Тёмный
No video :(

Digital signature 

Abhishek Sharma
Подписаться 129 тыс.
Просмотров 499 тыс.
50% 1

#DigitalSignature #Hashing #abhishekdit #NetworkSecurity #Cryptography #InformationSecurity
Hello friends! Welcome to my channel.
My name is Abhishek Sharma.
This is the series of Cryptography and network security.
Courses on my Website (Huge discounts going on)
www.abhisheksh...
In this video, i have explained what is Digital Signature in Cryptography and network security.
Placement series:
• Interview process deta...
If you learned something new do like and share this video with your friends and don't forget to subscribe to my channel :)
There are lectures related to different subjects on this channel.Do check them out, guys.
Link is given below:
Placement series:
• Interview process deta...
computer graphics:
• Computer Graphics
engineering economics:
• Engineering Economics
Cryptography :
• Playfair Cipher Algorithm
.Net C# :
• .NET C#
Pointers in C :
• Pointers in C Introduc...
Linked List for Interviews :
• Introduction to Linked...
Java Tricky videos/programs for interviews :
• Java Labelled For Loop...
pointers playlist:
• Pointers in C
C Programming tips and tricks:
• C tricky programs/videos
Abhishek VLOGS :
• #VLOG-1 Riding through...
Concerts :
• Khushboo Grewal concer...

Опубликовано:

 

23 авг 2024

Поделиться:

Ссылка:

Скачать:

Готовим ссылку...

Добавить в:

Мой плейлист
Посмотреть позже
Комментарии : 132   
@chinnariprasad5177
@chinnariprasad5177 4 года назад
Can you please let me know the text book you are using.
@AbhishekSharmaDit
@AbhishekSharmaDit 4 года назад
Cryptography and network security by behrouz A Forouzan
@chinnariprasad5177
@chinnariprasad5177 4 года назад
@@AbhishekSharmaDit thanks a lot
@shashikanthd4767
@shashikanthd4767 3 года назад
@@AbhishekSharmaDit thanks again
@phantom2k858
@phantom2k858 3 года назад
yeah it was good
@technologiesmotivationd7754
you are from pakistan
@Gaurav-pm5hs
@Gaurav-pm5hs 3 года назад
That why I love indian boy explaining things on pen paper
@nabeelakbar8255
@nabeelakbar8255 Год назад
Integrity= hash function authentication= digital signature confidentiality= encryption
@soumyadeepbarik5711
@soumyadeepbarik5711 5 месяцев назад
Waah kya baat hai
@tejas_machchhar
@tejas_machchhar 3 месяца назад
Authentication=Mac 🤔
@creeper4735
@creeper4735 3 месяца назад
waise availibility hota hai a ke lie
@ajayshankhwar730
@ajayshankhwar730 3 года назад
This is the best channel for semster preperation .The content is really structural and exact.
@RAHULYADAV-dd3yy
@RAHULYADAV-dd3yy 2 года назад
Bhai fan ho gaya main tumhara.. Bas tumhare hi lecture se padha hai maine... Love u bro..
@ShivamTiwari-mo3dj
@ShivamTiwari-mo3dj 3 года назад
a very good work and thank you for clearing our concepts . loved your video, it is very useful as semester exam point of view.
@geetikagupta2745
@geetikagupta2745 2 года назад
If public key is used to decrypt then intruders can attack during transmission because public key can be known to others also..so what is the use of encryption here if you could answer?
@khai-vq5hn
@khai-vq5hn 8 месяцев назад
ya he made blunder out there
@shaheryarahmed5151
@shaheryarahmed5151 3 месяца назад
I think the encryption he is talking about is not about the message,its about the signature. Only sender (let's say A) can create his signature so private key makes sense,anyone can verify that signature belongs to A so public key of A can be used
@rutujapandule1360
@rutujapandule1360 Год назад
Before teaching us our teacher learns from ur video then teach us ..... :)
@niharjyotibasisth
@niharjyotibasisth Год назад
Once again, here one night before the exam. Thank you...
@user-oc3yc1yw1w
@user-oc3yc1yw1w 8 месяцев назад
thanku bhaya this big and soo... big help for me in my exam shree ram ji aap ko bhala karay bhaya🕣🙏🙏🙏🙏🙏👇👇👇👇👇👇👇👇👇👇👇👇🙏🙏🙏🙏🙏🙏🙏🙏🙏🙏🙏🙏🙏🙏🙏🙏🙏🙏🙏👇👇👇👇👇👇👇👇👇🙏🙏🙏🙏🙏🙏🙏🙏🙏🙏🙏🙏🙏🙏🙏🙏🙏🙏🙏🙏🙏🙏🙏🙏🙏🙏🙏🙏🙏🙏🙏🙏🙏🙏🙏🙏🙏🙏🙏🙏🙏🙏🙏
@viraltoovideos
@viraltoovideos Год назад
Bahut achha explain kiye hai bhaiya
@kangna55
@kangna55 4 года назад
Can you explain the hash thing it with an example? Explain it with some msg written in email
@angelahir8037
@angelahir8037 3 года назад
Very important information you will get
@angelahir8037
@angelahir8037 3 года назад
Kya hum project me use kr sakte he apka knowledge?
@kavitasharma8483
@kavitasharma8483 Год назад
Sir ,I like the way you teaching
@coming_out_97
@coming_out_97 5 месяцев назад
A good explanation 😊
@priyanshigupta6178
@priyanshigupta6178 9 месяцев назад
Well explained 👍💯
@joydeepbhattacharjee5305
@joydeepbhattacharjee5305 3 года назад
well i'm a bit confused ..as per my knowledge we encrypt data using public key and decrypt data with private key...then why the reverse is being done here?? please explain
@joydeepbhattacharjee5305
@joydeepbhattacharjee5305 3 года назад
@@girisharora945 okk thanks
@gautamgoyal108
@gautamgoyal108 2 года назад
Brother it's for authentication Authentication is received if A decrypts with his own private key if a done with b public key then it's not authentic that A send mssg because B public key is all over on Internet
@shreyabhosale9962
@shreyabhosale9962 3 года назад
Very nice explanation
@CareerWithTech
@CareerWithTech 3 года назад
encryption is done through public key decryption is done through private key
@CareerWithTech
@CareerWithTech 3 года назад
pls check your video again
@umer6946
@umer6946 Год назад
*Great*
@user-gs5kv2ms3l
@user-gs5kv2ms3l 11 месяцев назад
To everyone who is asking about hw we can decrypt the data using the public key. To validate the data's integrity, the recipient first uses the signer's public key to decrypt the digital signature. The recipient then uses the same hashing algorithm that generated the original hash to generate a new one-way hash of the same data.
@jayanthts5198
@jayanthts5198 2 года назад
bhai jaan bacha liya yaar tmro is my end sem exam and this video stopped my cry
@ddr_hritik5823
@ddr_hritik5823 2 года назад
Can you share your notes of all encryption series???
@syedasyed2688
@syedasyed2688 2 года назад
kindly sir upload the lecture on Arbitrated Digital Signature ...
@shweta_sharma172
@shweta_sharma172 3 года назад
superb 👍👍
@Mohit_mk_
@Mohit_mk_ 2 года назад
Superb ♥️
@Yoyo-ck9pm
@Yoyo-ck9pm 3 года назад
Sir if we want confidentiality too which algorithm should be used!???Should DESor AES be used??
@kandukurianjani7852
@kandukurianjani7852 3 года назад
Very nice explanation.. thank u so much
@syedasyed2688
@syedasyed2688 2 года назад
Realy like ur way of Teaching thumbs up👍❣️
@_NaeemTamboli
@_NaeemTamboli 11 месяцев назад
Amazing explanation
@saikun0293
@saikun0293 4 года назад
Even the message also changes right if some hacker attacks.....why will it be the same? @7:53
@sumasri606
@sumasri606 2 года назад
Good explanation liked it can u plz explain about elliptical curve digital signature algorithm......
@chanchalgupta2259
@chanchalgupta2259 4 года назад
Bhaiya ye hash function se only signature ko digitial signaure me convert krate h ky , Ya fir pura msg bhi convert hota h private key se,
@arjitprakher73
@arjitprakher73 2 года назад
Thank you bhaiya , ye kafi accha explanation tha
@prodiptamondal1758
@prodiptamondal1758 3 года назад
Any user will have the public key of A, so how the confidentiality will be maintained for second case?
@nayanyadav5005
@nayanyadav5005 2 года назад
He missed.... let me help you (if this exact question u r asking) suppose, A as Sender B as Reciever, obviously, A has some plain text (PT) private key of A (PrKA) and public key of A(PuKA) private key of B (PrKB) and public key of B(PuKB) {Note---> PuKA ( PrKA =None OR we can say they can cancel one another}..............................................................................(NOTE) Now the game begins.... A--> PT --> PrKA (PT)--> PuKB (PrKA (PT)) Now (PuKB (PrKA (PT))) becomes a Free Electron and only B can get it. now,B has a Free electron, and his private key(PrKB) also. B -->PrKB ( PuKB (PrKA (PT))) B-->PrKA(PT)......... .............................................(from NOTE) Now B goes to google and asks for Public key of A B-->PuKA(PrKA(PT)) B--> (PT)......................................... (from NOTE) Hurrah!!!!!!! (Pls let me know the feedback, I will erase it otherwise)
@statsgurru5758
@statsgurru5758 Год назад
Bhaiya apne jo general copect ka diagram banaya usme aapne Singing algo toh use he nahi kiya toh vo digital signature ka general concept kese hua?
@himanshugrd
@himanshugrd Год назад
Can we get PDFs Of your lecture notes?
@kishangautam1321
@kishangautam1321 3 года назад
U r to good bhai ....❤️
@irfanshaik1302
@irfanshaik1302 3 года назад
bhai....🙏🏻🙏🏻...bachaliya tumne 😪😭
@preyumkumar7404
@preyumkumar7404 3 года назад
great help thanks great video
@IamSkyLight
@IamSkyLight 3 года назад
in your earlier video of Hash/MAC Function, you didn't mention anything about Integrity. Could you confirm if in any scenario (that you discussed) we would be achieving integrity along with authentication and confidentially?
@user-gs5kv2ms3l
@user-gs5kv2ms3l 11 месяцев назад
There is the concept of message integrity basis where the message will have the digest if the digest matches the public key of the receiver then the integrity of the message is achieved
@mehaksaxena866
@mehaksaxena866 4 года назад
I have a ques sir.. i studied somewhere that we should encrypt the msg with the help of public key of receiver and receiver will decrypt it with his private key to maintain confidentiality but here you said the opposite. I know you said there is no use of confidentiality but still its a doubt. What key should we use to encrypt a msg and vice versa. HOPE YOU WILL REPLY.
@AbhishekSharmaDit
@AbhishekSharmaDit 4 года назад
In normal situations it is ok but in digital signature concept we will have to ise the private key of the sender so that hame pata chal sake ki ha yahi banda i.e. sender h jo hame msh bhejra h
@AbhishekSharmaDit
@AbhishekSharmaDit 4 года назад
To encrypt the msg we will use hash function concept along with digital signature Aage series follow karo sab clear hota jayega
@mitulzala6976
@mitulzala6976 2 года назад
10:00
@shekhar2784
@shekhar2784 Год назад
Can we get PDFs? Of your lecture notes
@dhaneshpt8641
@dhaneshpt8641 10 месяцев назад
Thank you..
@gautamsingh9104
@gautamsingh9104 8 месяцев назад
Bhai digital signature ka koi mathematical base example nhi h ky?
@utkarshdubey4130
@utkarshdubey4130 4 года назад
Bhai mcqs hr topic pr btado.. Bca final year is mcqs based this time
@manasbanjare3198
@manasbanjare3198 Год назад
kass app digital certificate ka bhi bana dete itna aacha sabhji video banate ho aap
@hamzaalvi3599
@hamzaalvi3599 3 года назад
Why we are using private key of A for encryption ???
@nidhijaswani2930
@nidhijaswani2930 4 месяца назад
It must be public key of B? Correct me if I am wrong
@sahil73626
@sahil73626 Год назад
Well understood .thanku bro!
@nikhilchoudhary4705
@nikhilchoudhary4705 4 месяца назад
msg aur hash dono ko kyu encrypt krenge, only hash ko encrypt krenge na using private key of A ?
@khusbusahu5881
@khusbusahu5881 3 года назад
Your videos are very helpful to us....thank you... 😊
@vipinchaudhary7713
@vipinchaudhary7713 3 года назад
Nice,explanation bro..👍👍
@garima2128
@garima2128 Год назад
Can u plz make the vdo of kerberos encryption using non-cryptographic tools
@anshukumari109
@anshukumari109 2 года назад
Digital signature bs itna hi h?...sir mjhe Google doc, e-mail, social media handle k classes mil skte h
@gulamsarwar609
@gulamsarwar609 2 года назад
Bro, can u share your book's PDF file?
@samandeepkaur691
@samandeepkaur691 2 года назад
Please make video on hyperelliptic curve cryptography
@premcontact3230
@premcontact3230 3 года назад
If someone agree and give his concent through email but no signature on agreement is this considered as valid document?
@RishiKumar-tv4jk
@RishiKumar-tv4jk 3 года назад
Agr beech me message alter hua hai to last step me message ko hash function me daalne pr jo hash aaya aur jo first step me message ko hash function me dalne pr hash aaya tha, vo same kse hoga jb message hi change hogya ??
@sweta3345
@sweta3345 4 месяца назад
kya ap oo book author ka name bata sakte hoo ?
@sumitbhatt3715
@sumitbhatt3715 4 года назад
Sir app word expand algorithm of rsa ma ek video bna do plxx
@poojayadav9821
@poojayadav9821 3 года назад
Digital copyrights and search engine pe apne video upload ki h kya sir? If yes then please provide me that link.
@pragatisahu4355
@pragatisahu4355 Год назад
Aapne HMAC ki video nhi dali hai kya
@divakar_alig8781
@divakar_alig8781 3 года назад
Sir can you send the notes of cryptography
@geopluse6336
@geopluse6336 10 месяцев назад
kon sa book use karo rahai ho ??
@dheerajsahu4547
@dheerajsahu4547 11 месяцев назад
Vha hash/message ki place pr cipher aayega after encryption
@vinod420786
@vinod420786 Год назад
thank you sir
@graphic_designer35
@graphic_designer35 Год назад
JAZAK ALLAH sir
@cst001anantharajd2
@cst001anantharajd2 Год назад
Can you solve sums based on this
@nagamaruthitubati0305
@nagamaruthitubati0305 3 года назад
Sir can you please explain the video in English also ..
@sumitrasar6204
@sumitrasar6204 Год назад
You force me to comment yar! Dam clear all doubt of mine .
@thelmarodrigues5774
@thelmarodrigues5774 3 года назад
Thank you
@alapandas3538
@alapandas3538 2 года назад
Public key is in encryption and lrivate key in decryption
@techhackz2897
@techhackz2897 Год назад
11:57 your using private key of user-A. So, anyone with public key of user-A can decrypt the message and get the msg and hash So, how are we achieving confidentiality here. And in the last fig @ 12:50 we achieved confidentiality, non-repudiation and integrity.
@himachalivloggershipali6299
@himachalivloggershipali6299 4 года назад
Kya apne tcp congestion control algo PE video bnaii haii btaa do
@AbhishekSharmaDit
@AbhishekSharmaDit 4 года назад
No nahi dali h
@himachalivloggershipali6299
@himachalivloggershipali6299 4 года назад
@@AbhishekSharmaDit ohkkk 😔
@GrandTotalGamer
@GrandTotalGamer 4 года назад
@@himachalivloggershipali6299 kisi or channel m dekh lo ..isko vse b smjhana nhi aata
@purnimagahlot83
@purnimagahlot83 4 года назад
Synopsis kese bnai jati a
@navyajyoti7920
@navyajyoti7920 Год назад
Encryption is a public key and decryption is private key
@centerwing2101
@centerwing2101 Год назад
No, Private key is used for encryption and public key for decryption
@vlogplanet5536
@vlogplanet5536 2 года назад
Can you share the notes
@digitalbb1893
@digitalbb1893 3 года назад
A k public key kahase milega bhai....A ko pblic key v B ko bhejna parega kya?
@mr.pranjul_01
@mr.pranjul_01 3 года назад
Nhi public key toh public hai wo sbko pata hoti hai
@syedrakeen7759
@syedrakeen7759 Год назад
Sur can u provide a note for this question for 15 marks!
@Singham_here
@Singham_here Год назад
It's public key in Encryption
@centerwing2101
@centerwing2101 Год назад
No, Private key is used for encryption
@poojasankpal9046
@poojasankpal9046 Год назад
Please short me thoda slow explain kare sir
@kandukurianjani7852
@kandukurianjani7852 3 года назад
Please sir.. explain the video English to English all videos
@bestshorts_rk2342
@bestshorts_rk2342 Год назад
WHAT IS Digital 33 Signature ?????
@user-ti7jb6xp4n
@user-ti7jb6xp4n 3 месяца назад
But A public key know to everyone so theere is no confidentiality anyone can acess A message
@Funduniyatv
@Funduniyatv Месяц назад
Smjhaty ap bht acha hyn but apki handwriting smjh nahi ati r kuch words miss ho jty hyn kindly esi handwritting kryn k smjh bhi to ay kia likha hy
@vishalmodi5469
@vishalmodi5469 3 года назад
Please provide notes any video
@meetkakadia3404
@meetkakadia3404 2 года назад
yahh
@nischayrawat6216
@nischayrawat6216 3 года назад
bro concept clear krke btao or har part ko alag alag krke, or yaha waha ye wo shbd mat istmaal kiya kro, kuch clear ni hota,
@whois2517
@whois2517 2 года назад
Ycce gang wya
@sumitbhatt3715
@sumitbhatt3715 4 года назад
Bhai itna acha video bna ra ho full support ha aapko keep doing the good work . Jo like support ni kar ra chutiya ha
@shivanisahu949
@shivanisahu949 4 года назад
Are you from Dehradun?
@AbhishekSharmaDit
@AbhishekSharmaDit 4 года назад
Yes
@tenabisht
@tenabisht 4 года назад
Areh sahuu tum bhi Yaha😂😂✋✋
@AbhishekSharmaDit
@AbhishekSharmaDit 4 года назад
@@tenabisht sab doon se hi ho kya? 😂
@tenabisht
@tenabisht 4 года назад
@@AbhishekSharmaDit Haan mtlb hum teeno Doon se hi hn😂
@shivanisahu949
@shivanisahu949 4 года назад
Abe yar😂😂
@iamgood3406
@iamgood3406 3 года назад
It's would better that if u did this video in English... there will be people who doesn't know hindhi how can they know??????
@siddhantsingh6578
@siddhantsingh6578 3 года назад
How do IAS officers do digital signature?
@touseefsultan
@touseefsultan 3 года назад
Bolny ki speed thori km krlo bss
@arjunbunny5424
@arjunbunny5424 3 года назад
Sir thoda dhire baat kro.....itni jldi jldi kyo boltey ho🙄
@mohammadfareed9482
@mohammadfareed9482 2 года назад
Bht galat tarike se samjhya hai 😂😂
@SR-jr7bh
@SR-jr7bh 5 месяцев назад
Going too fast,for a teacher.
@pakistankikiran481
@pakistankikiran481 Год назад
Public key encrypt karta and private key decryp🤦‍♀️
@lovesingh5105
@lovesingh5105 3 года назад
Thank you
Далее
Hash Functions in Cryptography
16:59
Просмотров 437 тыс.
What are Digital Signatures? - Computerphile
10:17
Просмотров 330 тыс.
PEDRO PEDRO INSIDEOUT
00:10
Просмотров 3,4 млн
NPC Bloxfruits🤖🔥| Doge Gaming
00:13
Просмотров 1 млн
Tech Talk: What is Public Key Infrastructure (PKI)?
9:22
Basics Of Digital Signature Explained in Hindi
8:01
Просмотров 621 тыс.
DIGITAL SIGNATURE & CRYPTOGRAPHY
14:27
Просмотров 27 тыс.
RSA Algorithm in Cryptography and Network Security
10:15
Secret Key Exchange (Diffie-Hellman) - Computerphile
8:40