Symmetric vs Asymmetric Encryption – What is the Difference?

Symmetric vs Asymmetric Encryption – What is the Difference?

Jon Good

3 года назад

17,760 Просмотров

Ссылки и html тэги не поддерживаются


Комментарии:

yoyo 11
yoyo 11 - 04.05.2023 14:30

thanks brobro

Ответить
RITHIK SAVIO G 21EC
RITHIK SAVIO G 21EC - 08.02.2023 14:59

You are the best man Thank you so much for this !! God Bless !!!

Ответить
Mike 23
Mike 23 - 19.01.2023 13:57

This guy’s good

Ответить
Efraín Fernando López De Castilla Achata
Efraín Fernando López De Castilla Achata - 24.06.2022 10:15

Really nicely explained. This is helping me for an exam I have to take.

Ответить
lilith
lilith - 12.05.2022 14:31

The only thing I don't get is how the key gets transferred in a symmetric key encryption if the key is sent in plain text(I've only heard of diffie Hellman being used in asymetric key encryption) then what's the point of symmetric key encryption
Plz reply

Ответить
Youtuber
Youtuber - 24.04.2022 21:54

great video

Ответить
Guy Guifo
Guy Guifo - 20.02.2022 13:06

Please assist to give key length & block size of following Asymmetric Encryption Algorithms: RSA - ECC- ELGANAL-DSA-
Diffie-Hellman. thank you

Ответить
Orion
Orion - 06.12.2021 04:09

Thanks for the help! but damn you speak slowly. anyone reading this use 1.5x speed so it sounds like he's speaking at a normal speed

Ответить
Esteban Gomez
Esteban Gomez - 17.04.2021 23:34

Hi Jon, for the last question you made, we can use Diffie-Helman key exchange in order to obtain a secret key for every individual in the symmetric encryption, am i right?

Ответить
Carlos Irias
Carlos Irias - 25.02.2021 14:35

Hi! Thank you! But I have a question about Asymmetric Encryption:
If anyone can have Bob's Public Key and the only key that can decrypt a message sent to Bob is his Private Key and If Bob encrypts a message with his Private Key and send it to Alice then, anyone who has access to his Public Key (not just Alice) will decrypt the message, no? Or should in this case Bob encrypt the message with Alice's Public Key so she can decrypt it with her Private Key?

Ответить
Gamer 659
Gamer 659 - 29.01.2021 17:36

Thanks for explaining it to us, really needed the extra help.

Ответить
Danish
Danish - 18.10.2020 07:00

Okay, first of all, why you tied to your chair ?

Ответить
Lucia Solis
Lucia Solis - 07.09.2020 04:21

I still working on my CISSP, and using 2 simulator, I have felt disappointment many times, because I did not get to pass them, even today I changed the strategic putting focus on my weaknesses!!!!
During the test is possible to use other application? or the computer will be unblock only for use using the test?

Ответить