NETWORK SECURITY - PUBLIC KEY DISTRIBUTION

preview_player
Показать описание
There are four ways to distribute the public keys among the users.
1) Public Announcement
2) Public Key Directory
3) Public Key Authority
4) Certificate Authority
Рекомендации по теме
Комментарии
Автор

what a straight Explaination it was
Understood the CONCEPTS IN SHOT....BRAVO!!!

pavitrasinghtomar
Автор

Thanks a lot sir, all the videos were crystal clear..helped me a lot for my exams.

amkeertana
Автор

Sir,
This is such easy explanation to follow with example and details.
Thank you for such videos.

syedshakeel
Автор

i love how he uses the duster after writing anything

ssn
Автор

It is really good explanation . Thanks for wonderful tutorial. 👌👌👌

EllyHejazi
Автор

Thank you for this upload and sharing the knowledge!! Learned a lot!

imabeapirate
Автор

Nice explanation, my all doubts get cleared . Thank you sir .

lks
Автор

Sir, I am going through your videos and it is really helpful to understand the concept and algorithm. Thank you very much.

parveshtaneja
Автор

In public-key authority 19:42 point 3, 6, 7 It should be PU instead of KU as it's the public key of a and b not of PKA.

hiteshgorantla
Автор

Where were you man? Awesome explanation..Cleared all my concepts. Thankyou so much .

sherymalik
Автор

Thank you for this lession, it very helpful with me

ptitx
Автор

Very good explanation sir. But if u explain it in less time u will gain more viewers because many of us will see the concepts during exams and we won't get that much time to see each concept.

niharikareddy_ars
Автор

Sir you are great thanks a lot for your teaching

gaming_boga
Автор

Soooper.. ! U explained it very clearly ..thnkew

siripanchadi
Автор

for the public key distribution, you told that certificates are encrypted by private key of authority so that anyone can verify if the certificate is valid by decrypting with CA public key. But how do you distribute the public key of CA in the first place?

a.yashwanth
Автор

Sir, complete the syllabus of network security as soon as possible . My exams are coming, and l'm waiting to see your video.
Thanku u sir

दया_भाभी
Автор

Thank you very much sir. i easily understood your class

Vishva-hn
Автор

wow really nice explanation thank you sir

rinzinnorbu
Автор

private key authority will be different for different users right so we should right KRauthA or KRauthB right?

sajalrastogi
Автор

Thanks for this wonderful tutorial on key distribution! But while it shows how authentication is performed in these key exchanges, that part seems exploitable, for instance:
In 3) Public Key Authority: A sends his ID(A) to B [encrypted with KU(B)], why is B sure this message came from A? Anybody who knows ID(A) could have sent it, right? For example, say now B wants to talk to F while fooling F to think he's talking to A, so B sends ID(A) where he's supposed to send his his own ID(B): how can F know this is a lie?
In 4) Certificate Authority: Now B wants to fool F so B sends C(A) instead of C(B), F can look at the time stamp in the cert and hopefully see it's too old, and B's lie fails.

JMacSD