Digital Signature - Asymmetric Key , Why used for Authentication & Non Repudiation (Hindi)
ฝัง
- เผยแพร่เมื่อ 27 ส.ค. 2024
- Digital Signature - Asymmetric Key Cryptography, Why used for Authentication and Non Repudiation (Hindi)
Keywords:
Digital Signature
Asymmetric Encryption
Authentication
Non Repudiation
👉 Follow us on Social media:
Facebook: tiny.cc/ibdrsz
▶️ Links for Hindi playlists of all subjects are:
Data Structure: tiny.cc/lkppsz
#DBMS : tiny.cc/zkppsz
#Java: tiny.cc/1lppsz
Control System: tiny.cc/3qppsz
Computer Network Security: tiny.cc/6qppsz
Web Engineering: tiny.cc/7qppsz
Operating System: tiny.cc/dqppsz
EDC: tiny.cc/cqppsz
TOC: tiny.cc/qqppsz
Software Engineering: tiny.cc/5rppsz
DCN: tiny.cc/8rppsz
Data Warehouse and Data Mining: tiny.cc/yrppsz
Compiler Design: tiny.cc/1sppsz
Information Theory and Coding: tiny.cc/2sppsz
Computer Organization and Architecture(COA): tiny.cc/4sppsz
Discrete Mathematics (Graph Theory): tiny.cc/5sppsz
Discrete Mathematics Lectures: tiny.cc/gsppsz
C Programming: tiny.cc/esppsz
C++ Programming: tiny.cc/9sppsz
Algorithm Design and Analysis(ADA): tiny.cc/fsppsz
E-Commerce and M-Commerce(ECMC): tiny.cc/jsppsz
Adhoc Sensor Network(ASN): tiny.cc/nsppsz
Cloud Computing: tiny.cc/osppsz
STLD (Digital Electronics): tiny.cc/ysppsz
Artificial Intelligence: tiny.cc/usppsz
Links for #GATE/#UGCNET/ PGT/ TGT CS Previous Year Solved Questions:
UGC NET : tiny.cc/brppsz
DBMS GATE PYQ : tiny.cc/drppsz
TOC GATE PYQ: tiny.cc/frppsz
ADA GATE PYQ: tiny.cc/grppsz
OS GATE PYQ: tiny.cc/irppsz
DS GATE PYQ: tiny.cc/jrppsz
Network GATE PYQ: tiny.cc/mrppsz
CD GATE PYQ: tiny.cc/orppsz
Digital Logic GATE PYQ: tiny.cc/rrppsz
C/C++ GATE PYQ: tiny.cc/srppsz
COA GATE PYQ: tiny.cc/xrppsz
DBMS for GATE UGC NET : tiny.cc/0tppsz
It's always good to watch his videos at 2x speed otherwise best of luck
6:58
Public key is used to Encrypt and private key is used to Decrypt
03:34 user will decrypt using the company's public key, if i am ryt..
kuch bhi bol ra hai ye ..dusri video dekh le
@@manzarsiddiqui2783 me or video maker?
yes.. and the sender encrypts it using its private key.
the Sender encrypt the data with its private key and receiver decrypt the data using senders public key.
i don't like those who are disliking the video, This youtuber is also contributing for indian economy,👍👍
galat padha rha hai bhaai, private key se decryption hoti, public key se encryption
Awesome sir apki sari videos kafi knowledgeable nd helpfull hoti h
You should add Digital Certificate's use case for Integrity as well. You seem to have missed out on that.
awesome sir.. I m impressed with your teaching
u missed the hashing and certifacte part
it is enhanced version of digital signature
well explained. fully satisfied.
NOW SIR MY QUESTION IS THIS " HOW THE PUBLIC KEY OF THE COMPANY REACHED TO THE USER ??? AND YOU DIDN'T TALK ABOUT DIGITAL CERTIFICATES AND USE OF HASHING IN THE DIGITAL SIGNATURES....
yes, i have also seen the hashing function in it in the books
Cyber security subject is also available in MBA 😊😊
Well explained with the help of flow chart. Great
Thanks
Good Handwriting sir.
your videos sir too good.... thaxx for videos 😊
Thanks sir
Knowledgeable
Sir shift and add algorithm py b video bnaye kindly
TOTALLY WRONG CONCEPT VIDEO. I like your videos but please don't confuse students who trusts you. You started teaching digital signatures and ended up teaching asymmetric key encryption block diagram.
Ryt
Right bro
Bro because it uses public key encryption method in digital Signature
He is explaining how digital signature works
Digital signature uses asymmetric key
at 4:25 he said the user decrypts data sent by mobile complany with his own public key, why the hell would he do so ???
for authentication and non repudiation the user decrypts the data with the senders public key not his own public key and if the data is decrypted only then we can say data is from authentic source
7:00 he cleared that
Plz upload the videos of types of digital signature
well explaination sir
Thank-you
dear sir , please make video of Ldap
Sir Digital Signature is one way process ....how can we get plain text from encrypted hash(digital signature )???
In your previou lecture on RSA you said that encryption use public key and decryption use public key but in this lecture you just said opposite
Dhirendra Chouhan encryption is done with public key and decryption is done with private key
0:56 what sir told.
Encryption is done with private key, and decryption is done with public key?
I'm confused.
He seems to be confusion in many more topics likewise.....
encryption is done by receiver`s public key and decrytption is done by using private key because public key can be transferred but not private key...
how digital signature works with cryptographic hash function....thank you
excellent
Concept is wrong encryption will be done by public key and decryption done by private key totally wrong teaching and confusing
Okk its not wrong dude ...this is digital signature not a cryptography whatever you said it done at cryptohraphy thats provide the confidentiality but in DS we required only authenticity.
But they don't explain how distribution of public key is done and moreover they not explained how mesaage digest will be done at Digital signature (DS)
I recommend to you read kurose and ross or fourozen book for this you got everything but don't worry the concept they said its absolutely ryt....
sir apne btya acha but u was cnfused which makes me cmfused too
Thnks sir g
nice video
Nice
Why you are saying that user will decrypt the bill by his own public key while it was locked with the company's private key? R you sure! Is it really possible? Kindly correct u r self..
great
ye galat hai data encrypt public key se hoga aur decrypt private key se
In digital signature the private key is used for encryption and the public key for decryption..
It is not Encipherment, it is Digital Signature.
Please make your concept clear its a DS not provide confidentiality only provide authenticity
Title:- In hindi
Hindi- 10%
English- 90%
sir public or private key send kaise hoti hai ??? plzz answer my question...
Okk if you s send your private key then how you protect your data please clear your concept and second thing public key distribution is possible by using certification athority (CA) go for it forouzan book well explained.
Hagg die ho ap sir 😂
Guys u can checkout last moment tutions tc.
कृपया हिंदी भाषा को ही प्रयोग में लाएं...
आपकी इंग्लिश 2 फुट ऊपर से गुजर जाती है
bhawnao ko samjho bhai
koi padha raha sahi to usko appreciate karo bhai. kya tum bhi
waw but i don't understand.
Smjh nhi aya bro
sir confuse kar diyaa
sorry sir, concept is wrong
Not satisfied,sorry but you need to go little bit in detail
Sir aap teaching na hi kro to behtar h
🤦🤦🤦
ur explanations is wrong
Example is pathetic...