Basics Of Digital Signature Explained in Hindi

แชร์
ฝัง
  • เผยแพร่เมื่อ 27 ส.ค. 2024
  • Myself Shridhar Mankar a Engineer l TH-camr l Educational Blogger l Educator l Podcaster.
    My Aim- To Make Engineering Students Life EASY.
    Website - 5minutesengine...
    5 Minutes Engineering English TH-cam Channel - / @5minutesengineeringen...
    Instagram - www.instagram....
    A small donation would mean the world to me and will help me to make AWESOME videos for you.
    • UPI ID : 5minutesengineering@apl
    Playlists :
    • 5 Minutes Engineering Podcast :
    • 5 Minutes Engineering ...
    • Aptitude :
    • Aptitude
    • Machine Learning :
    • Machine Learning
    • Computer Graphics :
    • Computer Graphics
    • C Language Tutorial for Beginners :
    • C Language Tutorial fo...
    • R Tutorial for Beginners :
    • R Tutorial for Beginners
    • Python Tutorial for Beginners :
    • Python Tutorial For Be...
    • Embedded and Real Time Operating Systems (ERTOS) :
    • Embedded and Real Time...
    • Shridhar Live Talks :
    • Shridhar Live Talks
    • Welcome to 5 Minutes Engineering :
    • Welcome To 5 Minutes E...
    • Human Computer Interaction (HCI) :
    • Human Computer Interac...
    • Computer Organization and Architecture :
    • Computer Organization ...
    • Deep Learning :
    • Deep Learning
    • Genetic Algorithm :
    • Genetic Algorithm
    • Cloud Computing :
    • Cloud Computing
    • Information and Cyber Security :
    • Information And Cyber ...
    • Soft Computing and Optimization Algorithms :
    • Soft Computing And Opt...
    • Compiler Design :
    • Compiler Design
    • Operating System :
    • Operating System
    • Hadoop :
    • Hadoop
    • CUDA :
    • CUDA
    • Discrete Mathematics :
    • Discrete Mathematics
    • Theory of Computation (TOC) :
    • Theory Of Computation ...
    • Data Analytics :
    • Data Analytics
    • Software Modeling and Design :
    • Software Modeling And ...
    • Internet Of Things (IOT) :
    • Internet Of Things (IOT)
    • Database Management Systems (DBMS) :
    • Database Management Sy...
    • Computer Network (CN) :
    • Computer Networks (CN)
    • Software Engineering and Project Management :
    • Software Engineering A...
    • Design and Analysis of Algorithm :
    • Design And Analysis Of...
    • Data Mining and Warehouse :
    • Data Mining and Warehouse
    • Mobile Communication :
    • Mobile Communication
    • High Performance Computing :
    • High Performance Compu...
    • Artificial Intelligence and Robotics :
    • Artificial intelligenc...

ความคิดเห็น • 586

  • @premprasad3851
    @premprasad3851 2 ปีที่แล้ว +150

    college teachers should learn from this man 😎 he makes the toughest topics easy in just 5-10,min ❤🤟

    • @muslim693
      @muslim693 ปีที่แล้ว +1

      15 marks question ⁉️❓ you have to go deep

    • @5claws115
      @5claws115 ปีที่แล้ว +3

      ​@@muslim693 khudse padho fir.....

    • @muslim693
      @muslim693 ปีที่แล้ว

      @@5claws115 ok

    • @NishantTaletiya
      @NishantTaletiya ปีที่แล้ว

      @@muslim693 hamare yaha 7 marks me he aanewala hai

  • @Therandom12310
    @Therandom12310 3 ปีที่แล้ว +48

    I wish all the teachers online are like you. I like how you repeat and stress on the small and prominent points 🙏🙏🙏

  • @telugutechvideos431
    @telugutechvideos431 4 ปีที่แล้ว +38

    I watched this video before 30 minutes of my exam it helpful. I even I got this question in exams I wrote very well 🤩

  • @tusharkumar9455
    @tusharkumar9455 4 หลายเดือนก่อน +19

    kal kiska kiska paper hai.. like me😎

    • @bhavnaparmar18
      @bhavnaparmar18 4 หลายเดือนก่อน +2

      Aaj h 💔😞

    • @anujbisht2505
      @anujbisht2505 2 หลายเดือนก่อน

      Mera to kal ha Bhai 😂

  • @shailendrasinghkhichi
    @shailendrasinghkhichi 4 ปีที่แล้ว +5

    all the doubts are cleared about digital signature . Hats off sir....

  • @AnandKumar-jd3ru
    @AnandKumar-jd3ru 2 ปีที่แล้ว +1

    Bahot gajjab samjhaya sir. Thanks

  • @SakshiSharma-sg4xq
    @SakshiSharma-sg4xq 2 ปีที่แล้ว +13

    U are last minute exam saver sir🙌... Salute ur explanation skills!! And Ur energy level is supb💯

    • @KartikeyaSingh001
      @KartikeyaSingh001 2 ปีที่แล้ว +2

      Sir concept hi galat hai khush mat ho

    • @SakshiSharma-sg4xq
      @SakshiSharma-sg4xq 2 ปีที่แล้ว

      @@KartikeyaSingh001 oh thanku to tell me and to avoid me from the wrong concept... Really 😂🙌

    • @prashanttiwari799
      @prashanttiwari799 2 ปีที่แล้ว

      Apke sir. Ki wajah se mera.. css ka paper barbaad hogya ..🥲🥲🥲🤦

  • @rath9096
    @rath9096 ปีที่แล้ว +1

    Too good video. The point is that the thumbnail is not professional so I hesitated before clicking but the content is too good. Very nice explanation.

  • @AnjaliKumari-xs7wg
    @AnjaliKumari-xs7wg ปีที่แล้ว +7

    Tq so much sir!!! I am a MBA student and for me IT subject is quite tough but u made that soo easy❤️

  • @mahisahay6046
    @mahisahay6046 ปีที่แล้ว +5

    Sir u make all the topics super easy to understand. Hat's off to you😊

  • @scorpio6140
    @scorpio6140 4 ปีที่แล้ว +16

    Excellent Explanation........Also in live situation I hope it can be done for Invoices, Form 16 or any other document which needs to be signed .....by any authority....or C-Level executive and can be done in BULK and also can be configured for any workstation.......AS IT IS DONE BY MANY SAP Digital signtature Products offered by many Software companies.

  • @rukhsaransari9590
    @rukhsaransari9590 5 ปีที่แล้ว +2

    Apki saari videos bht understandable hoti hai but plzz theory bhi diya kre jo exam m write kr paye point to point and thnk u soo much bht help mili mujhe apki saari videos s 😊

  • @bhardwajraja5560
    @bhardwajraja5560 ปีที่แล้ว +1

    Kya mast samjhaya hai bhaiya aapne....👌👌

  • @umeshyewale3659
    @umeshyewale3659 5 ปีที่แล้ว +34

    Sir plz...Make videos on DES and AES

  • @codewithown9835
    @codewithown9835 2 ปีที่แล้ว +1

    Sir really your explanation makes the topic very easy.

  • @aarishkhan8693
    @aarishkhan8693 5 ปีที่แล้ว +6

    Very gd explanation Sir. Today is my exam and concept is clear in just 3 mints. Thanks

  • @prashanttiwari799
    @prashanttiwari799 2 ปีที่แล้ว +1

    Wah sir wah kya pdhaya .. h.. aktu se gujarish krungga ki apko.. ache se pdha dia jaye...

  • @balasahebghogare2547
    @balasahebghogare2547 ปีที่แล้ว +1

    Your all videos are really helpful . Thank you so much sir🙏👍👍

  • @sonalgupta4527
    @sonalgupta4527 2 หลายเดือนก่อน

    I am working on it but could not understand how private key works, you explained it very well, thank you

  • @PravinKumar-dk5zn
    @PravinKumar-dk5zn 5 ปีที่แล้ว +12

    Very well explained. understood in a single watch

  • @saniyaansari997
    @saniyaansari997 ปีที่แล้ว +1

    Sir yr teaching style is amazing 😌...

  • @user-tk9zc8fc7e
    @user-tk9zc8fc7e 8 หลายเดือนก่อน +5

    Jay will encrypt the message using Veeru's public key and veer will decrypt the message using Veeru's own private key, other wise if Jay encrypt the message using Jay's own private key than, than that message can also be read by Gabbar(where Gabber is not intended receiver) as there is a chance of Gabber having the Jay's public key

    • @DK-hn9or
      @DK-hn9or 3 หลายเดือนก่อน +1

      No sir is right, because the purpose of digital signature is that the receiver should know from where the message is coming.
      for encryption, we will encrypt msg using receiver public key.
      In short,
      step 1 : first encrypt msg using receiver public key - confidentiality
      step 2 : encrypt again using sender private key - digital signature which gives authenticity

  • @prasadramkrishnapatil8749
    @prasadramkrishnapatil8749 2 ปีที่แล้ว +2

    Excellent explaination on youtuber ever

  • @manifestation5117
    @manifestation5117 ปีที่แล้ว +1

    Kya hi concept smzaya hai bhai, Yad ah gaye muze woh Mahabharat and Ramayan ki stories jaha se stories se athe hai learnings and lessons ❤️❤️❤️.

  • @user-yl4ik1hm9t
    @user-yl4ik1hm9t 2 หลายเดือนก่อน +1

    you are a amazing teacher...😇

  • @sunidhichaturvedi7884
    @sunidhichaturvedi7884 4 ปีที่แล้ว +2

    Excellent explanation n it's make easier to understand thanks u

  • @SDUT910
    @SDUT910 4 ปีที่แล้ว +1

    Apke Sare videos bahoot hi Accha hai .easy to understand hai.message digest aur digital certificate par video banado plzzz

  • @shrishti3904
    @shrishti3904 ปีที่แล้ว +1

    Sir today is my computer network exam and I'm very nervous but your videos are really blessing... ❤

  • @shwetaganage3680
    @shwetaganage3680 4 ปีที่แล้ว +3

    Sir your video helping me a lot.....you explain complex topic in very easiest way.....thank you sir

  • @nishantkumar3947
    @nishantkumar3947 4 ปีที่แล้ว +12

    Sir you are really very very great. I studied for my engineering exams night before and scored good marks. All credits goes to you sir. Thank you so much.

  • @spsenterprises9524
    @spsenterprises9524 5 ปีที่แล้ว +3

    lot of topics i have studies from your videos. very nice explanation

  • @manansehgal2484
    @manansehgal2484 4 ปีที่แล้ว +7

    I really Like Your Way of Explaining !!😊

  • @rahulsachdeva4867
    @rahulsachdeva4867 5 ปีที่แล้ว +9

    Superb energy level man💯 really helpful videos!

  • @user-ic5xz9iq2h
    @user-ic5xz9iq2h 3 หลายเดือนก่อน +2

    Bas kal hai exam aaj padh lu thodha se 😂😂😂

  • @itmanpaki2979
    @itmanpaki2979 4 ปีที่แล้ว +15

    Very nice explanation. Let me correct if I am wrong - If the objective is ' high confidentiality' means Jay's message can only be decrypted by veeru then Jay encrypt the message using veeru's public key and only veeru can decrypt the message by his private key.

    • @anuragkumarsingh1272
      @anuragkumarsingh1272 ปีที่แล้ว +1

      In this case veeru will not come to know from where the messages is actually is coming from means from any valid source or from attacker because here the verru will always be able to decrypt the message with own private key if the message is encrypted by his public key

    • @gaganvishwakarma6494
      @gaganvishwakarma6494 9 หลายเดือนก่อน +2

      But , if the message can be decrypt by jay's public key then anyone can decrypt it as Jay's public key is globally available , isn't ?

  • @ilmabinte_inayat7110
    @ilmabinte_inayat7110 2 ปีที่แล้ว

    Kl. Paper hai or phele baar dekha topic thanx God ap ki vdo dekh li

  • @sanjayphanshikar698
    @sanjayphanshikar698 4 ปีที่แล้ว +20

    The hashing part is missing from the contents.. the obvious question is what will receiver do by decrypting the signature using public key and how will the receiver understand if the contents are meaningful. It contains the hashing on the plain text i.e. message to be send to receiver which the receiver can verify by matching the hash at its end. Thanks

  • @ROHITSHARMA-xh9fx
    @ROHITSHARMA-xh9fx 7 หลายเดือนก่อน +65

    Ab Chlo exam dene 🥱😂😂

    • @Zaidi_227
      @Zaidi_227 2 หลายเดือนก่อน

      Pass hue?

    • @vintagegamingyt3544
      @vintagegamingyt3544 หลายเดือนก่อน

      😑chlo clg chle hum

    • @priyanshumaurya007
      @priyanshumaurya007 หลายเดือนก่อน

      ​@@vintagegamingyt3544 BCA 6th exams?

    • @abhinav3004
      @abhinav3004 หลายเดือนก่อน

      Vidyapeeth?

  • @kiranahluwalia9166
    @kiranahluwalia9166 4 ปีที่แล้ว +2

    Too gud sir... U make each concept easy 😊😊

  • @ramanmahapatra1514
    @ramanmahapatra1514 ปีที่แล้ว +4

    @5minutesEngineering Sender's public key is available with all the members who are connected to the network. In this case, Jay's public key is known to Veeru and Gabbar. If Jay encrypts the message with his privet key, then even Gabbar can intercept the message and decrypt it with Jay's Public key. Hence, this method isn't secured.
    In my opinion, the sender must encrypt the message with the public key of the receiver. As the privet key of the message is only available with the receiver, noone else can decrypt the message. Please confirm this suggestion.

    • @shubhampandey2597
      @shubhampandey2597 4 วันที่ผ่านมา

      It's only authentication not security

  • @gurududalkar7714
    @gurududalkar7714 11 หลายเดือนก่อน +1

    “Ya phir us gadar gabar ne beja hey message” Awsme, I appreciate your efforts, brother, to create such engaging content with witty instruction. You have a knack for making complex topics easy to understand and fun to learn. Your content is not only informative but also entertaining and enjoyable. Thank you for sharing your knowledge and skills with us.

  • @rohitkumar98153
    @rohitkumar98153 4 ปีที่แล้ว +2

    Maza aa giya brdr....High confidence level

  • @NaheedKanwal.
    @NaheedKanwal. ปีที่แล้ว

    It's very useful. Well done.
    Really appreciating, from Pakistan, MULTAN

  • @bhupendradashpant1082
    @bhupendradashpant1082 ปีที่แล้ว

    From Nepal so easy to understand salute

  • @smfarhan2754
    @smfarhan2754 4 ปีที่แล้ว +2

    GOod Job Dear! Impressive way of explanation

  • @Motivationdream923
    @Motivationdream923 2 หลายเดือนก่อน +1

    Aap bhot achaa pdate ho

  • @everydaysolution7112
    @everydaysolution7112 3 ปีที่แล้ว +3

    once you said that anybody can have public key of anybody then may be intruder have public key of jay he can also decrypt it.
    In one lecture you said that senders use public key of receiver to send msg and msg is decrypted by receiver private key . i am confuse now.plz help sir.

  • @neharastogi3744
    @neharastogi3744 หลายเดือนก่อน

    Sir bhut accha clear kiya aapne

  • @saqibakouser5018
    @saqibakouser5018 4 ปีที่แล้ว +1

    Aapke videos waqhai bade kammaal k hote hain ❤

  • @samikshasingh9067
    @samikshasingh9067 ปีที่แล้ว +1

    Aap bhut achaa padhate h..

  • @suchitamarkan2522
    @suchitamarkan2522 4 ปีที่แล้ว +1

    very simple and smooth way to explain the concept. Thanks

  • @HarshRathore-nw9ky
    @HarshRathore-nw9ky 2 หลายเดือนก่อน

    Really Well Explained Boss👍🏻❤️

  • @omkarkhaire1867
    @omkarkhaire1867 11 หลายเดือนก่อน

    College Teachers need to learn from this guy. How to teach!!!

  • @ayushisingh7780
    @ayushisingh7780 5 ปีที่แล้ว +4

    Thanks 😊 you explained very well

  • @abhishekgupta6005
    @abhishekgupta6005 ปีที่แล้ว

    Thankyou sir for starting with basics. It gives the clarity about what it is and how does it work. Which I didn't get on any other channel

  • @user-bp8fv7dd2b
    @user-bp8fv7dd2b 13 วันที่ผ่านมา

    wow nicely explained. Enjoyed learning by fun

  • @asazadpathan4296
    @asazadpathan4296 2 ปีที่แล้ว

    you are the best Teacher I have ever seen before. When I watched your video once all concepts are perfectly been cleaned. Thank you, sir

    • @raistar9843
      @raistar9843 2 ปีที่แล้ว

      gehu callage ho kya bhai

    • @asifaziz9308
      @asifaziz9308 ปีที่แล้ว

      varun sir gate smashers will be no 1 of all time...no one can replace him

    • @manan-543
      @manan-543 ปีที่แล้ว

      @@asifaziz9308 his cn and os series is legendary. but this guy is really good too.

  • @parthibbhattacharya1983
    @parthibbhattacharya1983 4 ปีที่แล้ว

    Aaag laga di !!! off kya teaching hai..hats off

  • @rachnangupta7406
    @rachnangupta7406 2 ปีที่แล้ว

    Wow 😲😍 bhot hi ache se explain kiya h apne sir.. Thnk u so much

  • @shashankgupta6700
    @shashankgupta6700 2 ปีที่แล้ว +2

    Jay uses his private key to encrypt the message and veeru uses the public key but public key is already known by everyone so anyone can capture that message and change the content by using the public key....Can you please explain????

  • @jaypatel-lyf
    @jaypatel-lyf ปีที่แล้ว

    Me modern time ka Hu sir…😂😂😂
    By d way u r doing great work sir… love yr channel… God bless u

  • @mansikadivar871
    @mansikadivar871 4 ปีที่แล้ว +1

    it's awesome way to explain..... nice explanation

  • @commercebaba21
    @commercebaba21 ปีที่แล้ว

    i am die heart fan of this channel

  • @abhineshtomar1308
    @abhineshtomar1308 8 หลายเดือนก่อน

    Sirr app bhut acha pdate ho pls one to one doubts bi clear krne ka kosis kra kro sir

  • @samanjain3149
    @samanjain3149 5 ปีที่แล้ว +1

    Bohot shaandaar bade bhai

  • @sheenamsingal9626
    @sheenamsingal9626 2 ปีที่แล้ว

    Acha smjhaya apne .. 😊😊5 min. Me smj agya..

  • @shoaibmalik6924
    @shoaibmalik6924 4 ปีที่แล้ว

    Your teaching speed very high....but you teach very well.......

  • @ujjwalkumar7866
    @ujjwalkumar7866 3 ปีที่แล้ว +1

    Sir, Your lacture is very helps in my engineering exams 👍

  • @sabashoukat5575
    @sabashoukat5575 4 ปีที่แล้ว +1

    Please make video on types of authentication including hash function

  • @ilhaamshaikh255
    @ilhaamshaikh255 4 ปีที่แล้ว

    Veeru ko msg Gabbar ne bheja ya jay ne??? Maza aa gaya sir...!! Bhot dukhi thi aaj, exam ka bhi tension tha, aapka video dekh ke hasne laga aur sikh bhi gaya... Thanksss a lot...

  • @rammelayil2110
    @rammelayil2110 4 ปีที่แล้ว +1

    Thanks. You explained very clearly.

  • @ReetuKaur-ry9kk
    @ReetuKaur-ry9kk 2 ปีที่แล้ว +1

    Sir uuuu are vry vry great ☺️☺️

  • @prashantsonawane6875
    @prashantsonawane6875 2 ปีที่แล้ว +2

    Good explanation sir, but I have doubt the public key of jay is also know to other people in the network so it might be possible using the of jay anyone can access this message in between the communication... So its break the confidentiality rule....it is not secure then

  • @tenabisht
    @tenabisht 4 ปีที่แล้ว +6

    After watching all videos on this topic, finally a best one.

  • @vivekvaishnav4386
    @vivekvaishnav4386 หลายเดือนก่อน +1

    THANK YOU SO MUCH SIR ......😊😊

  • @reetsempire5504
    @reetsempire5504 5 ปีที่แล้ว +3

    Thanks alot sir... Book me toh kalla akshr bhass brabaar lg rha tha

  • @jarryingnaut
    @jarryingnaut 4 ปีที่แล้ว +4

    you literally saved me man! Thanks a lot :)

  • @arththakur8247
    @arththakur8247 2 ปีที่แล้ว

    Masst teacher h yrr sir aap hats off!

  • @namitgupta352
    @namitgupta352 4 ปีที่แล้ว +1

    Happy Teacher's Day Sir. You are awesome.

  • @abhijitroy1958
    @abhijitroy1958 ปีที่แล้ว +5

    sir there is an issue as jay's public key is available to everyone so if jay send his msg in private key then there 3rd party could also be able to decrypt it using jay's public key. so i think it must be . jay will send his msg using viru's public key so when it reach to viru then viru will be able to decrypt it using viru's private key which is restricted to viru only

  • @flowyoga8048
    @flowyoga8048 4 ปีที่แล้ว +1

    Bhut khoob yeaah😍😍

  • @MemersRocks
    @MemersRocks 3 ปีที่แล้ว

    Bahut pyara samjhae bhai thank you

  • @niteshkavre4877
    @niteshkavre4877 ปีที่แล้ว

    Thank you so much. From the deepest part of my Kidney.

  • @Summer2monsoon
    @Summer2monsoon 6 หลายเดือนก่อน

    Thank you sir for the explanation 6:38

  • @mayankbalhara1183
    @mayankbalhara1183 2 ปีที่แล้ว

    Helped me in my ecommerce exam du sol , thanks buddy .....

  • @refatmishuk8501
    @refatmishuk8501 4 ปีที่แล้ว +3

    You ignored the hashing operation of the message. And also at the receiving end veeru will compare the two digest values to check the validity of the signature of Jay.

  • @growup3506
    @growup3506 4 ปีที่แล้ว

    Love u bhai ek no samjhaya hai ......👌

  • @adu_21
    @adu_21 3 ปีที่แล้ว +1

    Cryptographic Hash Functions: (3)
    Applications of Cryptographic Hash Functions, Two Simple Hash Functions,
    Requirements and Security, Hash Functions Based on Cipher Block Chaining,
    Secure Hash Algorithm (SHA)
    Message Authentication Codes: (3)
    Message Authentication Requirements, Message Authentication
    Functions, Requirements for MAC and Security of MACs, MACs Based on Hash Functions: MAC, MACs Based on Block Ciphers: DAA and CMAC
    Bhai ye upar wale points pe bhi video banao na

  • @AnjaliKumari-xs7wg
    @AnjaliKumari-xs7wg ปีที่แล้ว

    Love and respect from Hyderabad 🥰

  • @pankajmore6692
    @pankajmore6692 4 ปีที่แล้ว

    Very nice
    Very simple language for understanding the DS concept

  • @mahendrajhariya4114
    @mahendrajhariya4114 ปีที่แล้ว

    Bahut badhiya bhai ❤

  • @thelaxmn
    @thelaxmn 7 หลายเดือนก่อน

    Exam mey bhii jay and veeru ka example deke aagaya sir impress hojayenge 🙂👍🏼

  • @sarweshgiri6768
    @sarweshgiri6768 ปีที่แล้ว +1

    Sir in this case the private key of jay is used while sending the message so on the other hand anyone can access the message sent by jay using his public key this can lead to confidentiality breach. Can we use th public key of veeru on jay side to encrypt the message and sent it to veeru only so that he can decrypt the message by using his private key ?

  • @AshokElectronicsVideoMAX
    @AshokElectronicsVideoMAX 3 ปีที่แล้ว

    Very good explaination Sirji

  • @bollywoodluvv4740
    @bollywoodluvv4740 2 ปีที่แล้ว

    very good explanation sir
    😀😀

  • @freethinkers3680
    @freethinkers3680 4 ปีที่แล้ว

    please make video on key exchange protocols

  • @rishi680
    @rishi680 4 ปีที่แล้ว

    Aa gya bhai bahut acche se,

  • @anishchar4282
    @anishchar4282 ปีที่แล้ว

    Just one word for this vdo is awesome 👌

  • @mncsrecruitment
    @mncsrecruitment 4 ปีที่แล้ว +7

    Sir if jay send msg by its private key then ...his msg anybody can open using thier public key ,so encryption is not follow, if encryption is done only when jay send msg using by veeru public key nd Veeru received msg by its own private key .

    • @FaisalMalik-mw7kd
      @FaisalMalik-mw7kd 3 ปีที่แล้ว

      Yes you are right...

    • @shoaibhassan329
      @shoaibhassan329 3 ปีที่แล้ว

      Yes topic clear nh h yahan per bcz reciever ko pata nh lagega k msg such m jay ka h k nh... Ager hash function lagen tab pata lagega... And ager Asymmetric kry cryptography use kren tu its Become Confedential then koi b hack nh kr paega. Kr b liya tu change nh kr paega na hi decrypt.

    • @harshitpal5558
      @harshitpal5558 2 ปีที่แล้ว

      If Jay sends msg using veeru public key then in that case confidentiality is break cuz anyone else like basanti can also send msg to veeru using his public key that's why we use the combination of both public and private key
      Step1 Jay encrypt the message using his private key so that recever gets confirmation about authentic sender
      Step2 now Jay will encrypt the msg with veeru public key so that no one else may able to open that msg
      ..
      ..
      And then he send now we achieved both integrity and confidentiality of aur data which we send

  • @AshviniRathodPawar
    @AshviniRathodPawar 5 ปีที่แล้ว +2

    Hello sir cloud computing ke video upload karo
    2 months ago apane msg dala tha.....