Do you know the difference between the encryption algorithms? #shorts #encryption #tls #vpn

preview_player
Показать описание
Do you know the difference between symmetric encryption and asymmetric encryption? Which key is used for symmetric and which keys are used for asymmetric?

#shorts #tls #password
Рекомендации по теме
Комментарии
Автор

Did you know this? Want to learn more about how encryption works?

davidbombal
Автор

I always appreciate these videos about the basics, they're basically just refreshers for me.

fushisaruhiko
Автор

So the SSH Key used in github and git is a asymmetric encryption. Great 👍

sakthiprabhu
Автор

I am on binge watching spiral of your videos.. since past 25-26 hours.
Thanks for all this precise yet informative bits.

sailaab
Автор

Reason why i am David's channel subscriber !! Keep going, David !!

TheAnkit
Автор

Love these videos; they are excellent refreshers, while still easy to grasp if you're new to it.

Potato_Prophet
Автор

This cleared up my confusion about how keys are sent over the network publicly and even if they are sniffed/somehow intercepted during transmission the data is imcapable of being read. Thank you for this short, genuenly.

someoneontheinternetuvenev
Автор

Thank you for explaining this to me. You just helped me understand the public & private key. It's always good to get a different perspective.

Don-klso
Автор

Wow! Now I can remember symmetric And asymmetric encryption difference. I'm preparing for isc2 cc exam randomly watching all basic videos . This one found really helpful:-)

ishwaryanarayan
Автор

I am learning something new everyday from your video and I'm glad i subscribed🤧❤️❤️

mrshatake
Автор

Great Explaining as always
Best YouTube Channel
Thank you so much for all of your Great Contents

soheylsalehi
Автор

One of the BEST explanations of asymmetric encryption. I'll definitely be sharing this.

ampex
Автор

Thanks ❤for simplifying the basic difference between symmetric and asymmetric encryption!

rigelmandarakuriom
Автор

Great explanation. Wish he was my lecturer when I was in university.

rakeshcristobal
Автор

I genuinely think that analogy I was given in school way back when describes asymmetric encryption a little better:
the to be encrypted data is basically a parcel you want to send in a box. and since exchanging one key around for its lock is inconvenient because others can take it and make copies, instead of sending them the "key" you fabricate a lot of padlocks that only your key can unlock. cuz after all while you're free to lock up the parcel with that padlock (the public encryption key) once you do so, you can't use it again to unlock it, and the only one that CAN unlock it is the holder of the private key.

dronicx
Автор

David rapidly teaches me in 1 minute all that I missed in the class sleeping for 30 min.

SantanuProductions
Автор

THANK YOU !!! As a non IT dude this helped me

Jetrider
Автор

Even though I'm from a purely academic background, your videos having motivate me to switch my career path😊

abhishekchougule
Автор

Wow this was really smooth. Thank you

NOTsureWhatwrite
Автор

Something I would add, private keys are also used to sign messages. This is for non-repudiation purposes. Also, the keys can be used interchangeably. You can encrypt with the private key and then decrypt with the public key.

marshallwilliams