PGP - PRETTY GOOD PRIVACY THIS IS ONE OF THE EMAIL SECURITY MECHANISM PGP SERVICES 1. AUTHENTICATION WITH DIGITAL SIGNATURE 2. CONFIDENTIALITY 3. EMAIL COMPATABILITY 4. ZIP OR COMPRESSION FUNCTION.
Order of Operations -> A digest is created from the message and encrypted using the private key of Sender --> The message is compressed --> the message(compressed) along with the digest are encrypted using the shared session key of the sender and receiver --> the encrypted(message and digest) are send along with the shared session key of sender and receiver which itself is encrypted with the public key of the receiver.
Sir you have helped me a lot sir during my exams time. Your explonation is very goood and clear. Keep maintian that sir. You are one of the best teacher in my study career. I was scared about this subject and i found you on youtube. Now i learned lot of subject. Thank you very much sir.
Excellent explanation, thank you very much for sharing your knowledge with us! I just have one question, if the secret key is sent to the recipient in an encrypted form, using an asymmetric encryption algorithm (Public-key Encryption). Where does Diffie Hellman really apply? I don't see it :(
Thank you very much sir for the tutorial,The concept was presented very well so that I could understand it easily and was able to attend this question succesfully for my university exam...
hi Reshma suresh thanks for your interest towards our channel and share my sessions with your friends and subscribe to our channel.Keep following our channel.
Nice one! Simplified the logic. But in this video, you are doing decryption and then verifying signature. I think whoever wants to decrypt, first check the signature and then they would decrypt. Any suggestion to achieve that?
hi bhuvana thanks for your interest towards our channel and share my sessions with your friends and subscribe to our channel.Keep following our channel.
hi bhaskar thanks for your interest towards our channel and share my sessions with your friends and subscribe to our channel.Keep following our channel.
hi chandrakanth thanks for your interest towards our channel and share my sessions with your friends and subscribe to our channel.Keep following our channel.
Sir how you use piblic key for decryption as per my knowledge we can only use private key for decrypt the message and public key is use for encrypt the message.....
On some websites i read that session key is also generated to encrypt the message and then the session key is encrypted by the reciever's public key. But you didn't talk about session key. I am very confuse that session keys are required for pgp or not. Please reply me. I am waiting.
Sir becoz of your sessions, I'm much able to understand things which i can't do so from reading books.... Thankyou very much can you add videos on how to prepare for on campus placement and interview
PGP concept you are mentioning 3 services like authentication,confidentiality and Digital signature. But Digital signature is used to provide the Authentication service Sir. I do not know perfectly. I hope its true according to my knowledge. Please once check and respond sir. Thank You and sorry if any thing wrong from my side Sir.
hi prashant thanks for your interest towards our channel and share my sessions with your friends and subscribe to our channel.Keep following our channel.
Cool stuff sir ! But is that really diffi exchange ? We are not really generating keys. That Ks is our value , its not getting generated and on the receivers side, its getting dectypted ,not generated. Idk if its a valid doubt.. But Cool