Three types of Authentications 1. Message Encryption 2. Message Authentication Code 3. Hash Functions.
Пікірлер: 163
@redmuffler31864 жыл бұрын
I had so many "Oooohhhh!!" moments during this. Thank you so much!
@jirilzala75735 жыл бұрын
Thank you so much sir. I was trying to understand this for last 3-4 hours but everywhere it was over complicated but thanks to you now i'm clear. Thank you again teacher because you are providing and sharing your precious knowledge with us. I'm so inspired by you after seeing you teaching with this passion. Best wishes sir.
@kashmirinsights65976 жыл бұрын
Great Video ...First Time In my 4 Years I have Commented Any Tutorial ...Your A Gem
@sundeepsaradhi6 жыл бұрын
hi Thanks for your interest towards our channel and your support towards our channel.
@gowthamiirao90105 жыл бұрын
well explained sir. I was confused with MAC and HASH and now its clear. thank you very much.
@webnetweaverwebnetweaver91854 жыл бұрын
Very concise explanation. This is the best general explanation of application security methods I've seen. Many thanks to you for this!
@iEntertainmentFunShorts5 жыл бұрын
Waw awwsome...sir if you guys coming after reading books either kurose and ross or fourozen this is best lecture you found go for it with 1.25× speed.Tq sir
@mayankbhagat41545 жыл бұрын
Sir your lectures were really very helpful. You are an outstanding teacher. I would like to suggest that after explaining each of the authentication methods or cipher algorithms you should have explained their advantages and disadvantages. That would have given us more insight. Thanks
@sripadkulkarni6 жыл бұрын
Wow you are a gem... need more people like u in the teaching field who have passion to educate people...I have decided to watch every lecture of yours irrespective of being relevant to my domain of work, I feel I can learn a lot of new things from you... lots of respects and love... thank you!!
@sundeepsaradhi6 жыл бұрын
hi kulkarni thank you very much. thanks for your interest towards our channel and share my sessions with your friends and subscribe to our channel.Keep following our channel.
@kalubaeliza4147 Жыл бұрын
@@sundeepsaradhi thank you sir, well explained kindly sir am requesting a tutorial about Pluggable Authentication Modules (PAM) your positive response I will be highly appreciate💪💪💪
@Jatangi_Raju2 жыл бұрын
i am cleared all my subjects by watching your videos.......its a small word but, thank you so much sir.😊😊😊😊
@sTadelaSanthoshi Жыл бұрын
Thank you so much sir. I was very fear about this topic but everywhere it was over complicated but thanks to you now i'm clear. Thank you again teacher because you are providing and sharing your precious knowledge with us.............. I'm so inspired by you after seeing you teaching with this passion. Best wishes sir.
@attitudeboy2840 Жыл бұрын
Thank you for your valuable information ✨✨.. This video.. your video.. ofter 5 years also still... Giving.. Knowledge.. for US... Thank you...❤
@sagarsoni10335 жыл бұрын
you are gem... I love your teaching style
@maheshb37563 жыл бұрын
Sir you have helped me a lot sir during my exams time. Your explonation is very goood and clear. Keep maintian that sir. You are one of the best teacher in my study career. I was scared about this subject and i found you on youtube. Now i learned lot of subject. Thank you very much sir.
@someone1ben5 жыл бұрын
First Indian Video I never skipped.
@sundeepsaradhi5 жыл бұрын
Hi Very nice to see your comment and thanks for your support towards our channel.
@a.yashwanth3 жыл бұрын
36:00 there is no need to encrypt hash code separately as the entire plain text and hash are encrypted using the key only known to those 2 people. You encrypt the hash code only when the message is sent in plain text format because anyone can modify the PT and recompute the hash code and the receiver doesn't know if the hash is not encrypted.
@279aishwaryavallala75 жыл бұрын
superb teaching sir am following your lecturs for network security the explaination is very simple and easy to understand simply superb........Thank you very much sir
@crazyanonymous83935 жыл бұрын
Superb teaching iever seen thisi type of techning..
@utsavseth7116 Жыл бұрын
Beautifully explained
@sinekas79010 ай бұрын
Thank you sir your teaching is very well
@md.mehedihasan83245 жыл бұрын
Sir , Excellent Lecture..
@mehranehk87843 жыл бұрын
Great explanation thanks
@gopinathpanda58895 жыл бұрын
sir I have a doubt in hash code. in case-2 of hash code the hash code was decrypted by public key of A.Which is available for all users and anyone can decrypt it.there is no use of private key.How this can be achieved.
@scatteringparameters.41673 жыл бұрын
Genius ⚡⚡⚡
@shehabthabit43952 жыл бұрын
Great teacher sir!.. thank you so much... very nice explanation
@HK-sw3vi2 жыл бұрын
Thanks a bunch, this made things clear
@rajmangukiya1145 жыл бұрын
fab video sir thanku
@deepar38502 жыл бұрын
Thank you so much sir😊😊very much useful🙂
@pranavitykyala78874 жыл бұрын
neat and crystal clear explanation...
@hectoralfonso51683 жыл бұрын
Easy way to understand, thanks teacher
@karnansooriyakumar80024 жыл бұрын
Thank you so much sir i got clear idea about types of authentication
@tejasreechintada83243 жыл бұрын
Thankyou for your explanation sir 😅
@zeynepgul5513 жыл бұрын
Great video, sir. Thank you so much!
@munagaladivya2366 жыл бұрын
Nice vedio I understud every thing WT u r explained
@sundeepsaradhi6 жыл бұрын
hi divya thanks for your interest towards our channel and share my sessions with your friends and subscribe to our channel.
@SachinKumar-kd2fr6 жыл бұрын
Nicely explained Sir
@sundeepsaradhi6 жыл бұрын
hi sachin thanks for your interest towards our channel and share my sessions with your friends and subscribe to our channel.Keep following our channel.
@amar.mishraamar.mishra95366 жыл бұрын
Great Sir.
@sundeepsaradhi6 жыл бұрын
hi amar thanks for your interest towards our channel and share my sessions with your friends and subscribe to our channel.Keep following our channel.
@rahulsmarty16485 жыл бұрын
U r great sir....tnq u for helping me in examination by these Vedio...tnq u soo much sir.
@sagnikchakraborty1656 жыл бұрын
sir in case of hash function can't we encrypt the hash code using secret key i mean symetric key cryptography technique?
@sundeepsaradhi6 жыл бұрын
hi chakraborty of course you can encrypt the hash code with secret key and the same should reflected on receivers side.
@everythinguneed__17214 жыл бұрын
thank you sir you are the best
@pnkjthapliyal5 жыл бұрын
simply great .thanks for the lecture.
@musabello2315 Жыл бұрын
❤ god bless you more
@sadaffatima20765 жыл бұрын
Very nice
@vineetkumar035 жыл бұрын
Great Sir Please share the SHA 3 Algo As soon as possible.
@Optimistic_aspirant5 жыл бұрын
Thank you sir...ur videos were of great use ...
@user-ic3fh6ru3g4 жыл бұрын
superb
@rajujoseph29485 жыл бұрын
EXCELLENT VIDEO
@a.yashwanth3 жыл бұрын
26:00 if we want only authentication, then what's the point of encrypting the plain text. Only encrypting the MAC is enough. If someone wants to change the PT then he cannot recalculate the MAC and modify it as he won't have the key to encrypt it. edit: oh, that's what hash functions do.
@divyahoney46876 жыл бұрын
Good explanation sir tq soooo much
@sundeepsaradhi6 жыл бұрын
hi divya thanks for your interest towards our channel and share my sessions with your friends and subscribe to our channel.Keep following our channel.
@DuuAlan6 жыл бұрын
Mate, you are awesome
@sundeepsaradhi6 жыл бұрын
hi alan thanks for your interest and support towards our channel.
@amreshpathak65085 жыл бұрын
Great explanation sir I appreciate it
@Ok_dikshu6 жыл бұрын
Super ga cheptunaru sir
@sundeepsaradhi6 жыл бұрын
hi jhansi thanks for your interest towards our channel and share my sessions with your friends and subscribe to our channel.Keep following our channel.
@dr.shemalatha76365 жыл бұрын
excellent explanation sir.
@The123bunjy5 жыл бұрын
Sir, your teaching is really very good, understandable. Please sir also make a separate video for has function, universal hashing and also perfect hashing also.
@raghavagarwal67345 жыл бұрын
Well done! U have explained well!
@rohitsain136 жыл бұрын
nice work ..
@sundeepsaradhi6 жыл бұрын
hi Rohit thanks for your interest towards our channel and share my sessions with your friends and subscribe to our channel.Keep following our channel.
@mrsrujana60795 жыл бұрын
Sir please explain s/mime and pgp format. Tomorrow is my exam. I am hoping that u will upload it soon .Thank you :)
@dhananjaychobhe18445 жыл бұрын
18:11 MAC
@paritagojariya53005 жыл бұрын
Great Video..!
@essarshed51974 жыл бұрын
thank you sir great session
@lordalbusseveruspotter9145 жыл бұрын
GREAT EXPLANATION
@snigdhashingade60975 жыл бұрын
thank you, sir ......... great video!!
@meet.patel184 жыл бұрын
30:00 hash function
@vishavgupta37175 жыл бұрын
Excellent Sir
@kamathprajna2 жыл бұрын
Thank you sir
@anmaraljanabi71374 жыл бұрын
Many thanks for sharing :)
@venkireddy643 жыл бұрын
When r u planning to add other videos in this series sir You are doing awesome job
@ManeshThankappan5 жыл бұрын
Sir. Your classes are excellent. Good to polish fundamentals. Could u give me examples (names) of some algorithm for 2nd and 3rd methods( for Message Authentication Codes and Hash Codes).
@rohithmallampalli59305 жыл бұрын
nice explanation sir
@ashidevkc90035 жыл бұрын
great one
@PreetiSingh-ko7dm5 жыл бұрын
can u plz..tell me real workd example...... email id can be an example of second case in messsage encryption?
@saldi35435 жыл бұрын
Big Big Like Thank you
@NareshKumar-bl3sy6 жыл бұрын
Very Nice Lecture Sirji !! Grand Salute!!!
@sundeepsaradhi6 жыл бұрын
hi naresh thanks for your interest towards our channel and share my sessions with your friends and subscribe to our channel.Keep following our channel.
@ruthvikrajam.v43035 жыл бұрын
super
@BugsBunny0715 жыл бұрын
i rarely comment on tutorials but this one was really really good.
@isha_ch23 Жыл бұрын
Thank you
@syedrashidalishah46466 жыл бұрын
keep it up
@sundeepsaradhi6 жыл бұрын
hi syed thanks for your interest towards our channel and share my sessions with your friends and subscribe to our channel.Keep following our channel.
@mubashareenahmad24044 жыл бұрын
What are the authentication functions (c) and hash functions (h) we are applying for the plaintext ?
@sundeepsaradhi4 жыл бұрын
hi here the Receiver should know whether the received message is sent from valid and authorized user and this process is called authentication and also the message should not be altered during the transmission and this process is called Integrity. In order to achieve authentication and integrity we will use authentication and hash functions. Hope your doubt has been clarified.
@Michelle-rb6nl2 жыл бұрын
thank you!🤯
@zohebhasan29406 жыл бұрын
Thanks
@sundeepsaradhi6 жыл бұрын
hi hasan thanks for watching my sessions and interest towards our channel.
@anaganisaiteja90615 жыл бұрын
GURUJI U RRRRRRRRR GREATTTTTTTT
@thedifferent75624 жыл бұрын
I'm confused...you said no key for hash but in the last type of hash function you have used key for both the hash code and the message... please explain :/
@sundeepsaradhi4 жыл бұрын
Hi In order to generate hash code we need not use of key on plain text but for acheiving the confidentiality we will encrypt the plain text along with hash code. Hope your doubt has been clarified.
@shashankgarg49976 жыл бұрын
How does the receiver get to know the MAC code that was applied so that it can it can be compared with the senders MAC?
@prajjwaltiwari25644 жыл бұрын
Great video sir... Sir could u pls explain DES n AES with an example Or its implementation...
@sriharshagade1115 жыл бұрын
please complete the playlist. It will be very helpful
@sudhanshujha54084 жыл бұрын
Sir can you please tell how come the authentication is achieved in 3rd case of message encryption because there reciever is not recognised by the sender and as you say for authentication both should recognise each other so it fails as per that concept🙄
@arian74725 жыл бұрын
just can you correct me if iam worng hash function is md5 , sha , hmac the first one without shared secret key is md5 or sha the second one with using shared key is hmac
@gandesirisrikanth9001 Жыл бұрын
Hello sir please post the types of firewalls video
@BrijeshYadav-vl7bj6 жыл бұрын
Nice lecture Sundeep.
@sundeepsaradhi6 жыл бұрын
hi Brijesh thanks for your interest towards our channel and share my sessions with your friends and subscribe to our channel.Keep following our channel.
@web-university6 жыл бұрын
very nice
@sundeepsaradhi6 жыл бұрын
hi harsha thanks for your interest towards our channel and share my sessions with your friends and subscribe to our channel.Keep following our channel.
@ashwinir51103 жыл бұрын
In MAC method, how k1,k2 are exchanged
@narayananbhooma85664 жыл бұрын
hello sir,you are saying that hash is independent of key,but in second case your are using secret key for the encryption of the whole message,why?
@Sourav98355 жыл бұрын
How the secret key will be generated and shared between sender and receiver
@sharonrosy95195 жыл бұрын
Tq sir
@prakashghimire89966 жыл бұрын
Sir What are the types of authentication services and techniques of authentication?
@kamalajashet56116 жыл бұрын
sir will you please explain RC6 and Cast 128 algorithms.. ?
@sundeepsaradhi6 жыл бұрын
hi kamalaja definitely i will try to upload them soon.
@rajeekarthikeyan5 жыл бұрын
U said that Hash functions does not use Keys.Then Why did u Use Public key and Privatekey for encryption
@ramaraog46306 жыл бұрын
Good sir kindly reveal another topics of network security like rc4,linear crypt analysis and different crypt analysis ,blow fish, except alog
@sundeepsaradhi6 жыл бұрын
hi rama rao thanks for your interest towards my sessions and soon i will upload them.
@chsaidattapavanbalaji79964 жыл бұрын
Thankyou Sir
@shashikantupadhyay48185 жыл бұрын
God bless you
@madhusudhana2625 жыл бұрын
can you make a video on lamport authentication scheme?