00:06 PGP has three cases for network security 02:06 Encryption process involves key and data input 03:58 Data compression and encryption for security 05:57 Conventional encryption uses a single key for both encryption and decryption. 07:47 Conventional decryption process explained 09:31 Encryption process with PGP using public and private keys 11:21 Confidentiality and authentication are achieved through encryption and decryption processes. 13:14 Overview of PGP decryption process
Mamm please do videos on 1.remote user-authentication using symmetric encryption 2.A simple authentication dialogue 3.Remote user authentication using asymmetric encryption 4.Federated identity management Please do videos on the above topic I'm from JNTUA university student
I am a bit confused about why the message which was neither hashed nor encrypted on the sender's side is getting retrieved using the hash function on the receiver's side?
00:06 PGP has three cases for network security
02:06 Encryption process involves key and data input
03:58 Data compression and encryption for security
05:57 Conventional encryption uses a single key for both encryption and decryption.
07:47 Conventional decryption process explained
09:31 Encryption process with PGP using public and private keys
11:21 Confidentiality and authentication are achieved through encryption and decryption processes.
13:14 Overview of PGP decryption process
Thanks a lot for your effort, I cleared last sem ML subject by just watching your ML playlist . Again I am back to learn CNS
And u cleared that again by watching this..pov I also done same😂
You are good teaching 👍don't get worry it's all clear for all if it's not cleared .once they see this vedio on loop mode they will understand 😉
you are so loyal with your work 😊
👍🏻 GREAT(This is Jhukega nhi wala explaination👌🙏🏻)
8:28 😻
very clear and detailed explanation mam👏👏
You were excellent in the explanation!
You explained it so well! Thank you so much. ❤
such a great explanation mam..
Explained so so so so well🔥🔥🔥🔥
thanks a lot mam...It's really very understandable and very clear
Love you ka,Really helped me a lot
In one word it's awesome👍👏😊 mamm
Thank you so much mam 😊excellent explanation ✨💖
It's really good 👍 and completely got it thank you so much akka ❤
Well Explanation and good teaching mam...❤🎉
It's clear to learn mam thank you ❤
13:44 Hy one doubt ...if we have to reverse the process means then why didn't we broke the concatenation here...can you explain it please (ʘᴗʘ✿)
Tnx for saving 🙌🙌 really good explanation 💥💥💥💥
Great ma'am 🔥🔥🔥🤗
Really Very interesting u r explanation
Continue CNS 🙏
Very well explained.
ur best , helps me to understand thanks....
Mamm please do videos on
1.remote user-authentication using symmetric encryption
2.A simple authentication dialogue
3.Remote user authentication using asymmetric encryption
4.Federated identity management
Please do videos on the above topic
I'm from JNTUA university student
Admn no entha bro
in confidentiality you said conventional encryption means using symmetric key then why are we using two different keys?
Thank you thank you thanks alot
Please make videos on cloud computing syllabus of JNTUK R19. We have exam on 23rd. Glad if you could respond!
Plz explain intrusion detection system in CNS ...
Thanks..💥❤️
Thank You
Thankyou
U really did good
Omg it is so confusing
Thank you mam
IN LAST YOU HAVE MISSED ADDING (PU)A at time 14:03
U did well btw❤🎉🎉
thank u ma'am
Tqs mam.....❤
I am a bit confused about why the message which was neither hashed nor encrypted on the sender's side is getting retrieved using the hash function on the receiver's side?
Thnx.
Tq
Hi mam can u Plz upload data mining video
Okay understand gd
thanks mam
Madam please do video about electronic sensors
;
Mam....is the subject of cns is over or any topic remains???
First two cases combine and write means?🙄 No need of case 3 right in place of case 3 copy case1,2 please reply
I love u madam ❤❤❤❤
mam pls do videos on Principles of entrepreneurship acc to R18 JNTUH
U ® 🔥🔥🔥
"Hope you understand the concept and if not, I'm sorry" 😭😭😭😭
Which book is best madam please replay please
If you don't mind continue CSOM SUBJECT 🙏
Do videos on Big data analytics plzzz
You need to understand first.
I love you 😍 mam
Mam... public key and private key are same or different... confused
The key is same but their security level is different
It's good pretty at authentication start confusion at confidentiality 😂😴
😵
worst subject in engineering till now 😥😥😩😩
so many lies in the comments
wow thank you interesting and please sent ur social media link
Thankyou mam ❤
thank you ma'am