I was just thinking about whether to search about digital signature or not, suddenly I got this recommendation. This not only clears digital signatures but also give idea about the public and private key. Thank you, Sir, for explaining it in clear way!
Apki saari videos bht understandable hoti hai but plzz theory bhi diya kre jo exam m write kr paye point to point and thnk u soo much bht help mili mujhe apki saari videos s 😊
Sir you are really very very great. I studied for my engineering exams night before and scored good marks. All credits goes to you sir. Thank you so much.
Excellent Explanation........Also in live situation I hope it can be done for Invoices, Form 16 or any other document which needs to be signed .....by any authority....or C-Level executive and can be done in BULK and also can be configured for any workstation.......AS IT IS DONE BY MANY SAP Digital signtature Products offered by many Software companies.
“Ya phir us gadar gabar ne beja hey message” Awsme, I appreciate your efforts, brother, to create such engaging content with witty instruction. You have a knack for making complex topics easy to understand and fun to learn. Your content is not only informative but also entertaining and enjoyable. Thank you for sharing your knowledge and skills with us.
Very nice explanation. Let me correct if I am wrong - If the objective is ' high confidentiality' means Jay's message can only be decrypted by veeru then Jay encrypt the message using veeru's public key and only veeru can decrypt the message by his private key.
In this case veeru will not come to know from where the messages is actually is coming from means from any valid source or from attacker because here the verru will always be able to decrypt the message with own private key if the message is encrypted by his public key
Veeru ko msg Gabbar ne bheja ya jay ne??? Maza aa gaya sir...!! Bhot dukhi thi aaj, exam ka bhi tension tha, aapka video dekh ke hasne laga aur sikh bhi gaya... Thanksss a lot...
@5minutesEngineering Sender's public key is available with all the members who are connected to the network. In this case, Jay's public key is known to Veeru and Gabbar. If Jay encrypts the message with his privet key, then even Gabbar can intercept the message and decrypt it with Jay's Public key. Hence, this method isn't secured. In my opinion, the sender must encrypt the message with the public key of the receiver. As the privet key of the message is only available with the receiver, noone else can decrypt the message. Please confirm this suggestion.
The hashing part is missing from the contents.. the obvious question is what will receiver do by decrypting the signature using public key and how will the receiver understand if the contents are meaningful. It contains the hashing on the plain text i.e. message to be send to receiver which the receiver can verify by matching the hash at its end. Thanks
Cryptographic Hash Functions: (3) Applications of Cryptographic Hash Functions, Two Simple Hash Functions, Requirements and Security, Hash Functions Based on Cipher Block Chaining, Secure Hash Algorithm (SHA) Message Authentication Codes: (3) Message Authentication Requirements, Message Authentication Functions, Requirements for MAC and Security of MACs, MACs Based on Hash Functions: MAC, MACs Based on Block Ciphers: DAA and CMAC Bhai ye upar wale points pe bhi video banao na
college teachers should learn from this man 😎 he makes the toughest topics easy in just 5-10,min ❤🤟
15 marks question ⁉️❓ you have to go deep
@@muslim693 khudse padho fir.....
@@5claws115 ok
@@muslim693 hamare yaha 7 marks me he aanewala hai
I was just thinking about whether to search about digital signature or not, suddenly I got this recommendation.
This not only clears digital signatures but also give idea about the public and private key.
Thank you, Sir, for explaining it in clear way!
I wish all the teachers online are like you. I like how you repeat and stress on the small and prominent points 🙏🙏🙏
all the doubts are cleared about digital signature . Hats off sir....
I watched this video before 30 minutes of my exam it helpful. I even I got this question in exams I wrote very well 🤩
Too good video. The point is that the thumbnail is not professional so I hesitated before clicking but the content is too good. Very nice explanation.
Tq so much sir!!! I am a MBA student and for me IT subject is quite tough but u made that soo easy❤️
Ab Chlo exam dene 🥱😂😂
Pass hue?
😑chlo clg chle hum
@@vintagegamingyt3544 BCA 6th exams?
Vidyapeeth?
True
Apki saari videos bht understandable hoti hai but plzz theory bhi diya kre jo exam m write kr paye point to point and thnk u soo much bht help mili mujhe apki saari videos s 😊
Very gd explanation Sir. Today is my exam and concept is clear in just 3 mints. Thanks
Sir you are really very very great. I studied for my engineering exams night before and scored good marks. All credits goes to you sir. Thank you so much.
Sir today is my computer network exam and I'm very nervous but your videos are really blessing... ❤
Sir yr teaching style is amazing 😌...
Excellent Explanation........Also in live situation I hope it can be done for Invoices, Form 16 or any other document which needs to be signed .....by any authority....or C-Level executive and can be done in BULK and also can be configured for any workstation.......AS IT IS DONE BY MANY SAP Digital signtature Products offered by many Software companies.
Excellent explaination on youtuber ever
Kya hi concept smzaya hai bhai, Yad ah gaye muze woh Mahabharat and Ramayan ki stories jaha se stories se athe hai learnings and lessons ❤️❤️❤️.
Kl. Paper hai or phele baar dekha topic thanx God ap ki vdo dekh li
Very well explained. understood in a single watch
Aaag laga di !!! off kya teaching hai..hats off
It's very useful. Well done.
Really appreciating, from Pakistan, MULTAN
U are last minute exam saver sir🙌... Salute ur explanation skills!! And Ur energy level is supb💯
Sir concept hi galat hai khush mat ho
@@KartikeyaSingh001 oh thanku to tell me and to avoid me from the wrong concept... Really 😂🙌
Apke sir. Ki wajah se mera.. css ka paper barbaad hogya ..🥲🥲🥲🤦
Bahot gajjab samjhaya sir. Thanks
Aapke videos waqhai bade kammaal k hote hain ❤
“Ya phir us gadar gabar ne beja hey message” Awsme, I appreciate your efforts, brother, to create such engaging content with witty instruction. You have a knack for making complex topics easy to understand and fun to learn. Your content is not only informative but also entertaining and enjoyable. Thank you for sharing your knowledge and skills with us.
Maza aa giya brdr....High confidence level
College Teachers need to learn from this guy. How to teach!!!
Wah sir wah kya pdhaya .. h.. aktu se gujarish krungga ki apko.. ache se pdha dia jaye...
Apke Sare videos bahoot hi Accha hai .easy to understand hai.message digest aur digital certificate par video banado plzzz
Sir u make all the topics super easy to understand. Hat's off to you😊
Sure
Love and respect from Hyderabad 🥰
lot of topics i have studies from your videos. very nice explanation
Kya mast samjhaya hai bhaiya aapne....👌👌
Sir your video helping me a lot.....you explain complex topic in very easiest way.....thank you sir
Aap bhut achaa padhate h..
THANK YOU SO MUCH SIR ......😊😊
Bohot shaandaar bade bhai
Your teaching speed very high....but you teach very well.......
you are a amazing teacher...😇
GOod Job Dear! Impressive way of explanation
Sir really your explanation makes the topic very easy.
Exam hall me dekhna maza kuch aur hai tq sir
I really Like Your Way of Explaining !!😊
Me modern time ka Hu sir…😂😂😂
By d way u r doing great work sir… love yr channel… God bless u
Helped me in my ecommerce exam du sol , thanks buddy .....
i am die heart fan of this channel
Aap bhot achaa pdate ho
Acha smjhaya apne .. 😊😊5 min. Me smj agya..
From Nepal so easy to understand salute
Very nice explanation. Let me correct if I am wrong - If the objective is ' high confidentiality' means Jay's message can only be decrypted by veeru then Jay encrypt the message using veeru's public key and only veeru can decrypt the message by his private key.
In this case veeru will not come to know from where the messages is actually is coming from means from any valid source or from attacker because here the verru will always be able to decrypt the message with own private key if the message is encrypted by his public key
But , if the message can be decrypt by jay's public key then anyone can decrypt it as Jay's public key is globally available , isn't ?
Wow 😲😍 bhot hi ache se explain kiya h apne sir.. Thnk u so much
Masst teacher h yrr sir aap hats off!
Superb energy level man💯 really helpful videos!
Exam mey bhii jay and veeru ka example deke aagaya sir impress hojayenge 🙂👍🏼
Too gud sir... U make each concept easy 😊😊
Excellent explanation n it's make easier to understand thanks u
Sir bhut accha clear kiya aapne
Your all videos are really helpful . Thank you so much sir🙏👍👍
it's awesome way to explain..... nice explanation
Hii
Veeru ko msg Gabbar ne bheja ya jay ne??? Maza aa gaya sir...!! Bhot dukhi thi aaj, exam ka bhi tension tha, aapka video dekh ke hasne laga aur sikh bhi gaya... Thanksss a lot...
Mandal aapla abhari aahe sirrrrr🙏🏼
I am working on it but could not understand how private key works, you explained it very well, thank you
Bhut khoob yeaah😍😍
you are the best Teacher I have ever seen before. When I watched your video once all concepts are perfectly been cleaned. Thank you, sir
gehu callage ho kya bhai
varun sir gate smashers will be no 1 of all time...no one can replace him
@@asifaziz9308 his cn and os series is legendary. but this guy is really good too.
Really Well Explained Boss👍🏻❤️
Bahut badhiya bhai ❤
Thank you sir for the explanation 6:38
Happy Teacher's Day Sir. You are awesome.
Sir plz...Make videos on DES and AES
DES is not everyones cup of tea
Yes
wow nicely explained. Enjoyed learning by fun
@5minutesEngineering Sender's public key is available with all the members who are connected to the network. In this case, Jay's public key is known to Veeru and Gabbar. If Jay encrypts the message with his privet key, then even Gabbar can intercept the message and decrypt it with Jay's Public key. Hence, this method isn't secured.
In my opinion, the sender must encrypt the message with the public key of the receiver. As the privet key of the message is only available with the receiver, noone else can decrypt the message. Please confirm this suggestion.
It's only authentication not security
Love u bhai ek no samjhaya hai ......👌
The hashing part is missing from the contents.. the obvious question is what will receiver do by decrypting the signature using public key and how will the receiver understand if the contents are meaningful. It contains the hashing on the plain text i.e. message to be send to receiver which the receiver can verify by matching the hash at its end. Thanks
correct
Correct
th-cam.com/video/HHfIXdaeiUE/w-d-xo.html
QRMP issue solved ????
Thank you so much. From the deepest part of my Kidney.
Sir uuuu are vry vry great ☺️☺️
Aa gya bhai bahut acche se,
Just one word for this vdo is awesome 👌
Thanks 😊 you explained very well
superb bro..very clear explanatin
Bahut pyara samjhae bhai thank you
Thankyou sir for starting with basics. It gives the clarity about what it is and how does it work. Which I didn't get on any other channel
After watching all videos on this topic, finally a best one.
very good explanation sir
😀😀
you literally saved me man! Thanks a lot :)
Best explanation in just 8min ❤
crystal clear explanation.
Aapne bahot easily smjaya
Thank you so much sir for this wonderful amazing shaandaar video.
Video starts from 1:55
Sir, Your lacture is very helps in my engineering exams 👍
Nice sir aapki wajah se mere dosto ka ek question galat hogaya thank you sir
kal kiska kiska paper hai.. like me😎
Aaj h 💔😞
Mera to kal ha Bhai 😂
Mera to 2 ghanty baad hai😂😂
Mera bhi kal h
Sirr app bhut acha pdate ho pls one to one doubts bi clear krne ka kosis kra kro sir
Cryptographic Hash Functions: (3)
Applications of Cryptographic Hash Functions, Two Simple Hash Functions,
Requirements and Security, Hash Functions Based on Cipher Block Chaining,
Secure Hash Algorithm (SHA)
Message Authentication Codes: (3)
Message Authentication Requirements, Message Authentication
Functions, Requirements for MAC and Security of MACs, MACs Based on Hash Functions: MAC, MACs Based on Block Ciphers: DAA and CMAC
Bhai ye upar wale points pe bhi video banao na
Well explained sir👌🏻
very simple and smooth way to explain the concept. Thanks
Superb Sir❤
It was really useful.. 😊
Thanks alot sir... Book me toh kalla akshr bhass brabaar lg rha tha
😂 😂 😂 😂
Bilkul sahi Kaja....
Crystal Clear Topic jo mene College me kbhi nahi padha 😂
best video ...amazing tutorial👏👏👏...thanks