Encryption EXPLAINED in 30 seconds👩‍💻 #technology #programming #software #tech #computerscience

preview_player
Показать описание

Рекомендации по теме
Комментарии
Автор

Thank you so much. I had a hard time understanding this. I've watched 2 videos and read on it and none of them explained how the receiver is able to decrypt the message without the sender needing to send a private key. It was explained as if there are only 2 keys involved, a public and a private key. Your video explains the sender and the receiver BOTH have a public AND a private key to encrypt and decrypt messages. Thank you for making it simple to grasp.

nyasiam.
Автор

Wtf u just explained something that always confused me in like a sentence tf

aswinsenthilkumar
Автор

Side note: the asymmetric decryption is often used at the start of the communication. They share a symmetric key than and use the symmetric key for the rest of the session. The reason is, that symmetric keys are a little bit handier and more efficient. (a symmetric key is basically the same key for description and encryption). Correct me if i am wrong

LW
Автор

The most common is synchronous encryption like AES because it’s way faster. Normally you would use DH-keyexchange signed by RSA and then use synchronous encryption.
But I think this info is over the top

caas
Автор

Great overview, I find it so fascinating how the algorithm can’t work backwards to unencrypt data based on a pubkey.

smartin
Автор

Not every encryption algorithm works like that.

mrbaemanlolman
Автор

This is an amazing explanation, but I still don’t understand how our public keys are unique to us

DaSpectral
Автор

"Encryption pretty simple" LMAO 🤣🤣🤣🤣🤣🤣🤣🤣 If it was simple lots of documents would be encrypted

lmtr
Автор

So if the public key is how to encrypt it then how is the private key not just the reverse?
For example A becomes E then the decryption would be E becomes A

GmanGavin
Автор

Decent explanation, but asymmetric encryption is mostly used to encrypt a secret key, which is then used to encrypt the message, since asymmetric encryption algorithms can only encrypt a message which is at most as long as the key (not a lot). You would almost never use it to encrypt a message on its own.
Yes, in theory you could split up your long message/document and encrypt each chunk with the receiver's public key, however public key cryptography is much slower than symmetric key cryptography.

Also, remember that this ONLY provides confidentiality, so it's not really "secure". An attacker could easily intercept your message and swap it for something else (they just need your public key, after all). Or they could change a bit inside the ciphertext and you would never know (no integrity). Sure, a person could detect the latter attack, but remember that communications between computers exist and if there's no mechanism for checking the integrity of a message, they will just accept it.

A completely secure message exchange is more complicated than this.

edkhil
Автор

What topic would you like me to explain next? 🤔

CodingWithLewis
Автор

+ assymetric encryption like this is used for the initial handshake in things like HTTPS and SSH, but as it's quite computationally expensive, more traditional hashing is used for the actual traffic encryption.

duckboye
Автор

It is used commonly, but not in the way you've explained. Since simple asymmetric encryption is quite inefficient in terms of time, the standard is nowadays Hybrid encryption, which means:

1. the plaintext is encrypted symmetrically (which usually wouldn't be enough security)

2. on top of that we asymmetrically encrypt the pseudo-random key used at the first step.

Therefore making it a lot more efficient while still maintaining cryptography properties such as perfect secrecy, which usual asymmetric encryption does not.

itscutaru
Автор

Long story short: You each have a lock and a key. Other people can take your lock but only you have access to your key. When you send something to the other person, you take their lock and lock the data with it (encrypting) then send it to them. They then use their key to unlock the data (decrypting) and you're both happy cuz your data is secured.

shirakuyanai
Автор

Sir!!
If we encrypt a memory card in Samsung devices we need to decrypt in that device only. If we do factory data reset the phone then It can't be able to decrypt that sd card. I didn't know this before and I did that mistake.
Please help me to decrypt the memory card without data loss.

tarun_sritej
Автор

This is called double key encryption or asymmetric key encryption. It's asymmetric because different keys are used to encrypt and decrypt. There is also single key encryption also called symmetric key encryption where the same key is used to encrypt and decrypt. Single key is much faster, but there is no way to safely share the key between network devices without double key encryption, . Modern internet cryptosystems like TLS use double key encryption to encrypt share keys and single key encryption to encrypt and decrypt the data.

davidhitchen
Автор

I read this in school and couldn’t for the life of me understand what it meant, then all of a sudden this guy comes in with the perfect visual and it makes perfect sense

bejcsmith
Автор

Nice explainer but it could be a bit misleading since you don't mention the key exchange that's required

lilyydotdev
Автор

This is asymmetric encryption, there are other algorithms, for example in simmetric encryption there is only one key for crypting and decrypting

jprogrammer
Автор

How does the private key decrypt it if it was encrypted with the public key? How does it know *how* to encrypt it for the private key?

makeshiftartist_