Private Key Encryption (Symmetric Key Encryption)

preview_player
Показать описание
In private key encryption, data is encrypted using a single same key that only the sender and the receiver know. That is why private key encryption is also called symmetric key encryption because the same key is used during both encryption and decryption of the transmitted data.

In this video, I will also use an example to demonstrate the process of using private key encryption. Two different methods -stream encryption and block encryption- of private key algorithm are also depicted with animation.

Playlist: Basic Cryptography

Advanced Cryptography:

Please leave comments, questions and
please subscribe!
Рекомендации по теме
Комментарии
Автор

I am an (very) old hand in the field of communications. Having graduated in December 1957, when cryptography device was the Enigma created by the Germans. I was having big problems in understanding cryptographic communications; by pure luck, I chanced today on your excellent tutorials. Thanks a lot for the good work!

TheEgoldberger
Автор

Sunny, I keep watching these videos in my spare time. A true master teacher has a way of explaining advanced concept in simple terms, you have that ability in spades!

patryk
Автор

this guy makes it understandable. i have been reading many books trying to understand this but i just understood it within 4 minutes.

MunyaMazvimba
Автор

Sunny: #1 your english is fantastic. While I was learning korean, it was absolutely brutal for me. I still can't pronounce a lot of words. To koreans it sounds like nothing. #2 Thank you very much. I am working on my cryptography cert. I have been going through the text book and it wasn't making sense. Now it makes sense. Thank you for your time and effort..

Tom-vgnb
Автор

Thank you Prof. Sunny sun, I have learned a lot from your nice class. I easily understand what you are teaching, just like you're giving us a lecture in the same Classroom in my country Nigeria. I wish you all the best!!!

saniahmad
Автор

i couldn't find any better and clearer explanation than yours

thingsinthebox
Автор

Plain language explained so clear, thank you, Sunny! I love your streams so well.

James-kmxq
Автор

Sir, your videos are very easy to understand. Thank you, sir !! keep up the great content

abhishekagrawal
Автор

Thank you so much Professor Sunny. You are truly a sun on a winter morning. Very good explanation

willardmakinishi
Автор

Outstanding! Clear & concise explanations. Thank you!

DonMerri
Автор

A great start. I'm definitely gonna watch the whole series.

dmytroshchotkin
Автор

I love all of your videos. All of them are easy to understand.

alexuanvilay
Автор

Your way of explanations is awesome, Blowfish that we generally used in rest API communications.

shashisharma
Автор

First people which do not use bob and Alice in example. Bro you are perfect

manpritrattan
Автор

Sunny, your are so professional!!!, you are amazing!!!!

marcosalameh
Автор

You are an amazing teacher! I am Computer Science Student!

ifargantech
Автор

You are an amazing teacher, please keep them coming

kbriaz
Автор

Very clear explanations with Good examples. Thank you for the videos.

brandonsnider
Автор

Thank you so much for this video. Now it makes more sense for me. But I have threee questions please. 1. How is this private key shared between sender and receiver? 2. Whose private key are we talking about, the receivers or the senders? 3. How is the private key generated? Through a tool?

andreeaichim
Автор

I really like these videos. You now have a new subscriber. :)