Комментарии:
thanks brobro
ОтветитьYou are the best man Thank you so much for this !! God Bless !!!
ОтветитьThis guy’s good
ОтветитьReally nicely explained. This is helping me for an exam I have to take.
ОтветитьThe only thing I don't get is how the key gets transferred in a symmetric key encryption if the key is sent in plain text(I've only heard of diffie Hellman being used in asymetric key encryption) then what's the point of symmetric key encryption
Plz reply
great video
ОтветитьPlease assist to give key length & block size of following Asymmetric Encryption Algorithms: RSA - ECC- ELGANAL-DSA-
Diffie-Hellman. thank you
Thanks for the help! but damn you speak slowly. anyone reading this use 1.5x speed so it sounds like he's speaking at a normal speed
ОтветитьHi Jon, for the last question you made, we can use Diffie-Helman key exchange in order to obtain a secret key for every individual in the symmetric encryption, am i right?
ОтветитьHi! Thank you! But I have a question about Asymmetric Encryption:
If anyone can have Bob's Public Key and the only key that can decrypt a message sent to Bob is his Private Key and If Bob encrypts a message with his Private Key and send it to Alice then, anyone who has access to his Public Key (not just Alice) will decrypt the message, no? Or should in this case Bob encrypt the message with Alice's Public Key so she can decrypt it with her Private Key?
Thanks for explaining it to us, really needed the extra help.
ОтветитьOkay, first of all, why you tied to your chair ?
ОтветитьI still working on my CISSP, and using 2 simulator, I have felt disappointment many times, because I did not get to pass them, even today I changed the strategic putting focus on my weaknesses!!!!
During the test is possible to use other application? or the computer will be unblock only for use using the test?