Bhai ajj abhi 4baje exam h and mujhe sab concept samjh mein aa raha h... thank you so much...but my bad mujhe pehle kyun nhi apka vdo Mila ...I can not complete all your videos because only 1hr left ...so thank you so much jitna bhi hua😊
Thank you so much, sir ....... I cleared 7 sem university exam subject which is Cryptography and network security.... your videos and your knowledge are helpful to me ....
Thank you Sir for this amazing playlist on CNS. Every concept is broken down into simpler chunks making it so easy to understand🙌. The way you explain is outstanding🤍 and the notes you provide for each topic are beautifully prepared and incredibly helpful🤍🥺 Your dedication to making the subject clear and accessible is truly❤. Keep up the great work❤🎉 . Thanku sir once again❤❤
Hash function me koi key nahi use hui h Key is only used after hame apna hashcode mil gyaa h after passing the msg throught the hash function And Ya to ham key encryption algo me use karre h to encrypt our msg I hope now samajh me agya hoga ✌️💯
abhishek bhaiya, cant we use hash function tied to cipher text ? just like u explained for MAC ? msg -> E with key (cipher text) -> H (h) -> append -> cipher text + h ab cipher text ko decrypt with key and hash ko compare kar do
bro i neeed answer of this question:- hashing is useful tool in (a)prevention of unauthorized file modification (b)the development of secure cryptography algorithm
Bhai ajj abhi 4baje exam h and mujhe sab concept samjh mein aa raha h... thank you so much...but my bad mujhe pehle kyun nhi apka vdo Mila ...I can not complete all your videos because only 1hr left ...so thank you so much jitna bhi hua😊
sbko aaise he lgta hai bhn😝
200 like krwa deta hun soch k like karne aya fir dekha bhai bahut aage nikal gya hai 😂😂😂😂
Us bhai us😂
Ab to lgta h kuch din me is comment p 200 like aa jayenge
@@TechLa-69 yahi bolne ja ra tha dekha ye koi pehle hi bol chuka hai
😂😂😂😂😂😂🗿🗿🗿🗿🗿🗿
@@TechLa-69153 to ho b gaye likes 😂
you are the best tutor of information security on you tube
Mind blowing Sir , You don't know but This is the Bestest Video In TH-cam To Understand Hash Function ❤❤❤
You break down things beautifully! Thank you!
Thank you so much, sir ....... I cleared 7 sem university exam subject which is Cryptography and network security.... your videos and your knowledge are helpful to me ....
Do u have Question paper ?
Thanks sir
Your playlist played a crucial role to learn information security in 5th semester of BTech ❤
Very clear explanation of all the videos in the playlist...Thankyou so much sir
your voice is so sweet. I hear every words and understand everything. thank you! :)
Hiiii
Just need your notes bro 🥺. Amazing teaching !!!
You perfectly know how to explain 👌👍👍👍👍👍👍👍👍keep up the good work , explanation was great
Thank you Sir for this amazing playlist on CNS. Every concept is broken down into simpler chunks making it so easy to understand🙌. The way you explain is outstanding🤍 and the notes you provide for each topic are beautifully prepared and incredibly helpful🤍🥺 Your dedication to making the subject clear and accessible is truly❤. Keep up the great work❤🎉 .
Thanku sir once again❤❤
Really aap toh bhot acche se samjhate ho really ☺️😊 thanks for This video
Thanks sir ❤for this...❤❤i watched the full series..
Thanks a lot sir ❤❤❤❤❤❤❤
One of the best video on hash functions
❤️ UR VIDEOS ARE JUST INCREDIBLE THNX IT HELPED ME FOR MY MCQ XAMS👍
Thank you, your notes really helped me for preparation
Great explanation! Thank you so much! It helps a lot!
Great explanation! Thank you so much! It helps a lot
like ka aim rakhte hai 200 likes gets 140k views and 4.5k likes.. you deserve more though :D
Thanks a lot bhiya for your all hardwork and efforts..🎊🙏💐
Great help before exams :) whole hearted Thanks!!
Thank you sir ....... explained very well👏
I play your vids whenever my nephews and nieces come over and watch annoying tiktoks over and over and over......they met there match......
mason chips ohh sorry crisp maybe you should also start doing tiktok by this you will not do this shit talk here in comments ;
Watch it 2x you will hear munna bhaiya voice from Mirzapur believe me. btw great work.
You just saved my exam ❤️
bro need more videos on cryptography
love form nepal
Simple si cheej ko aur complex kar diya bhai tuney
thank u sir and happy teachers day
Really good explanation 🙌
thank you bhaiyaa.... have a great day
Thank you brother for this vedio from Nepal
16:20 Hamne apne attacker ko ek tarah se jhand kardiya😂😂
Rana Ahsaanullah
Very good
love your video all the way from london (
amazing teaching brother
very good sir i clear all concept of cryptography
very helpful
Thankyou
Today is my major exam and I am watching this now
Thanks sir 🙏❤
Very nice explanation bro👍👍....but yr ek tiger hash or gear hash pe video bnaa do plz..syllabus me mention hai kuk ke
How we find coefficient of Secure hash algorithm??? Or how we crack Secure hash algorithm????
These two questions. Please answer???
"attacker ka jhand kar diya" 😂😂
Nice one
Sir your video is very very helpful , can you please provide the handwritten notes that you explain in your video.
Thanks ❤️ well explained
Amazing explanation sir
U said key does not use in hash function at 1.11 but u explained with the help of key for encryption and decryption, how it is ??
Hash function me koi key nahi use hui h
Key is only used after hame apna hashcode mil gyaa h after passing the msg throught the hash function
And
Ya to ham key encryption algo me use karre h to encrypt our msg
I hope now samajh me agya hoga
✌️💯
You are so good but explanation is fast make it slightly slow
why did u use private key to encrypt the hash value ....as we should use public key to encrypt the msg or hash value ......plz explain
U can use both private key and public key for encryption ..
Waah kya soch hai re teri
16:21 hmne attacker ko jhand kr diya😂
Funniest part lol
Sir please make video on SHA 512 algorithms with its structure and rounds. Plz 🙏
Isnt method 3 at 9:30 same as digital signature?
Simple as that, thank you
Thank you my man!!
abhishek bhaiya, cant we use hash function tied to cipher text ? just like u explained for MAC ?
msg -> E with key (cipher text) -> H (h) -> append -> cipher text + h
ab cipher text ko decrypt with key and hash ko compare kar do
isme toh dono confidentiality + authentication mil rhe h
It's all theoretical how can we implement this practically ? Is there any numerical examples available?
Can you pls make a playlist for distributed systems? You teach amazing
I have 1 doubt. Authentication by the public key of A and Integrity by hash is the same or not, is it true?
What amazing 🙂🙂🙂🙂
you are doing great job man! Respect++
bro i neeed answer of this question:- hashing is useful tool in
(a)prevention of unauthorized file modification
(b)the development of secure cryptography algorithm
both
How can we use hash function to design a secure login to prevent eavesdropping?
Which books i can mention as refrece for this description??
Bro please video on DSS approach
Best explaining
you nailed it bro
Jai shree ram 🙏
Hey Abhi, Can u please share the pdf link of your notes?
+1
awesome sir
I wish if my course teacher saw this video
Can u explain the properties of hash function?
Nicee tysm ❤️😎
There's no reason to perform hashing or other integrity checks if you're already encrypting plaintext...
when blue color pen u use for making notes?
Its too good but hashing mein to key use nahi karte h na ?
Thank you..
These are the types of hash functions ??
Inme say kis method. Ko paper me likh kay au ..? Mera 8 jan ko. Paper hai please help
Superbb🤟🤟
Bro kerberos ki video nhi mil rhi..! Did you made any video on that?
Thank you so much sir
Sir aap ka explaination bahut badhiya he...sirf thodasa slow boliye taki achese samaj sake...i am watching it on 0.75x speed...dont get me wrong👍
Ok thanks for the constructive feedback 🙂
Bhai ek lucky jet game hai uska sha 512 algorithm use hota hai usko kaise follow kare jaise
thank you bro.. great work and teri notes ki pdf send karna link mai...
@abhishek bhai notes ki pdf link send krdo..
JAZAK ALLAH sir
Great explaination
Mene sha algorithm search kiya ha ye video nikli ha please koi guide krdy ye wahi ha ya nai?
Ab to 3 mahiny ho gy guide kru ya na kru😅
Thankuu so much sir 🥰
So comments in insta or TH-cam are also examples of 2nd method bcoz here we are achieving only authenticity but not confidentiality
why we need to write 5...6 methods for hash function? can we define two method in exam?
Bhaiya ap ek heap sort algorithm ke upar video bna dijiyena pls.. 13 ko exam hai mera
Thank you brother
In method 3 should not we use public key for encryption instead of private key?
No we are achieving the concept of digital signature here to get authentication.
So its completely fine!
Watch digital signature video if u want
goood. please tell book name and writter.
pls repky i m very confused what are types of hash function ?????
Hacker ko jhannd kr diya😂😂😂😂
Masta✌️
you said there is no concept of key in hash function to check data integrity but you will used key why so......
❤
Nice