Looks like her knowledge is limited. She didn't explain about how both exchanged the same symmetric key. How can you expect that the receiver already has the symmetric key? Actually both symmetric and asymmetric keys are used. First the symmetric key is transfered to the receiver through encrypting it through senders private key and decrypted it through the receivers public key or vice versa. Then the receiver gets the symmetric key so that they safely exchange data.
I am still not getting.. why is it call 'pretty good'. Is it not perfect. Atleast as per the video everything is being used to ensure security of the email. Then why ' pretty good'?
Thank you so much madam . It used for me for my exam . You are one of the best teachers .
pgp used u?
😂@@something_for_someone
@😂😂dark-wr4ek
Tomorrow is my exam,but it was easily explained by you madam😁
A clg bro
Vvit
pass to hu jaogi na
Sabka wahi haal he. 😅
That's false because the CNS exam is tomorrow
Tq mam I learned all questions in your TH-cam classes I am so sad for paying money to college 😅
Thank you so much ma'am.... ur video is very helpful for us
Mam i liked ur content 😁 without watching full video..😅 ..ur soo good 👌🏼
thank you madam you explained really good
You are welcome and good luck
your explanation ........... You helped me alot thanku so much
Looks like her knowledge is limited. She didn't explain about how both exchanged the same symmetric key. How can you expect that the receiver already has the symmetric key? Actually both symmetric and asymmetric keys are used. First the symmetric key is transfered to the receiver through encrypting it through senders private key and decrypted it through the receivers public key or vice versa. Then the receiver gets the symmetric key so that they safely exchange data.
The comment is on point.
best teaching madam
God bless you❤
Thank you so much!
0:19 The "oh sorry" felt so American
This is why you are failing the exam
@@bhupalrajubairam ok Raju 👶🏻
congratulations you unlocked the 3rd eye
Thank you mam frrr
Super explanation mam 🎉🎉🎉
good explanation
thank you🥰
Amazing Explained, You got New Subscriber!!
Love the way you teach 😁
Pls do lectures on POE according to R18 JNTUH syllabus
Pagal hai kya
thank you so much mam🥰
For decrypting the key also receiver has to know about key to decrypt.....
there is common key shared path...... it has many ways to send the key using third party ....
Nice explanation
I am still not getting.. why is it call 'pretty good'. Is it not perfect. Atleast as per the video everything is being used to ensure security of the email. Then why ' pretty good'?
Ur voice is so cuteeeeeeee 😍mam
Mam We have semester exams from jan 30
Jntuk R16 regulation
you missed one topic in 4th unit
Watching 2 hours before exam
(Oh sorry!) 0:19 it's really cute 😅
Chadukora puka
how receiver decrypt the symmetric key?
BCA student like
Mam please give link for study abroad content
Legends watching before exam
good explanation akka but less content ...........
Ohh sorry, yeah 😁
Thank you miss
Krishnamoorthy
thoda volume increase karo. nind aa rahi he isme😂
I have an exam,today 2 pm
Tommorow is cyber security exam
Anybody watching in 2024 🤔
Face reveal
Jntu students like here😂
please decrease that 15 sec sound
Chahra dikho 1m sub ho jayege
what with the Oh sorry attitude
Di dhanakrishna
🙄🙄
@@DK-jx6nk eppidi irruka
@@DK-jx6nk Di
@@DK-jx6nk reply panra
@@DK-jx6nk di