Application of public key cryptography | Authentication | Confidentiality | Digital Signature

preview_player
Показать описание

Application of public key cryptography | Authentication | Confidentiality | Digital Signature

In this video, I have explained application of public key cryptography.

#Application_of_Public_Key_Cryptography
#Application_of_Asymmetric_Key_Cryptography
#Confidentiality
#Authentication
#Digital_Signature
#chiragbhalodia
#chirag_bhalodia
Рекомендации по теме
Комментарии
Автор

figure one is confidentiality and figure two is authentication

samuelnoah
Автор

In Figure 2
A is encrypting M with his own Private key, meaning anyone on the net that has A’s Public key will be able to decrypt M. So it’s not confidential since anyone can decrypt and read. But it does mean that ONLY someone with A’s Private key could have encrypted M in the first place.
Figure 1
is the opposite, only B will be able to decrypt and read M.

lyingcat
Автор

The moment you include your private key in the Encryption function that generate a Cipher Text, It's Authentication

cycletechsa
Автор

Fig-1 provides confidentiality
Fig-2 provide authentication

srinivaspalavelli
Автор

fig 1 is confidentiality and fig 2nd is authentication

Ozaabhishek-
Автор

1 st one is for secrecy and 2nd one is for authentication

nisargpatel
Автор

figure 1 authentication and figure 2 confidentiality

sherilkj