Тёмный

TYPES OF CRYPTOGRAPHY | Symmetric Cryptography, Asymmetric Cryptography and Hashing 

Abhishek Sharma
Подписаться 133 тыс.
Просмотров 425 тыс.
50% 1

Опубликовано:

 

28 окт 2024

Поделиться:

Ссылка:

Скачать:

Готовим ссылку...

Добавить в:

Мой плейлист
Посмотреть позже
Комментарии : 161   
@Story_teller_0123
@Story_teller_0123 2 года назад
Can u provide subtitles I'm know telugu and English
@AbhishekSharmaDit
@AbhishekSharmaDit 2 года назад
Some Cryptography videos in English ru-vid.com/group/PL9FuOtXibFjWY-zqhun5kRgXdR_W9cpSB
@VISHALMISHRA-rz5nv
@VISHALMISHRA-rz5nv Год назад
@@AbhishekSharmaDit bro can i get all the notes in pdf format. im watching the series to understand the concepts but i only have 1 month for semester exam could you provide the notes in pdf format
@Beautifulnature7842
@Beautifulnature7842 Год назад
S please
@mayankverma8925
@mayankverma8925 Год назад
You can watch videos of telugu cryptographers
@Story_teller_0123
@Story_teller_0123 Год назад
@@mayankverma8925 its 1 yr back msg😂
@PraShir-v4s
@PraShir-v4s 10 месяцев назад
Asymmetric and symmetric encryption are two primary techniques used to secure data. Symmetric encryption uses the same key for both encryption and decryption, while asymmetric encryption uses a pair of keys: a public key for encryption and a private key for decryption.
@iragautam
@iragautam 3 года назад
Cryptography...is a new subjevt for me now....but i sure your video will help me much...cozz you explained everything....in a nice way❤️👍🏻...thanku
@vijaylaxmi9849
@vijaylaxmi9849 2 года назад
Sir , u said ki 1. public key se encryption karenge to private key se hi decrypt kar sakte h aur vice versa par fir symmetric cryptography me same key kaise use hota h fir? Ya ye rule sirf asymmetric k liye hi hai 2.Aur symmetric cryptography me private key use krte h ya public? Please clear my doubt
@UshaUsha-cd3oe
@UshaUsha-cd3oe 2 года назад
Doubts clear ho gye apki video se amazing video
@MansoorAliBhatti-k1e
@MansoorAliBhatti-k1e 11 месяцев назад
your the best person sir kindly make make course in Quantum Cryptography Complete Course please
@RohitGupta-og6ni
@RohitGupta-og6ni 3 года назад
Bhai , you video lecture is more supportive for me . So Thanks a lot bhai .
@believeinyourself299
@believeinyourself299 4 месяца назад
Totally appreciated❤😊, Thank you bro
@Aisha-vs8vd
@Aisha-vs8vd Год назад
Thanks yaar kal exam hai pr samajh nahi aa raha tha syllabus but aapke videos dekhke samajh aa rahi h Thankyou so much 👍👍👍👍
@amankr9093
@amankr9093 3 года назад
Awesome video lecture thankyou so much sir bahut help kiya ye video bahut se bhi jyada 🙏❤️🥰😊👍
@directopath4860
@directopath4860 3 года назад
Bahut badhiya samjhaya aapne sir.... Agar aap apne ye notes provide kar dete to or achha ho jaata hamare liye....🙏🙏🙏
@karanjaiswal6623
@karanjaiswal6623 4 года назад
DES stands for Data Encryption Standard please correct it
@parthpatel9757
@parthpatel9757 3 года назад
Thanks for such a fabulous lesson and content. And if you don't mind brother Could you share your notes please?
@MavooriVivekkumar
@MavooriVivekkumar Год назад
Superrr brooo❤ well said I got full clarity on topic 😊😊😊 tq u bro
@sumitsinha1506
@sumitsinha1506 4 года назад
Truly amazing work brother❤️, but please provide the PDFs of those notes like stuff you had in your video.. Thank you 🔥💯
@2000shweta
@2000shweta 4 года назад
message can only be encrypted using public key of receiver and decrypted by private key of receiver.
@VivekMishra-sk4bs
@VivekMishra-sk4bs 2 года назад
please upload the notes in pdf forms and provide the link ,your lecture are awesome ❤️❤️
@Knowledgeduniya1432
@Knowledgeduniya1432 Год назад
@Beelzebub bas y hi engineering k chutiyapa h bhai merko smjh nhi aata jab sikhna nhi toh pd q rhe h in subjects ko kisko dikhane k liye pad re yr apn😂
@Knowledgeduniya1432
@Knowledgeduniya1432 Год назад
@Beelzebub 😂
@reviewshyd1155
@reviewshyd1155 2 года назад
very well explained
@HarshaDwivedi33
@HarshaDwivedi33 6 месяцев назад
Thank you bhaiya ji
@mshrisha15
@mshrisha15 6 месяцев назад
Ur handwriting 😩😩was awesome ❤
@dineshkumawat9920
@dineshkumawat9920 3 года назад
Sir me bitcoin keys ke baare me kuch puchna chahta hu key ke type ki phle kis kis trh ki key aaya krti thi
@akshaymahajan4907
@akshaymahajan4907 Год назад
Very Nice Explanation.
@lakshsinghania
@lakshsinghania 10 месяцев назад
bhaiya, i didnt get this point as u said asymmetric encryption keliye koi bhi "key" use kar sakte ho so if we use private key (A) for encryption i.e the plain text is converted to cipher text and the attacker or any 3rd party can decrypt it using public key as it known to whole world. Whats the use of this method and it doesnt make any sense? can u pls brief on this for clarifying it properly
@yaminin5809
@yaminin5809 2 года назад
Good explanation sir best of luck
@vinayaksharma7134
@vinayaksharma7134 2 года назад
thank You bhaiya!!!
@arshsingh1218
@arshsingh1218 5 месяцев назад
Thnx sir
@rimsha6001
@rimsha6001 2 года назад
Asslam u alaikum Sir Aik question hai kindly answer krdy Question: IT Security Personnel Security Physical Security Operational Security Into which of these would you put the following, justify your choice?  Enforcing hard-to-guess passwords  Encrypting your hard drive  Looking sensitive documents in a safe  Stationing a marine guard outside an embassy  Assigning security clearances to staffers  Using SSL for data transfer  Having off-site backup of documents Plzzz sir i request you iska answer bta dy plzzzz
@webxlo128
@webxlo128 2 года назад
based on advanced encryption standard if c={74} instead of c={63}in s box construction, find a value for the position 78 in the sbox
@gopalkumar9804
@gopalkumar9804 Год назад
Tomorrow my exam 🤞🏻
@mdafroj6058
@mdafroj6058 7 месяцев назад
very excellent Abhishek Bhai
@amankr9093
@amankr9093 3 года назад
Sir aisa hi video aur bhi aage bnaye ye meri request hai aapse
@sibgathassan6281
@sibgathassan6281 3 года назад
Symmetric ma jab key b internet sae share hoga . Attacker Key le k decrypt nahi karsakhta ha??
@asiankingofficial6579
@asiankingofficial6579 2 года назад
This is the best explanation video for me love you bhai Jai hind
@sajeedullah4583
@sajeedullah4583 3 года назад
thanks for making such an understandable Videos for us, you made it very easy for us.
@ronit3014
@ronit3014 3 года назад
5:26 Apni public aur *private key* kese Pta kre ye device vise hoti h ya app vise ???
@rohitjadhav7844
@rohitjadhav7844 2 года назад
Tnx sir
@ruksharparveen6137
@ruksharparveen6137 2 года назад
Thanks a lot for this video. It is very useful for me .
@ronit3014
@ronit3014 3 года назад
5:39 Private Key device ke inbuilt hidden rhti h ya hm usko dekh skte h ??? Dekh skte h >to> share kr skte Share kr skte h to *HACK bhi to kr skte h* 😛😛😛
@kamar1380
@kamar1380 4 года назад
Bro can you provide notes of this series..? Thnks for this awesome video...👍
@rajindernegi8280
@rajindernegi8280 Год назад
Can you please share the book name you refer in your videos of cryptography
@welcomeworld1739
@welcomeworld1739 2 года назад
This is very helpful , thank you
@mineemisha1875
@mineemisha1875 5 лет назад
Nice explain
@vicky02078671
@vicky02078671 4 года назад
Nice job sir thank you blowwish algorithm pr vedio bnye pls
@ss-ub6qb
@ss-ub6qb 5 месяцев назад
(how to attack a classical cipher using known partial plaintext? ) bhai isko explain kar do
@Virgo23
@Virgo23 Год назад
thanks a lot
@pranjulgupta9250
@pranjulgupta9250 3 года назад
Thanks a lot, it is really helping
@dikshachawla6451
@dikshachawla6451 3 года назад
Kindly share some videos on implementation.
@amlassalma8090
@amlassalma8090 Год назад
Mashallah kaa chalatha hoo ab thanks bhai
@anishasingh3306
@anishasingh3306 5 месяцев назад
Awesome❤
@trineshyadav4379
@trineshyadav4379 3 года назад
Rootkit aur attacker hijacking kr bare me vedio bnaye sir aap
@Bobby_00l7
@Bobby_00l7 9 месяцев назад
Today is my exam 😅
@dollydewangan8964
@dollydewangan8964 3 года назад
Thank you so much sir it's interesting 👌👌
@pawanbhoyar032
@pawanbhoyar032 Год назад
Thank you so much sir ❤
@NiranjanaGandharva
@NiranjanaGandharva Год назад
Sir please or bhi subject pe vedio banao
@debjitpaul8580
@debjitpaul8580 4 года назад
Doubt: You said a msg that is encrypted by a public key can only be decrypted by using a private key and vice versa. That means two different keys are necessary, right? So what is use of Symmetric cryptography then? You just said I cannot use the same key for both encryption and decryption. Please clarify this, anyone!
@AbhishekSharmaDit
@AbhishekSharmaDit 4 года назад
That is applicable only for asymmetric key Cryptography " the public and private key concept " And in symmetric key Cryptography We will use the same key for Encryption and decryption
@debjitpaul8580
@debjitpaul8580 4 года назад
@@AbhishekSharmaDit In symmetric can it be either of public or private key? Are there any rules for that?
@AbhishekSharmaDit
@AbhishekSharmaDit 4 года назад
@@debjitpaul8580 there is no public or private key concept in symmetric key Cryprtography Key can be anything (generally any sequence of characters) Like key can be "absd@1hj" Or it can even be your name Hope doubt is clear now !! Follow the series U will get your doubts cleared
@anildanes2807
@anildanes2807 3 года назад
Brother explain about secret key,public key and message digest.
@Adventure581
@Adventure581 4 года назад
Superb sir👌👌
@Fit_medico_brishnikant
@Fit_medico_brishnikant 4 года назад
Bro mst 👌👌👌
@23ashobhasoni56
@23ashobhasoni56 Год назад
iska encryption methode kya hoga?
@nandanisharma9045
@nandanisharma9045 2 года назад
Nice explanation 😇👍
@YN.PICTURES
@YN.PICTURES 2 года назад
Bro you're great 👏👍,
@nusrathunnisa9645
@nusrathunnisa9645 4 года назад
Can u plz explain model of conventional cryptosystem
@apoorvav7430
@apoorvav7430 2 года назад
Where can we find the pdf of ur notess Please reply
@snehasish-bhuin
@snehasish-bhuin 3 года назад
Every videos are very good 👍. If you plz share a pdf document of your notes that will be more attractive
@vantal4115
@vantal4115 2 года назад
Bro decryption ke liye A ki private key kyu use kr rahe ho...how B is getting A's private key?
@anjana6898
@anjana6898 2 года назад
Helpful🙏
@lhakpasingi
@lhakpasingi 3 года назад
Very useful 😊🙏🌻
@ladydimitrescu1155
@ladydimitrescu1155 4 года назад
Thankyou so much!
@MM_editz_media
@MM_editz_media 2 года назад
Thank you soo much😍
@ronit3014
@ronit3014 3 года назад
*Public key aur Private key* me relation HOTA hoga tabhi to Private key public key se *encrypted* msg ko *decrypt* kr pati h 🤫🤫🤫 To hm public key se *Private Key* drive nhi kr skte kya ? 🤘🤘🤘
@ejanshrestha9504
@ejanshrestha9504 4 года назад
how you capture like this ? which camera stand u use ?
@binod9988
@binod9988 Год назад
DES=Data Encryption Standard(not system)
@annubhati3442
@annubhati3442 4 года назад
Sir , information systems analysis designs k notes ki vdeo bna do.
@nishikantshirke273
@nishikantshirke273 4 года назад
Agr A side se public(A) key se message encrypt kiya to B ke end pe private (A) key se message decrypt karna hoga...but private key to A ke pass hi rahegi...fir B kaise decrypt karega?
@AbhishekSharmaDit
@AbhishekSharmaDit 4 года назад
A apni nahi B ki public key se Encryption karega So that B apni private key ko use karke info decryption kar sake Baki if you will follow my playlist U will get everything Sab doubts apne aap clear ho jayenge So i would recommend playlist follow karo Sab bahot ache se samajh aa jayega 😊
@nishikantshirke273
@nishikantshirke273 4 года назад
Now it's perfect 😊👍
@TheShubham778
@TheShubham778 3 года назад
Awesome
@technicalcoding2710
@technicalcoding2710 4 года назад
Love it 🥰
@VikasGS-kl1sj
@VikasGS-kl1sj 3 года назад
bro pls provide the notes in pdf format for us ...it will be very helpfull.
@saipavan1442
@saipavan1442 4 года назад
Super
@nomansyt
@nomansyt 2 года назад
My college professor has 18 years of experience, still you are far better then him. I respect him too
@mackmenezes4912
@mackmenezes4912 Год назад
The longer you teach the more you realise the pain suffering and coldness the teachers in college feel ,they are so bored ,and the smart students in class are even more idiotic that the don't share how they do the work,it's not the smart students fault as well ,they were born and raised up in FACTORIES
@23_h_rajatbhatt21
@23_h_rajatbhatt21 2 года назад
aapke notes provide krate hai kya
@tusharpatne6863
@tusharpatne6863 3 года назад
Great content sir, can you please provide a pdf of these notes
@iamsky.20
@iamsky.20 Год назад
please make pdf of notes and provide a link that would be really helpful
@veerannahattiholi3672
@veerannahattiholi3672 2 года назад
Sir can we get pdf of your notes ......so that it will be very much usefull for us !
@capturedunia8835
@capturedunia8835 5 месяцев назад
Hello Sir, Can you please share the pdf file for these lectures?
@bishwajeetpandey1570
@bishwajeetpandey1570 2 года назад
7:41 doubt : you said message will be decrypted using private key of A( sender) , but how will B (recipient) have A's private key . Clearify this .😐
@Study_at_Home453
@Study_at_Home453 Год назад
This is incorrect... Private key of reciever tht is b
@veersharma1333
@veersharma1333 3 года назад
Good👍
@FirstLearningthanEarning
@FirstLearningthanEarning 4 года назад
Bro if we use public key of A to encrypt a mssg than how B can decrypt it Bcz private key of A is known to himself ?? Public key of A --- Encryption Private key of A --- Decryption How it possible bcz B dont know the private key of A
@AbhishekSharmaDit
@AbhishekSharmaDit 4 года назад
It is possible in a scenario where where we use 2 Encryption and 2 DECRYPTION Like Encrypt using private of A( to get authentication) Encrypt using public of B (for confidentiality) Decrypt using private of B ( now only B can decrypt it because nobody other than B knows his private key) Decrypt using public of A (so we get authentication because if we are able to decrypt it using public if A then, it must have been ENCRYPted with private of A)
@FirstLearningthanEarning
@FirstLearningthanEarning 4 года назад
@@AbhishekSharmaDit Exact Technique name in this Scenario...
@0ceanman3
@0ceanman3 3 года назад
@@AbhishekSharmaDit I think you are mistaken. The scenario plays out the following way:- Both A and B have their own key-pair, say: *A has* : *A_priv* and *A_pub* *B has* : *B_priv* and *B_pub* For *A* to send a message to *B*: *A* will use *B_pub* to encrypt, therefore *B* can easily decrypt it using *B_priv* For B to send a message to A: *B* will use *A_pub* to encrypt, therefore *A* can easily decrypt it using *A_priv*
@ayanokoji5594
@ayanokoji5594 3 года назад
@@0ceanman3 nice explanation..
@bhartisoni4325
@bhartisoni4325 3 года назад
@@0ceanman3 hann same jaise email kiya jata hai
@swastikjoshi1125
@swastikjoshi1125 Год назад
Notes upload krdo bhai!
@maneeshgeed2258
@maneeshgeed2258 4 года назад
Sir Can you please provide the handwritten pdf of whole lecture.
@mackmenezes4912
@mackmenezes4912 Год назад
Write it on paper,why troubling sir?🤬
@bablubhatt22
@bablubhatt22 Год назад
Oy help milti h usme troubling ni khte h ... Pdf provide krne m ky ho ra h ... Pdf hmehsa kam aaate h
@shivamsuchak5807
@shivamsuchak5807 4 года назад
hey your playlist is really good and useful, Can i have your book?
@AbhishekSharmaDit
@AbhishekSharmaDit 4 года назад
Cryptography and network security by Behrouz A Forouzan
@BadalKumar-tu2wg
@BadalKumar-tu2wg 3 года назад
Notes download kaise kare
@rakeshmd7882
@rakeshmd7882 3 года назад
Bro can u pls share the notes that u hve explained
@Ghosttitan-S141
@Ghosttitan-S141 4 года назад
Form where do the key 1 and key 2 come from???
@priyankagarg3891
@priyankagarg3891 2 года назад
Hey, can you provide your notes as well
@Viveks_Gyan_Hub
@Viveks_Gyan_Hub 25 дней назад
❤❤❤
@sachinduhan3022
@sachinduhan3022 4 года назад
can you share the pdf of notes thanks in advance great content
@nomansyt
@nomansyt 2 года назад
Bhai 8:33 suddenly voice left side wale earphone m aai Kasam se derr gaya
@engineerscodes
@engineerscodes 4 года назад
bro plz check you have to use receiver key (public ) to encrypt and to decrypt u need the private key of the receiver. if the b know a private key than what's the use .plz think
@AbhishekSharmaDit
@AbhishekSharmaDit 4 года назад
We use private key concept in digital signatures Watch the video of digital signatures also u will have more clarification 💯✌️
@engineerscodes
@engineerscodes 4 года назад
@@AbhishekSharmaDit but how will b know A's private key, if that the case then it not private key is guess
@AbhishekSharmaDit
@AbhishekSharmaDit 4 года назад
@@engineerscodes yeah he will not know B's key A will encrypt using his own private key ✌️
@ujjwalsingh8105
@ujjwalsingh8105 2 года назад
can uh share your hand written notes with us???? ..😊
@Badman-di9mb
@Badman-di9mb Год назад
sir Voip communication kra do
Далее
Rate our flexibility 1-10🔥👯‍♀️😈💖
00:12
Asymmetric Encryption - Simply explained
4:40
Просмотров 1,3 млн