#37 Digital Signature In Cryptography |CNS|

preview_player
Показать описание
Abroad Education Channel :

Company Specific HR Mock Interview :
A seasoned professional with over 18 years of experience with Product, IT Services and Agri industry of valuable experience in Human Resource Management, Extensive Experience in Talent Acquisition, Personnel Management, Compensation and Benefits, Performance Reviews, Training & Development and all facets of Human Resources will be performing mock HR Interviews and provides feedback on the session and guides with interview techniques.

paper presentation for semester exams :
Рекомендации по теме
Комментарии
Автор

Some information might be mistleading in this video.

Digital signatures, can specifically ensure that the sender is authenticated [not the other way around as you have mentioned it in the video]. Digital signatures are used to authenticate the sender of a message or document. When a sender signs a message with their private key, it provides assurance that the message has indeed come from the claimed sender, as only the sender possessing the private key can create a valid digital signature.


About non-repudiation, meaning that the sender cannot later deny having signed the message, as the signature is unique to the message and created using the sender's private key. [not the other way around as you have mentioned it in the video]

nityodaytekchandani
Автор

Digital Signature is the opposite of RSA. For RSA, we use receiver's public key for encryption and receiver's private key for decryption. But in Digital Signature, its the opposite. We use SENDER'S private key for encryption and SENDER'S public key for decryption.

_.palaqueen._
Автор

Helpful content.. Good job... Guys she may not have given 100 percent complete info on Digital signature.. But what she explained was good enough to get basic idea.. Try watching other videos on Digital signature.. It will give broader aspect clarity... Once again thank you for creating this content.. & it has helped me

darasvlogs
Автор

In encryption we use public key and in decryption we use private key.
But in this lecture you told opposite.
Did someone else notice?

rockybrother
Автор

Best explanation Mam very very sort and useful contents 👍🏻👍🏻👍🏻👍🏻

SheshBahadurYadav
Автор

the content is awsome and very helpfull...just one thing ...if you could increase the sound of your voice it would pe a complete package of a perfect lecture. Once again it was very helpful infact all your videos are.

yalina_ansari
Автор

I think its not about strokes and all its about validating the receiver

Rebelcult
Автор

your voice is so cool.I am from Sri Lanka

dulaaorb
Автор

Aur kime dekha jaa maddam.. english mein ktyi toodd bitha rakha hai🔥🔥🙌

sumitdabas
Автор

Can you explain elliptic curve cryptography?

sumanpatil
Автор

Can u explain Discrete Logorithm problem (DLP) and it's cryptanlaysis

ThallapaneniSilpaA
Автор

Can you please make a videos on distributed systems mam we are having exams

priyapajjuri
Автор

Could you say about types of digital signature

newtrends
Автор

Can u explain about digital signature procedure to get digital cirtificate

naveendevaruppala
Автор

Mam u r speaking too fast😮. Some information may be corrected as authentication is at the sender end but not at the receiver end. In addition only in case of digital signature private key is used for encryption and public key for decryption.

vatsparvesh
Автор

Why digital signature use asymmetric encryption?

maheshakarapu
Автор

Mam your technique of explanation is very excellent. But plz control the speed of speaking english. Sometimes hard to listen your words.

_kanaderaj
Автор

how does authentication apply to the receiver if the decryption key is public?

khari
Автор

Mam how digital signature is different from message digest??

Dr.Haleem
Автор

Mam pls make a vedio on Secure hypertext transfer protocol

And Time stamping protocol in
Internet security protocol

And Thanks for this vedio

souravbhagat