SIR i am from pakistan literally ap boht boht boht acha phrty han jesy kisi student ko smjnah hoota literally thanku so muchhhhhhhhhh boht zada piyar from pakistan🤩🤩🤩🤩🥰🥰🥰🥰🥰
The video is really informative. And all your classes are really good and easy to understand. Your way of delivering the class is really superb. Thanks for your videos.
Thank you so much for your explanation...really means a lot.... because of this vedio I got 14 marks in my semester exam....thank you so much.... worth watching it👍
Diffi Hellman key exchange process is used to exchange "session keys" or "symmetric keys", but not for "asymmetric key" exchange, as there is no exchange of asymetric-public or private keys in asymetric-encryption (you have mentioned it in pt.iii) PLEASE DO CLEAR MY DOUBT ... anyway Great explanation,I must appreciate
Yb=(Alpha)^Xb % q, in this equation there are total 4 parameters from which 3 are public. the parameter Xb which is private, can easily be calculated by hacker by using this equation
nicely explained, especially useful for the night before the exam.
Yes exactly 🔥
@@shubhamraj5853 got my exam in 2hrs and this is good
Same at this time
Or the hour before exam😅😅
How to check mod?
This is what we need one day before exam , thanku so much 💯🙏
SIR i am from pakistan literally ap boht boht boht acha phrty han jesy kisi student ko smjnah hoota literally thanku so muchhhhhhhhhh boht zada piyar from pakistan🤩🤩🤩🤩🥰🥰🥰🥰🥰
Explained in such a great way so that non tech person can also understand it, Great work you are doing Abhishek, God bless you
I must say , this is the best video on you tube for deffie helman method , far better than LMT video regarding the same .
hats of brother you just saved me from my external exam
😂
Thank you so much sir,its helped me many more before the exams.
I was very confused on this topic ...Thank you so much for this video ❤ It helped me a lot😇
Bro dropped the smoothest video on this concept
bhai ne itna aacha smjhaya ke mere assignment ka question ho gaya. A fulfilled video lecture
best crypto tutorial for exams on youtube.....keep up the good work
✌️🤟
way better than any other video of diffi hellman on youtube
wow yar through your videos i found this subject interesting....... thanks buddy
Thanks for the crisp clear explaination !
The video is really informative. And all your classes are really good and easy to understand. Your way of delivering the class is really superb. Thanks for your videos.
very well explained, thank u so much ❤❤
It was helpful and comprehensive. Thnks bro and love from Pakistan 🇵🇰
thanks a lot for this brother
Wow very very very nice explanation sir bhut achccha lga pdhne me thanks a lot sir🙏
Thank you sir😊... kl mera exam hai apki sary lectures sy achi tiyari hogai..
crystal clear explanation .thank you bro...
125 mod 7 is 6 ..not 7 ...by the way awesome explanation thanku so much
Thanks a ton,an easiest expln ever..👀!GBU👍
Very clear explanation friend, Thanks a ton
bro youre the saviour. thank you so much for your contribution.
bestest explanation of all time
My M tech xms your videos always helpful.. I don’t know Hindi.. but simply understating your explanation. Thanks sir.
malayali?
@@abyjoy4843 yes ✌️
@@Feenaq87667 same here 👍
Very Useful videos in cryptography, understand easily
Thank you so much for your explanation...really means a lot.... because of this vedio I got 14 marks in my semester exam....thank you so much.... worth watching it👍
explanation is very good and help me a lot
Nice explanation but I guess there is no such restriction as Xa
exactly, was thinking the same, you would just need the "public elements" ie alpha and q, with the public key to get the private key.
Can you find it if the prime number is more than 100 digits?
great explanation lots of love from nepal
Very nice explaination sir.
key is exchanged "So please like the video"
You are great at it, Thanks a lot helped me to understand very nicely ❤🥰
The explanation in your videos is really wow bhayya🥳
Brilliant! Abhishek Sharma Supremacy
Thank you so much......you explained it so well
Diffi Hellman key exchange process is used to exchange "session keys" or "symmetric keys", but not for "asymmetric key" exchange, as there is no exchange of asymetric-public or private keys in asymetric-encryption (you have mentioned it in pt.iii)
PLEASE DO CLEAR MY DOUBT ...
anyway Great explanation,I must appreciate
The Best lecture I have ever watched
Thank you .. very well explained 🤗
Love you maan.... You just save my exam.....
🥰🥰🥰🥰
Nice 👍 explaination of a beautiful subject.
Explanation with noted tu toh Dev manus nikla re 🥺
Excellent explanation buddy ,really helpful :-)
Yaar aap bahut mast padhate ho, aap dusre subjects par bhi vedios banao(especially computer science Branch), we are waiting. Thanks
You are too GOOD sir...
Thank you Very Much...
Thank you man . This is very helpful for me .👏👏👏
Thankyou sirji ♥️🙏🏼✨
Wow, Thank you so much...very helpful
very nicely explained, thank you so much man.
Thank yuh so much sir!! Just a great explanation !! 🥰😇💜Very helpful
Excellent bro. 😄😄agr pehle Mila hota toh back nehi hota mera 😂😂😂
Thank u sir ..aap bhot achhe se explain krte hai....plz ek video ElGamal cryptosystem pe bna dijiye ...plz
this video is very helpfull for us and all.Its a really superb class
great explanation!! thank u
Awesome Explanation Bro, Loved it!
Thanks and love bro from Faisalabad, Pakistan
Thank you so much sir 🙏😊
Great video helped me a lot luv it❤️🤗
Nicely explained
Yb=(Alpha)^Xb % q, in this equation there are total 4 parameters from which 3 are public. the parameter Xb which is private, can easily be calculated by hacker by using this equation
bhi to me soch rha tha brother
Kya kaam ki algorithm jisme har cheej bhi use kar rhe h jo public h.
Bahut easy h crack karna.
Hn but public thing bhi easyly nhi milti.
Perfect explaination.....thank you
Thank you so much Abhishek sir😍🤗
Abhishek bhai, zindagi aasan kar di apne
i had online classes abt this and got nothing out of it. u saved me bro
You really smashed it !!! Lots of best wishes bro :)
Great explanation and notes thanks buddy! May god bless you
Love from New Zealand
Do make videos on MAC, hash function, MD5,SHA,HMAC,CMAC , Digital Signature, DSS, EI Garnal, Schnorr.
Hash functions,MAC, digital signature videos are already there in the playlist
Great it's a really helpful video
Thank You so much for this
Tommorow is my exam
Welcm all the best ✌️🤘
because of you i am going to pass my tomorrow's exam. Thank you so much!!!
Great work.. Thank you..
Hi sir,
Your videos are very helpful. Please explain how to find out 'd' value using e and n values using RSA algorithm
th-cam.com/video/rlJTMUBXhKE/w-d-xo.html
Rsa video link
can you scan your notes and upload them somewhere? They are too good
Exactly,wt all of us need,its gonna make our lives easier..!💆♀️
I can if you want. 😅
But then how well he gets views, & earn some bucks ? As then no one will watch his content?
Ty for explaining notes for exam
Thank you so much bro..very nice amd crystal clear explanation ❤
Your vedio is really helpful for us ..
Absolutely clear thanks
Khatrnaak bhai!! Thanku!
perfect explanation...
Dear sir,
Excellent teaching...
Iwant your notes sir....
Bhai starting theory samjh gye lekin age ni aya lekin dekh kr acha laga
dil kush kardiya bhai tu...aur vedio banao jii
Thanks a lot for this series!
More videos will be uploaded soon in this week
Thankyou bro..
You have helped me a lot..
Well explained 👏🏻👏🏻
you deserve the like and subscription as well.
Thank you sir
your videos are really helpful! please put up a video on elgamal algorithm too!
great video very helpful
Very clear explanation 👏👏👏
Thank.you so much you are grt bhai💞very well explnd🤗
Well explained brother 👌👌👌
Excellent....
Dhanyabaad bhaiya ji
Thank you 😊, hatho hath😊😊❤️
Very useful..Keep going
very clear explanation
Thnku this is very helpful,can you make vdeo that how to find ECDLP problem questions
Thank you😊