Public Key Encryption (Asymmetric Key Encryption)

preview_player
Показать описание
In public key encryption, two different keys are used to encrypt and decrypt data.One is the public key and other is the private key. These two keys are mathematically related. They come as a pairs.

The public key encryption is also called asymmetric key encryption because two different keys are used.

Public key algorithm is used for different purpose from private key algorithm. It is used for verification and authentication.

In this video, I will use an example to demonstrate how to use public key.

Playlist: Basic Cryptography

Advanced Cryptography:

Please leave comments, questions and
please subscribe!
Рекомендации по теме
Комментарии
Автор

When I watch educational videos by someone who doesn't have English as their first language I often find them hard to follow and I lose patience and stop watching. But your way of explaining things is absolutely brilliant! Many teachers talk too fast, but you give the brain a chance to absorb each piece of information one at a time, because you explain each point slowly and clearly. I'm going to watch all your videos Sunny. They are the best!

tedwoodpeacock
Автор

Hey Sunny! I just passed CISSP and used your videos to understand digital signatures, PKI, Kerberos. You are the best teacher I ve seen in my 32 years!

Ada-hdzp
Автор

Thankyou so much Sunny, you have saved my sanity. You are one of the few people on all of you tube that point out that the reciever initiates the the sender, I have been going crazy but now it makes perfect sense!!!! Best wishes from Scotland and thank you again

mountain_del
Автор

Best explanation on youtube thanks for clearing my confusion

proptbro
Автор

I would love to see more videos about different algorithm types. Your explanations are so easy to understand. Thanks again Sunny!

jamesharris
Автор

Asymmetric key starts with the receiver having the private key - seems like everyone else failed to mention it, hence the confusion . Thank you for clearing that.

joshkdasan
Автор

i have watched about 20 videos explaining public and private keys. none come close to the way you explain them. thank you Sunny for such a marvelous, simple and easy to follow explainatiion. job well done

tonydebaka
Автор

Thanks so much for making these videos. I hope your channel gets a lot more recognition. I appreciate your teaching methods, it really allows me to understand.

christopherbrooks
Автор

Such a clear explanation about asymmetric key encryption! Thank you for the video!

ESEben
Автор

Sunny, I was reading this in my textbook and didn't quite understand. It made sense when you showed the diagram that showed the receiver is the one who generated the pair of keys for encryption. Thanks!

chillasey
Автор

I read these topics many times, but when I saw this video 1st time I understood this process with your very simple and short explanation, thanks a lot Sunny.

zoozoo
Автор

Just want to say that you're my go-to guy when I need some tech explanation. You make it very easy to understand! A BIGH MAHALO to you Sunny!

troyv
Автор

My opinion is the same one of Tedwood Peacock's... Your explanation is exactly the one for us who begin in this wide world of computing.
One more time, professor Sunny, congrats!!... Please do not stop your videos!!

luisdelorbe
Автор

Similar to other comments on this video, you are the only person who states the process starts with the receiver! It all makes so much sense to me now. Thank you.

mattredgate
Автор

These videos by Sunny are fantastic! SOOO helpful! Thank you!

Hanna-ynou
Автор

Excellent work Sunny! Please keep making these videos.

Deltainteractive
Автор

Sunny, your explanation on such a technical subject is excellent. Keep up this great work.

adamtechdays
Автор

As always, you do an awesome job Sunny. Thank you so much for your wonderful videos. Keep going bro!

mugume
Автор

My O Levels books didn't explain this topic so well. Great job!

uzmamahfooz
Автор

Great job on the video! I hope your channel grows!

Userforeverneverever