@@AbhishekSharmaDit bro can i get all the notes in pdf format. im watching the series to understand the concepts but i only have 1 month for semester exam could you provide the notes in pdf format
Asymmetric and symmetric encryption are two primary techniques used to secure data. Symmetric encryption uses the same key for both encryption and decryption, while asymmetric encryption uses a pair of keys: a public key for encryption and a private key for decryption.
Sir , u said ki 1. public key se encryption karenge to private key se hi decrypt kar sakte h aur vice versa par fir symmetric cryptography me same key kaise use hota h fir? Ya ye rule sirf asymmetric k liye hi hai 2.Aur symmetric cryptography me private key use krte h ya public? Please clear my doubt
@Beelzebub bas y hi engineering k chutiyapa h bhai merko smjh nhi aata jab sikhna nhi toh pd q rhe h in subjects ko kisko dikhane k liye pad re yr apn😂
bhaiya, i didnt get this point as u said asymmetric encryption keliye koi bhi "key" use kar sakte ho so if we use private key (A) for encryption i.e the plain text is converted to cipher text and the attacker or any 3rd party can decrypt it using public key as it known to whole world. Whats the use of this method and it doesnt make any sense? can u pls brief on this for clarifying it properly
Asslam u alaikum Sir Aik question hai kindly answer krdy Question: IT Security Personnel Security Physical Security Operational Security Into which of these would you put the following, justify your choice? Enforcing hard-to-guess passwords Encrypting your hard drive Looking sensitive documents in a safe Stationing a marine guard outside an embassy Assigning security clearances to staffers Using SSL for data transfer Having off-site backup of documents Plzzz sir i request you iska answer bta dy plzzzz
5:39 Private Key device ke inbuilt hidden rhti h ya hm usko dekh skte h ??? Dekh skte h >to> share kr skte Share kr skte h to *HACK bhi to kr skte h* 😛😛😛
Doubt: You said a msg that is encrypted by a public key can only be decrypted by using a private key and vice versa. That means two different keys are necessary, right? So what is use of Symmetric cryptography then? You just said I cannot use the same key for both encryption and decryption. Please clarify this, anyone!
That is applicable only for asymmetric key Cryptography " the public and private key concept " And in symmetric key Cryptography We will use the same key for Encryption and decryption
@@debjitpaul8580 there is no public or private key concept in symmetric key Cryprtography Key can be anything (generally any sequence of characters) Like key can be "absd@1hj" Or it can even be your name Hope doubt is clear now !! Follow the series U will get your doubts cleared
*Public key aur Private key* me relation HOTA hoga tabhi to Private key public key se *encrypted* msg ko *decrypt* kr pati h 🤫🤫🤫 To hm public key se *Private Key* drive nhi kr skte kya ? 🤘🤘🤘
Agr A side se public(A) key se message encrypt kiya to B ke end pe private (A) key se message decrypt karna hoga...but private key to A ke pass hi rahegi...fir B kaise decrypt karega?
A apni nahi B ki public key se Encryption karega So that B apni private key ko use karke info decryption kar sake Baki if you will follow my playlist U will get everything Sab doubts apne aap clear ho jayenge So i would recommend playlist follow karo Sab bahot ache se samajh aa jayega 😊
The longer you teach the more you realise the pain suffering and coldness the teachers in college feel ,they are so bored ,and the smart students in class are even more idiotic that the don't share how they do the work,it's not the smart students fault as well ,they were born and raised up in FACTORIES
Bro if we use public key of A to encrypt a mssg than how B can decrypt it Bcz private key of A is known to himself ?? Public key of A --- Encryption Private key of A --- Decryption How it possible bcz B dont know the private key of A
It is possible in a scenario where where we use 2 Encryption and 2 DECRYPTION Like Encrypt using private of A( to get authentication) Encrypt using public of B (for confidentiality) Decrypt using private of B ( now only B can decrypt it because nobody other than B knows his private key) Decrypt using public of A (so we get authentication because if we are able to decrypt it using public if A then, it must have been ENCRYPted with private of A)
@@AbhishekSharmaDit I think you are mistaken. The scenario plays out the following way:- Both A and B have their own key-pair, say: *A has* : *A_priv* and *A_pub* *B has* : *B_priv* and *B_pub* For *A* to send a message to *B*: *A* will use *B_pub* to encrypt, therefore *B* can easily decrypt it using *B_priv* For B to send a message to A: *B* will use *A_pub* to encrypt, therefore *A* can easily decrypt it using *A_priv*
bro plz check you have to use receiver key (public ) to encrypt and to decrypt u need the private key of the receiver. if the b know a private key than what's the use .plz think