Lec-83: Asymmetric key Cryptography with example | Network Security

แชร์
ฝัง
  • เผยแพร่เมื่อ 29 ก.ย. 2024
  • 👉Subscribe to our new channel: / @varunainashots
    Explanation of Asymmetric key Cryptography with example is given in this video.
    Asymmetric cryptography, is a cryptographic system that uses pairs of keys. Each pair consists of a public key (which may be known to others) and a private key (which may not be known by anyone except the owner). It is Important for UGC NET and GATE.
    ►Computer Networks (Complete Playlist):
    • Computer Networks (Com...
    Other subject-wise playlist Links:
    --------------------------------------------------------------------------------------------------------------------------------------
    ►Design and Analysis of algorithms (DAA):
    • Design and Analysis of...
    ►Database Management System:
    • DBMS (Database Managem...
    ► Theory of Computation
    • TOC(Theory of Computat...
    ►Artificial Intelligence:
    • Artificial Intelligenc...
    ►Computer Architecture:
    • Computer Organization ...
    ►Operating System:
    • Operating System (Comp...
    ►Structured Query Language (SQL):
    • Structured Query Langu...
    ►Discrete Mathematics:
    • Discrete Mathematics
    ►Compiler Design:
    • Compiler Design (Compl...
    ►Number System:
    • Number system
    ►Cloud Computing & BIG Data:
    • Cloud Computing & BIG ...
    ►Software Engineering:
    • Software Engineering
    ►Data Structure:
    • Data Structure
    ►Graph Theory:
    • Graph Theory
    ►Programming in C:
    • C Programming
    ►Digital Logic:
    • Digital Logic (Complet...
    ---------------------------------------------------------------------------------------------------------------------------------------
    Our social media Links:
    ► Subscribe to us on TH-cam: / gatesmashers
    ► Like our page on Facebook: / gatesmashers
    ► Follow us on Instagram: / gate.smashers
    ► Follow us on Instagram: / varunainashots
    ► Follow us on Telegram: t.me/gatesmash...
    ► Follow us on Threads: www.threads.ne...
    --------------------------------------------------------------------------------------------------------------------------------------
    ►For Any Query, Suggestion or notes contribution:
    Email us at: gatesmashers2018@gmail.com
    #Asymmetrickey #cryptographylectures #GATE #UGCNET #PSU

ความคิดเห็น • 329

  • @diyapatel2358
    @diyapatel2358 4 ปีที่แล้ว +141

    My college teacher was teaching us this for 2-3 days and I couldn't understand it but after watching your 8 min video I actually understood it. So thank u so much!

    • @khushipitroda385
      @khushipitroda385 4 ปีที่แล้ว +5

      The same thing happened with me Thanks to this channel I understood it.

    • @diyapatel2358
      @diyapatel2358 4 ปีที่แล้ว +2

      @@khushipitroda385 yesssss he is da best🤩

    • @harshsaini88516
      @harshsaini88516 2 ปีที่แล้ว

      @@khushipitroda385 👍

    • @parthsarthisingh4549
      @parthsarthisingh4549 2 ปีที่แล้ว +3

      itni si concept bhi nai samajh paye? laanat hai

    • @AnkiitOp
      @AnkiitOp ปีที่แล้ว

      @@parthsarthisingh4549 😅

  • @mohanayare
    @mohanayare 2 ปีที่แล้ว +2

    I learned this in my engineering in 2010. I understood this today on 2022. Thanks 👍🏻

  • @syed1559
    @syed1559 4 ปีที่แล้ว

    I have to say. Simple yet excellent explanation of a complex topic.

  • @lokeshreddysura6836
    @lokeshreddysura6836 4 ปีที่แล้ว

    I have been trying to understand this since months but u nailed it. Try giving example how private and public keys encrypt and decrypt the data. Like 6 is data encrypted with private key 2 so 8 and encrypted with public key 5 so data is 13 and now decrpt process

  • @mindfresh7637
    @mindfresh7637 2 หลายเดือนก่อน

    wow

  • @tarunasolanki8321
    @tarunasolanki8321 2 ปีที่แล้ว

    Sir, please make a video for digital signature.

  • @PradeepKumarIIITD
    @PradeepKumarIIITD 5 ปีที่แล้ว +55

    you are a born teacher....Perfect explanation....heart to heart :)

  • @kg-swaggie2217
    @kg-swaggie2217 9 หลายเดือนก่อน +2

    Sir but attackers can also attack on B's public key na?

  • @48_subhambanerjee22
    @48_subhambanerjee22 4 หลายเดือนก่อน +3

    🙂‍↔️🙂‍↔️🙂‍↔️🙂‍↔️🙂‍↔️.. classic.. this guy needs award

  • @rakeshranjan9301
    @rakeshranjan9301 4 ปีที่แล้ว +34

    This is awesome. I've been confused about this concept for years and you made it crystal clear in minutes. Thank you so much. More power to Gate Smashers

  • @sanaraja4479
    @sanaraja4479 3 ปีที่แล้ว +21

    Allah apko khush rkhy ❤

  • @abhijeetpatil5900
    @abhijeetpatil5900 3 ปีที่แล้ว +13

    Extraordinary teaching skills teacher. Thank you

  • @shiveshwarsingh1454
    @shiveshwarsingh1454 5 ปีที่แล้ว +10

    Best...... Explanation of cryptography, encryption........ 👍

  • @Shivam_Rajput2811
    @Shivam_Rajput2811 ปีที่แล้ว +3

    Sir you are great ❤️aap jaise teacher college me kyu nahi milte👍🏻

  • @sahilsharma7013
    @sahilsharma7013 5 ปีที่แล้ว +12

    For the first time i got this topic clearly, waiting for more stunning videos

  • @trishna1051
    @trishna1051 4 ปีที่แล้ว +15

    Great job sir... I understand very clearly..best teaching for everyone.. Sir ur voice is awesome 😁

  • @leezaroy7530
    @leezaroy7530 4 ปีที่แล้ว +1

    Sir aise to B ki public key bhi sbke pass hogi... How does it authenticates the identity of sender?
    And how this can be used in filing of returns using digital signature?

  • @shubhamgopal943
    @shubhamgopal943 4 ปีที่แล้ว +4

    Good evening Sir
    I am watching from Denmark and want to thank you a lot!
    I just have one question. Under the figure B, where there is written public key B and private key A... should that have been a B instead? So it was public key B and private key B? :D

    • @ajaykumarprasad8849
      @ajaykumarprasad8849 3 ปีที่แล้ว +1

      Yeah, you figured it well.
      That is indeed the private key _B_ .

    • @shubhamgopal943
      @shubhamgopal943 3 ปีที่แล้ว +2

      @@ajaykumarprasad8849 Thank you for the clarification :) Have pleasant day

  • @rajdeeppatil3623
    @rajdeeppatil3623 ปีที่แล้ว +1

    Love you man... Diploma ho ya Degree, ap jarur yad mein ate ho aur ate rahoge sir....

  • @hdlohar
    @hdlohar 3 ปีที่แล้ว +1

    Sir agar A ne B ki public key used karke B ko massage send kiya to another public B key used kr ke dekh sakhte hai na?

  • @sushmahegde6479
    @sushmahegde6479 4 ปีที่แล้ว +3

    Awesome sir

  • @swagatikadash481
    @swagatikadash481 3 ปีที่แล้ว +2

    Nice explanation, great teaching I can understand very well,thank you so much 🙏

  • @TroubleHelpers
    @TroubleHelpers 5 ปีที่แล้ว +1

    One man army to teach all the subject of CSE on TH-cam

  • @dishaachatterjee4270
    @dishaachatterjee4270 ปีที่แล้ว +1

    in what form do these keys come? password?

  • @RohitSharma-rj8si
    @RohitSharma-rj8si 4 ปีที่แล้ว +3

    A very fine approach to make us understand the concept ...Great work done . Thanks !!!....keep it up.

  • @sonalgandhi2154
    @sonalgandhi2154 5 ปีที่แล้ว +2

    very well presented !!please upload some videos on big data and cloud and iot and linux for nta net

  • @RoohiM.Abdullah
    @RoohiM.Abdullah ปีที่แล้ว +2

    Best teacher award goes to u sir ....thanks

  • @shreyasrivastava7712
    @shreyasrivastava7712 5 ปีที่แล้ว +3

    Thanku sir

  • @cybersecurito
    @cybersecurito ปีที่แล้ว +1

    Absolutely best explanation! I wish more videos were uploaded for cryptography. I'm having end sem examination starting next week

  • @CTVSPAIK
    @CTVSPAIK 4 ปีที่แล้ว +3

    Beautiful demonstration. Thank you for your effort

  • @rishablachuriye7320
    @rishablachuriye7320 3 ปีที่แล้ว +1

    I have watched n number of videos to understand this concept , but failed to do so . He made it very simple to understand it . Remember one thing brother the money you are earning from this platform doesn't matter but the blessings you are getting truly matters. Thank you

  • @bugvikas
    @bugvikas ปีที่แล้ว +1

    I am a working professional in IT company and watching this video to explain my manager about the cryptography concept in technical term. Perfect explanation 👍

  • @AnkitPandey_vlogs
    @AnkitPandey_vlogs 7 หลายเดือนก่อน +1

    Yes you are born to teach us. If You teach any topic in this world we get it. God Bless u alot. No one is even close to u.

  • @MeraAllah3124
    @MeraAllah3124 5 ปีที่แล้ว +2

    Superb explanation... 👌

  • @newsflash6949
    @newsflash6949 3 ปีที่แล้ว +4

    i'm a student from sri lanka... i got this point clearly only from you. even it in hindi. thanks a lot. if u can please activate English subtitles...

  • @munmunsaha7009
    @munmunsaha7009 5 ปีที่แล้ว +1

    Sir is all your networking tutorial enough for UGC net or I have to refer other lectures also????

  • @sourav6671
    @sourav6671 5 ปีที่แล้ว +7

    sir your voice is very similar to raftaar's voice...anyone agree???

  • @yehumang8361
    @yehumang8361 5 ปีที่แล้ว +1

    Superbb . Sir plz mcqs b krwa do es topic per

  • @kolcha
    @kolcha ปีที่แล้ว

    why you put the 300K in the thumb? who cares. I just rejected watching, paused your video and typed this message. if it was 500M or 1B (billion) then it would matter. ukh

  • @virender580
    @virender580 5 ปีที่แล้ว +1

    sir your teaching is excellent. please make videos on data structure and toc. before this ugc net exam.

  • @suchitragiri4546
    @suchitragiri4546 5 ปีที่แล้ว +1

    Thank you so much sir....
    Nice video👍👍👍
    Its really nice👌

  • @renusah4034
    @renusah4034 6 หลายเดือนก่อน

    Hello sir ,
    In this case ,
    A can also share his public key with B
    Then encrpt the msg with his private key
    B will decrpt it through A's public key
    Is it possible ?????

  • @sameerahmadbellary62
    @sameerahmadbellary62 ปีที่แล้ว

    Sir, I have a doubt.
    According to you, if a message can be encrypted or decrypted using a nodes public key or private key. And the nodes can broadcast their public key to other nodes.
    Then any intermediate node that has the public key can decrypt the message making the communication non-confident again.
    Can you please explain?

  • @gauravadhikari6541
    @gauravadhikari6541 2 ปีที่แล้ว

    As shown on your white board; Receiver B has Pub B key and Priv A key(instead of Priv B key);
    Is it mistake on board or i am mistaken pls clarify.

  • @__aadesh_
    @__aadesh_ 3 ปีที่แล้ว +1

    Thanku sir 🥺😊

  • @maikonhu706
    @maikonhu706 2 ปีที่แล้ว

    Bro where is full playlist of this course plz tell....
    I m seeing that lec80, 81 , that's why

  • @monishanazare1269
    @monishanazare1269 4 ปีที่แล้ว

    For Notes on Encryption check out
    monishanazare.wixsite.com/lastminutenotes/post/symmetric-asymmetric-encryption

  • @somyarathee
    @somyarathee ปีที่แล้ว

    Thank you for video Sir Ji, please next time step a little bit away from board so we can take screenshot !! Thanks😊🙏🏽

  • @muhammadsalif8488
    @muhammadsalif8488 3 ปีที่แล้ว +2

    Perfection at its best 💖

  • @asadumaryousafzai6361
    @asadumaryousafzai6361 ปีที่แล้ว

    @gate smashers sir whats is best option in research cryptography or network secuirity...???

  • @gauravkhatri3360
    @gauravkhatri3360 4 ปีที่แล้ว

    Superb👌👌
    Bilkul clear hogaya

  • @MaxxtyG
    @MaxxtyG 2 ปีที่แล้ว

    dude public key is only for locking and private only for unlock
    you are teaching wrong

  • @AshishKumar-vh2ds
    @AshishKumar-vh2ds 2 ปีที่แล้ว

    i don't understand one thing
    agar sender message B ki key se encrypt krega then it means ki beech mai koi bhi B ki public key le skta toh fir why can't intruder decrypt the code back into simple by using B ki public key jab incryption public key se kiya toh decrypt bhi toh kr skte
    ?

  • @vikasparashar1561
    @vikasparashar1561 5 ปีที่แล้ว +1

    As you said encrypted by public key can also be decrypted by public key.... Then if we send public key encrypted message it can be decrypted by anyone... Because multiple people can have the receiver's public key.....

    • @GateSmashers
      @GateSmashers  5 ปีที่แล้ว +2

      no i said a message encrypted by public key can be encrypted by private key not public.

    • @vikasparashar1561
      @vikasparashar1561 5 ปีที่แล้ว

      @@GateSmashers you mean* decrypted

  • @pramodkumarw
    @pramodkumarw ปีที่แล้ว

    Thanks sir ji,simple and plain explanation helps me a lot.i think you need to update your channel name it is not gate smashers but put only the Only Smasher because it is not only of gate Aspirants

  • @sufyanaslam7621
    @sufyanaslam7621 2 ปีที่แล้ว

    Can we Decrypt from Public key of reciever if we encrypt from public key of reciever ?

  • @wildtibet
    @wildtibet 5 ปีที่แล้ว +1

    Thanks a lot ....you really made me clear about the topic

  • @muhammadabdullahqureshi5354
    @muhammadabdullahqureshi5354 11 วันที่ผ่านมา

    3rd case non repudiation ke liye use hta h not invalid because the sender can't deny sending the message because it is being decrypted by senders public key

  • @DrSandeepJPatil
    @DrSandeepJPatil 4 ปีที่แล้ว

    Sir please make video on twofish key cryptography.

  • @sanidhyajain1828
    @sanidhyajain1828 ปีที่แล้ว +1

    thank you !

  • @deva4078
    @deva4078 ปีที่แล้ว +1

    Love you sir

  • @laibakhan6415
    @laibakhan6415 2 ปีที่แล้ว

    Superb sir 👏👏👏 kal papr hai or aaj hi ye concept clear howa hai thankyou so much

  • @zafdell8170
    @zafdell8170 4 ปีที่แล้ว

    Sir ye koi batata hi nhi h
    Aaj tak mai isi me confuse tha ki encrypt ho kaise rha h massage🙏🙏🙏🙏🙏🙏🙏🙏

  • @shaikfarhath431
    @shaikfarhath431 3 ปีที่แล้ว

    May Allah bless you sirrr👍ek dam clear explanation, sir Mera ek doubt he ke jab a ka private key b ku Pata he Matlab vo private nahi hoga na, Matlab a jab public key of b use karke encryption kare aur b aake b ka private key use kare aur decrypt Hota he na, pls bole

  • @HariomSaini-mw1oz
    @HariomSaini-mw1oz 6 หลายเดือนก่อน

    Bhai tum na hote to Eng. ho hi na pati kisi ki ................ 😂😂😂😂😂😂

  • @YasirKhan-zu9vo
    @YasirKhan-zu9vo 5 ปีที่แล้ว +1

    for sending messages either B "will know the receiver public key are not?

    • @GateSmashers
      @GateSmashers  5 ปีที่แล้ว

      Everyone knows the public key of others

  • @win-zb6fd
    @win-zb6fd ปีที่แล้ว

    0:51 caption will make two kisses one public and one private🤣🤣

  • @pvhtechno4497
    @pvhtechno4497 5 ปีที่แล้ว +1

    Watch full add without skipping to thank u

  • @harshalohana4958
    @harshalohana4958 2 ปีที่แล้ว

    My sir says asymatric key is faster than symatric I can't understand how...?

  • @harshalohana4958
    @harshalohana4958 2 ปีที่แล้ว

    Encryption key hoti hai vo always decryption key ki reverse hi hogi na to public key ki oposite private hogi. To agar public key sab ko pata hoga to uska reverse karke attack kr sakta hai n. ?

  • @prakritigupta5640
    @prakritigupta5640 3 ปีที่แล้ว

    Jo kaam mere sir 6 months Mei nhi krr paye wo aapne 8 min Mei krr Diya.... You are genius sirr😊😊

  • @bhuwanpandey7916
    @bhuwanpandey7916 2 ปีที่แล้ว

    A ki public key sabke pass ho sakte hai to kya B ki public key sabke pass nahi jo sakta?? How case four is justified.

  • @SanketSharmasanket7317
    @SanketSharmasanket7317 หลายเดือนก่อน +1

    ok

  • @ajeetsinghmiyan
    @ajeetsinghmiyan 3 ปีที่แล้ว

    Sir jee hamesha asymmetrical wale me doubt tha ....ab clear ho gya

  • @sanaraja4479
    @sanaraja4479 3 ปีที่แล้ว

    sir ap pakistan mai aa jao yaha fazul bkwass useless teachrs hen ...💔

  • @mastikiipatsala5673
    @mastikiipatsala5673 2 ปีที่แล้ว

    Sir, please upload a video on polyalpabetic cryptography

  • @sanaraja4479
    @sanaraja4479 3 ปีที่แล้ว

    thnku so much sir g ...love from pakistan ❤❤❤❤

  • @rima5210
    @rima5210 5 ปีที่แล้ว +1

    thnk u sir...superb explanation!

  • @moniminx_shorts
    @moniminx_shorts 3 ปีที่แล้ว

    Sir how public and private key are generated by each one on network

  • @samoomalik3647
    @samoomalik3647 3 ปีที่แล้ว

    Sir plz one more leacture b upload for us I need name security artitecture

  • @shivakumarv6028
    @shivakumarv6028 2 ปีที่แล้ว

    Sir....private key is meant for decryption....only ....

  • @UPSCTHINKER
    @UPSCTHINKER ปีที่แล้ว

    Sir kya public key se athuntac person khol nahi sakta

  • @huzaifajaliawala1904
    @huzaifajaliawala1904 3 ปีที่แล้ว

    Make more tutorials on information/network security.

  • @badal8435
    @badal8435 3 ปีที่แล้ว +1

    Bestt, best teacher , thank you sir

  • @Shivamsharma-tv2km
    @Shivamsharma-tv2km 3 ปีที่แล้ว

    Sir but B ki public key to koyi bhi leh skta h koyi b message decrypt kr lega?

  • @soniakajla5508
    @soniakajla5508 6 หลายเดือนก่อน

    Sir Real life m symmetric key aur asymmetric key kha use krte hain

  • @poojarathore5373
    @poojarathore5373 5 ปีที่แล้ว +1

    Sir or video banaye network par

  • @rahatshaikh3379
    @rahatshaikh3379 2 ปีที่แล้ว

    Thank you sir... For your info... It helps me lot

  • @gamereplayhq
    @gamereplayhq 5 ปีที่แล้ว +1

    570th like (Y) :D
    0 dislike so far

  • @shailendramaheshwari4418
    @shailendramaheshwari4418 3 ปีที่แล้ว

    so nice, please create video on PKI infrastructure

  • @jyoti.insight
    @jyoti.insight 2 ปีที่แล้ว

    bhut bhut bhut psnd aayi tino chij kr diyaaa sir thankuuu😀

  • @shubhamdas6519
    @shubhamdas6519 2 ปีที่แล้ว

    Thank you so much sir...you saved me again...

  • @nilanjandutta_
    @nilanjandutta_ 3 ปีที่แล้ว +1

    wow just great explanantion

  • @nabanitadutta6200
    @nabanitadutta6200 4 ปีที่แล้ว

    Kal viva hai aur aaj apka yeh video is like vaccine of corona🍁.

  • @tanvirraju2863
    @tanvirraju2863 ปีที่แล้ว

    Thanks a lot sir very beneficial videos

  • @PriyanshuSingh-kg5fl
    @PriyanshuSingh-kg5fl 4 ปีที่แล้ว +1

    way u explain is brilliant.. i always come to this channel to watch to topics which i found tricky..but he makes them seem so simple and relevaant. Thank u sir.

    • @PriyanshuSingh-kg5fl
      @PriyanshuSingh-kg5fl 4 ปีที่แล้ว

      I would recommend you to make your full online course for gate cs .. It would be brilliant... The way you make us understand difficult topics so easily is wonderful. It is a joy learning from you.

    • @GateSmashers
      @GateSmashers  4 ปีที่แล้ว

      Thank you priyanshu Singh for your valuable suggestion and appreciation...

  • @pvhtechno4497
    @pvhtechno4497 5 ปีที่แล้ว +1

    Explains like nothing is hard

  • @parthsarathi6948
    @parthsarathi6948 3 ปีที่แล้ว +1

    Great teaching sir , respect 👍👍

  • @rekhamachra8464
    @rekhamachra8464 3 ปีที่แล้ว +1

    Brilliant way of teaching

  • @aDenstech
    @aDenstech หลายเดือนก่อน

    Thank you and Stay blessed Sir