Digital Signature - Asymmetric Key , Why used for Authentication & Non Repudiation (Hindi)

แชร์
ฝัง
  • เผยแพร่เมื่อ 27 ส.ค. 2024
  • Digital Signature - Asymmetric Key Cryptography, Why used for Authentication and Non Repudiation (Hindi)
    Keywords:
    Digital Signature
    Asymmetric Encryption
    Authentication
    Non Repudiation
    👉 Follow us on Social media:
    Facebook: tiny.cc/ibdrsz
    ▶️ Links for Hindi playlists of all subjects are:
    Data Structure: tiny.cc/lkppsz
    #DBMS : tiny.cc/zkppsz
    #Java: tiny.cc/1lppsz
    Control System: tiny.cc/3qppsz
    Computer Network Security: tiny.cc/6qppsz
    Web Engineering: tiny.cc/7qppsz
    Operating System: tiny.cc/dqppsz
    EDC: tiny.cc/cqppsz
    TOC: tiny.cc/qqppsz
    Software Engineering: tiny.cc/5rppsz
    DCN: tiny.cc/8rppsz
    Data Warehouse and Data Mining: tiny.cc/yrppsz
    Compiler Design: tiny.cc/1sppsz
    Information Theory and Coding: tiny.cc/2sppsz
    Computer Organization and Architecture(COA): tiny.cc/4sppsz
    Discrete Mathematics (Graph Theory): tiny.cc/5sppsz
    Discrete Mathematics Lectures: tiny.cc/gsppsz
    C Programming: tiny.cc/esppsz
    C++ Programming: tiny.cc/9sppsz
    Algorithm Design and Analysis(ADA): tiny.cc/fsppsz
    E-Commerce and M-Commerce(ECMC): tiny.cc/jsppsz
    Adhoc Sensor Network(ASN): tiny.cc/nsppsz
    Cloud Computing: tiny.cc/osppsz
    STLD (Digital Electronics): tiny.cc/ysppsz
    Artificial Intelligence: tiny.cc/usppsz
    Links for #GATE/#UGCNET/ PGT/ TGT CS Previous Year Solved Questions:
    UGC NET : tiny.cc/brppsz
    DBMS GATE PYQ : tiny.cc/drppsz
    TOC GATE PYQ: tiny.cc/frppsz
    ADA GATE PYQ: tiny.cc/grppsz
    OS GATE PYQ: tiny.cc/irppsz
    DS GATE PYQ: tiny.cc/jrppsz
    Network GATE PYQ: tiny.cc/mrppsz
    CD GATE PYQ: tiny.cc/orppsz
    Digital Logic GATE PYQ: tiny.cc/rrppsz
    C/C++ GATE PYQ: tiny.cc/srppsz
    COA GATE PYQ: tiny.cc/xrppsz
    DBMS for GATE UGC NET : tiny.cc/0tppsz

ความคิดเห็น • 73

  • @wiretap9458
    @wiretap9458 5 ปีที่แล้ว +20

    It's always good to watch his videos at 2x speed otherwise best of luck

  • @saishabbhattarai3511
    @saishabbhattarai3511 5 ปีที่แล้ว +6

    6:58
    Public key is used to Encrypt and private key is used to Decrypt

  • @nishantkayastha8325
    @nishantkayastha8325 5 ปีที่แล้ว +7

    03:34 user will decrypt using the company's public key, if i am ryt..

    • @manzarsiddiqui2783
      @manzarsiddiqui2783 5 ปีที่แล้ว

      kuch bhi bol ra hai ye ..dusri video dekh le

    • @nishantkayastha8325
      @nishantkayastha8325 5 ปีที่แล้ว

      @@manzarsiddiqui2783 me or video maker?

    • @SahilSaini-mm9xy
      @SahilSaini-mm9xy 4 ปีที่แล้ว

      yes.. and the sender encrypts it using its private key.

    • @Amitsingh-up2rt
      @Amitsingh-up2rt 4 ปีที่แล้ว

      the Sender encrypt the data with its private key and receiver decrypt the data using senders public key.

  • @SunnyKumar-kt1po
    @SunnyKumar-kt1po 5 ปีที่แล้ว +2

    i don't like those who are disliking the video, This youtuber is also contributing for indian economy,👍👍

    • @solowolf5304
      @solowolf5304 ปีที่แล้ว

      galat padha rha hai bhaai, private key se decryption hoti, public key se encryption

  • @mnihsingh4388
    @mnihsingh4388 5 ปีที่แล้ว

    Awesome sir apki sari videos kafi knowledgeable nd helpfull hoti h

  • @SantoshBalakrishnanVSL
    @SantoshBalakrishnanVSL 6 ปีที่แล้ว +2

    You should add Digital Certificate's use case for Integrity as well. You seem to have missed out on that.

  • @prakalpwarjukar8572
    @prakalpwarjukar8572 7 ปีที่แล้ว +1

    awesome sir.. I m impressed with your teaching

  • @rahulchutani7077
    @rahulchutani7077 6 ปีที่แล้ว +11

    u missed the hashing and certifacte part

    • @akashthoriya
      @akashthoriya 4 ปีที่แล้ว

      it is enhanced version of digital signature

  • @vuldung
    @vuldung 7 ปีที่แล้ว +1

    well explained. fully satisfied.

  • @buzzfeedRED
    @buzzfeedRED 6 ปีที่แล้ว +4

    NOW SIR MY QUESTION IS THIS " HOW THE PUBLIC KEY OF THE COMPANY REACHED TO THE USER ??? AND YOU DIDN'T TALK ABOUT DIGITAL CERTIFICATES AND USE OF HASHING IN THE DIGITAL SIGNATURES....

    • @wiretap9458
      @wiretap9458 5 ปีที่แล้ว

      yes, i have also seen the hashing function in it in the books

  • @SunnyKumar-kt1po
    @SunnyKumar-kt1po 5 ปีที่แล้ว +3

    Cyber security subject is also available in MBA 😊😊

  • @kidsEntertainment-pak
    @kidsEntertainment-pak 5 ปีที่แล้ว

    Well explained with the help of flow chart. Great

  • @atharsarkar1804
    @atharsarkar1804 2 ปีที่แล้ว

    Thanks

  • @viraj_singh
    @viraj_singh 7 ปีที่แล้ว +3

    Good Handwriting sir.

  • @creationtime3032
    @creationtime3032 7 ปีที่แล้ว

    your videos sir too good.... thaxx for videos 😊

  • @letsgocrazyyyy
    @letsgocrazyyyy 6 ปีที่แล้ว

    Thanks sir
    Knowledgeable

  • @nadiasaleem6716
    @nadiasaleem6716 4 ปีที่แล้ว

    Sir shift and add algorithm py b video bnaye kindly

  • @KayVirals
    @KayVirals 5 ปีที่แล้ว +5

    TOTALLY WRONG CONCEPT VIDEO. I like your videos but please don't confuse students who trusts you. You started teaching digital signatures and ended up teaching asymmetric key encryption block diagram.

    • @salonisingh9205
      @salonisingh9205 5 ปีที่แล้ว

      Ryt

    • @lokeshchaudhary
      @lokeshchaudhary 5 ปีที่แล้ว

      Right bro

    • @Amitsingh-up2rt
      @Amitsingh-up2rt 4 ปีที่แล้ว

      Bro because it uses public key encryption method in digital Signature

    • @shriram6123
      @shriram6123 4 ปีที่แล้ว

      He is explaining how digital signature works
      Digital signature uses asymmetric key

  • @kaleemullah247
    @kaleemullah247 7 ปีที่แล้ว +5

    at 4:25 he said the user decrypts data sent by mobile complany with his own public key, why the hell would he do so ???
    for authentication and non repudiation the user decrypts the data with the senders public key not his own public key and if the data is decrypted only then we can say data is from authentic source

    • @shriram6123
      @shriram6123 4 ปีที่แล้ว

      7:00 he cleared that

  • @surajjaiswal4215
    @surajjaiswal4215 7 ปีที่แล้ว

    Plz upload the videos of types of digital signature

  • @studyfix362
    @studyfix362 7 ปีที่แล้ว

    well explaination sir

  • @tshubham7
    @tshubham7 6 ปีที่แล้ว

    Thank-you

  • @shubhyank263599
    @shubhyank263599 7 ปีที่แล้ว

    dear sir , please make video of Ldap

  • @manishayadav1595
    @manishayadav1595 3 ปีที่แล้ว

    Sir Digital Signature is one way process ....how can we get plain text from encrypted hash(digital signature )???

  • @dhirendra_chouhan
    @dhirendra_chouhan 6 ปีที่แล้ว +1

    In your previou lecture on RSA you said that encryption use public key and decryption use public key but in this lecture you just said opposite

    • @hashamjaved
      @hashamjaved 6 ปีที่แล้ว

      Dhirendra Chouhan encryption is done with public key and decryption is done with private key

    • @nimishgupta5289
      @nimishgupta5289 5 ปีที่แล้ว

      0:56 what sir told.
      Encryption is done with private key, and decryption is done with public key?
      I'm confused.

    • @RajendraPrasad-qt4ny
      @RajendraPrasad-qt4ny 2 ปีที่แล้ว

      He seems to be confusion in many more topics likewise.....
      encryption is done by receiver`s public key and decrytption is done by using private key because public key can be transferred but not private key...

  • @rinzinnorbu3518
    @rinzinnorbu3518 5 ปีที่แล้ว

    how digital signature works with cryptographic hash function....thank you

  • @sreeniv09
    @sreeniv09 7 ปีที่แล้ว

    excellent

  • @santhoshhv1288
    @santhoshhv1288 5 ปีที่แล้ว +6

    Concept is wrong encryption will be done by public key and decryption done by private key totally wrong teaching and confusing

    • @iEntertainmentFunShorts
      @iEntertainmentFunShorts 5 ปีที่แล้ว +3

      Okk its not wrong dude ...this is digital signature not a cryptography whatever you said it done at cryptohraphy thats provide the confidentiality but in DS we required only authenticity.
      But they don't explain how distribution of public key is done and moreover they not explained how mesaage digest will be done at Digital signature (DS)
      I recommend to you read kurose and ross or fourozen book for this you got everything but don't worry the concept they said its absolutely ryt....

  • @kiyaramodgill3938
    @kiyaramodgill3938 6 ปีที่แล้ว +1

    sir apne btya acha but u was cnfused which makes me cmfused too

  • @kirankoundal4285
    @kirankoundal4285 5 ปีที่แล้ว

    Thnks sir g

  • @deepaknarsaria
    @deepaknarsaria 6 ปีที่แล้ว

    nice video

  • @swetaverma9680
    @swetaverma9680 5 ปีที่แล้ว

    Nice

  • @fahimmuhammadkhan3874
    @fahimmuhammadkhan3874 2 ปีที่แล้ว

    Why you are saying that user will decrypt the bill by his own public key while it was locked with the company's private key? R you sure! Is it really possible? Kindly correct u r self..

  • @vaidicpatel3636
    @vaidicpatel3636 7 ปีที่แล้ว

    great

  • @utkarshpanwar2358
    @utkarshpanwar2358 6 ปีที่แล้ว +6

    ye galat hai data encrypt public key se hoga aur decrypt private key se

    • @seemasen9631
      @seemasen9631 5 ปีที่แล้ว +3

      In digital signature the private key is used for encryption and the public key for decryption..

    • @sourabhkhandelwal689
      @sourabhkhandelwal689 5 ปีที่แล้ว

      It is not Encipherment, it is Digital Signature.

    • @iEntertainmentFunShorts
      @iEntertainmentFunShorts 5 ปีที่แล้ว

      Please make your concept clear its a DS not provide confidentiality only provide authenticity

  • @siliconcodes
    @siliconcodes 7 หลายเดือนก่อน

    Title:- In hindi
    Hindi- 10%
    English- 90%

  • @Abhisheksingh-ud8ht
    @Abhisheksingh-ud8ht 5 ปีที่แล้ว

    sir public or private key send kaise hoti hai ??? plzz answer my question...

    • @iEntertainmentFunShorts
      @iEntertainmentFunShorts 5 ปีที่แล้ว

      Okk if you s send your private key then how you protect your data please clear your concept and second thing public key distribution is possible by using certification athority (CA) go for it forouzan book well explained.

  • @imtheflamex
    @imtheflamex 5 ปีที่แล้ว

    Hagg die ho ap sir 😂
    Guys u can checkout last moment tutions tc.

  • @lokeshchaudhary
    @lokeshchaudhary 5 ปีที่แล้ว +2

    कृपया हिंदी भाषा को ही प्रयोग में लाएं...
    आपकी इंग्लिश 2 फुट ऊपर से गुजर जाती है

    • @GauravKumar-bk7hh
      @GauravKumar-bk7hh 4 ปีที่แล้ว

      bhawnao ko samjho bhai
      koi padha raha sahi to usko appreciate karo bhai. kya tum bhi

  • @persaramawlongmawlong6267
    @persaramawlongmawlong6267 5 ปีที่แล้ว

    waw but i don't understand.

  • @khelkhelmegk3782
    @khelkhelmegk3782 5 ปีที่แล้ว

    Smjh nhi aya bro

  • @nisharani5272
    @nisharani5272 5 ปีที่แล้ว

    sir confuse kar diyaa

  • @muhammadiqbalbazmi9275
    @muhammadiqbalbazmi9275 5 ปีที่แล้ว

    sorry sir, concept is wrong

  • @sahiljaiswal152
    @sahiljaiswal152 4 ปีที่แล้ว

    Not satisfied,sorry but you need to go little bit in detail

  • @janvioberoi2200
    @janvioberoi2200 6 ปีที่แล้ว +4

    Sir aap teaching na hi kro to behtar h

    • @Galaxyoz
      @Galaxyoz 5 ปีที่แล้ว

      🤦🤦🤦

  • @SaifKhan-tm6yh
    @SaifKhan-tm6yh 5 ปีที่แล้ว

    ur explanations is wrong

  • @thinkcool8097
    @thinkcool8097 5 ปีที่แล้ว

    Example is pathetic...