message and get the msg and hash
    So, how are we achieving confidentiality here.
    And in the last fig @ 12:50 we achieved confidentiality, non-repudiation and integrity.

  • @premcontact3230
    @premcontact3230 3 роки тому +1

    If someone agree and give his concent through email but no signature on agreement is this considered as valid document?

  • @Singham_here
    @Singham_here Рік тому

    It's public key in Encryption

  • @sweta3345
    @sweta3345 6 місяців тому

    kya ap oo book author ka name bata sakte hoo ?

  • @IamSkyLight
    @IamSkyLight 3 роки тому +5

    in your earlier video of Hash/MAC Function, you didn't mention anything about Integrity. Could you confirm if in any scenario (that you discussed) we would be achieving integrity along with authentication and confidentially?

    • @NottyPriyal
      @NottyPriyal Рік тому

      There is the concept of message integrity basis where the message will have the digest if the digest matches the public key of the receiver then the integrity of the message is achieved

  • @chanchalgupta2259
    @chanchalgupta2259 4 роки тому +1

    Bhaiya ye hash function se only signature ko digitial signaure me convert krate h ky ,
    Ya fir pura msg bhi convert hota h private key se,

  • @nikhilchoudhary4705
    @nikhilchoudhary4705 6 місяців тому

    msg aur hash dono ko kyu encrypt krenge, only hash ko encrypt krenge na using private key of A ?

  • @irfanshaik1302
    @irfanshaik1302 3 роки тому +1

    bhai....🙏🏻🙏🏻...bachaliya tumne 😪😭

  • @nagamaruthitubati0305
    @nagamaruthitubati0305 3 роки тому +1

    Sir can you please explain the video in English also ..

  • @dheerajsahu4547
    @dheerajsahu4547 Рік тому

    Vha hash/message ki place pr cipher aayega after encryption

  • @divakar_alig8781
    @divakar_alig8781 3 роки тому +1

    Sir can you send the notes of cryptography

  • @gulamsarwar609
    @gulamsarwar609 3 роки тому +2

    Bro, can u share your book's PDF file?

  • @bestshorts_rk2342
    @bestshorts_rk2342 2 роки тому

    WHAT IS Digital 33 Signature ?????

  • @anshukumari109
    @anshukumari109 2 роки тому

    Digital signature bs itna hi h?...sir mjhe Google doc, e-mail, social media handle k classes mil skte h

  • @poojasankpal9046
    @poojasankpal9046 Рік тому

    Please short me thoda slow explain kare sir

  • @vlogplanet5536
    @vlogplanet5536 2 роки тому +1

    Can you share the notes

  • @RishiKumar-tv4jk
    @RishiKumar-tv4jk 3 роки тому

    Agr beech me message alter hua hai to last step me message ko hash function me daalne pr jo hash aaya aur jo first step me message ko hash function me dalne pr hash aaya tha, vo same kse hoga jb message hi change hogya ??

  • @poojayadav9821
    @poojayadav9821 4 роки тому +1

    Digital copyrights and search engine pe apne video upload ki h kya sir? If yes then please provide me that link.

  • @kandukurianjani7852
    @kandukurianjani7852 3 роки тому

    Please sir.. explain the video English to English all videos

  • @himachalivloggershipali6299
    @himachalivloggershipali6299 4 роки тому +1

    Kya apne tcp congestion control algo PE video bnaii haii btaa do

  • @syedrakeen7759
    @syedrakeen7759 2 роки тому

    Sur can u provide a note for this question for 15 marks!

  • @GauravDuseja-t6q
    @GauravDuseja-t6q 6 місяців тому

    But A public key know to everyone so theere is no confidentiality anyone can acess A message

  • @Punnu00
    @Punnu00 4 роки тому +1

    Synopsis kese bnai jati a

  • @digitalbb1893
    @digitalbb1893 3 роки тому

    A k public key kahase milega bhai....A ko pblic key v B ko bhejna parega kya?

    • @mr.pranjul_01
      @mr.pranjul_01 3 роки тому

      Nhi public key toh public hai wo sbko pata hoti hai

  • @vishalmodi5469
    @vishalmodi5469 3 роки тому

    Please provide notes any video

  • @Funduniyatv
    @Funduniyatv 3 місяці тому

    Smjhaty ap bht acha hyn but apki handwriting smjh nahi ati r kuch words miss ho jty hyn kindly esi handwritting kryn k smjh bhi to ay kia likha hy

  • @meetkakadia3404
    @meetkakadia3404 2 роки тому

    yahh

  • @nischayrawat6216
    @nischayrawat6216 3 роки тому

    bro concept clear krke btao or har part ko alag alag krke, or yaha waha ye wo shbd mat istmaal kiya kro, kuch clear ni hota,

  • @iamgood3406
    @iamgood3406 3 роки тому

    It's would better that if u did this video in English... there will be people who doesn't know hindhi how can they know??????

  • @shivanisahu949
    @shivanisahu949 4 роки тому

    Are you from Dehradun?

  • @siddhantsingh6578
    @siddhantsingh6578 3 роки тому

    How do IAS officers do digital signature?

  • @whois2517
    @whois2517 2 роки тому

    Ycce gang wya

  • @arjunbunny5424
    @arjunbunny5424 3 роки тому

    Sir thoda dhire baat kro.....itni jldi jldi kyo boltey ho🙄

  • @sumitbhatt3715
    @sumitbhatt3715 4 роки тому +1

    Bhai itna acha video bna ra ho full support ha aapko keep doing the good work . Jo like support ni kar ra chutiya ha

  • @SR-jr7bh
    @SR-jr7bh 7 місяців тому

    Going too fast,for a teacher.

  • @pakistankikiran481
    @pakistankikiran481 Рік тому

    Public key encrypt karta and private key decryp🤦‍♀️

  • @touseefsultan
    @touseefsultan 3 роки тому

    Bolny ki speed thori km krlo bss

  • @mohammadfareed9482
    @mohammadfareed9482 2 роки тому +1

    Bht galat tarike se samjhya hai 😂😂

  • @shekhar2784
    @shekhar2784 2 роки тому +1

    Can we get PDFs? Of your lecture notes

  • @lovesingh5105
    @lovesingh5105 3 роки тому

    Thank you