Symmetric Key and Public Key Encryption

Symmetric Key and Public Key Encryption

ITFreeTraining

11 лет назад

674,496 Просмотров

Ссылки и html тэги не поддерживаются


Комментарии:

@guyguifo504
@guyguifo504 - 20.02.2022 13:11

Please assist to give key length & block size of following Asymmetric Encryption Algorithms: RSA - ECC- ELGANAL - DSA -Diffie-Hellman. Thank you

Ответить
@wiberydesign4166
@wiberydesign4166 - 08.12.2021 12:34

What a wonderful explanation
Thank you so much

Ответить
@MinhHoang-ik8hf
@MinhHoang-ik8hf - 07.12.2021 10:45

Very easy to understand. Thanks a lot!

Ответить
@abhimanyusinghshekhawat6871
@abhimanyusinghshekhawat6871 - 28.09.2021 14:17

This is still a great video to understand Symmetric and Asymmetric key encryption, Thankyou for this.

Ответить
@joeloyolabordagaray5265
@joeloyolabordagaray5265 - 27.05.2021 11:08

Are those Bob, Alice and Trudy?

Ответить
@lennonmclean
@lennonmclean - 15.05.2021 11:46

it may also be helpful to talk about diffie hellman key exchange. It allows symmetric keys to be sent from one party to another without the key being revealed, and without it being encrypted. Suppose two parties want to agree on a symmetric key. One party pick a large prime number n and a generator g that are made publicly available. then, both parties pick a private secret, party 1's will be a and party 2's will be b. To agree on a key, party 1 takes g^a mod n and sends it to party 2. party 2 takes g^b mod n and sends it to party 1. each party takes what they received and raises it to their own private secret, mod n. After this, both parties are left with an identical symmetric key that can be use with aes to send messages. Someone snooping around would not be able to get the symmetric key, as they would need one of the parties' private secret which is never sent.

Ответить
@kunalsoni7681
@kunalsoni7681 - 25.04.2021 17:51

i enjoyed this video a lot 💚

Ответить
@tranpaul4550
@tranpaul4550 - 26.02.2021 02:47

Could you explain why you would transfer the symmetric key through telephone? Is telephone line the safest and most trusted for deliver information?

Ответить
@koffyk4740
@koffyk4740 - 16.02.2021 15:26

Ronaldhacks01_ on ||•πsta his indeed a life changer cos he provided me an active private key software.

Ответить
@koffyk4740
@koffyk4740 - 16.02.2021 15:26

Ronaldhacks01_ on ||•πsta his indeed a life changer cos he provided me an active private key software.

Ответить
@koffyk4740
@koffyk4740 - 16.02.2021 15:25

Ronaldhacks01_ on ||•πsta his indeed a life changer cos he provided me an active private key software..

Ответить
@koffyk4740
@koffyk4740 - 16.02.2021 15:25

Ronaldhacks01_ on ||•πsta his indeed a life changer cos he provided me an active private key software
..

Ответить
@koffyk4740
@koffyk4740 - 16.02.2021 15:25

Ronaldhacks01_ on ||•πsta his indeed a life changer cos he provided me an active private key software..

Ответить
@Gary-Seven-and-Isis-in-1968
@Gary-Seven-and-Isis-in-1968 - 21.11.2020 15:31

You're an absolute genius, thank you for a fascinating video.
Could you tell me if it is possible to find the encryption key for an Android photo file
if the owner mistakenly wiped the encryption key from the phone?.
Yes it happened to me and so far nobody has been able to shed some light on this
commonly occurring problem with Android phones.
By default from Android 6 upwards all data is encrypted.

Ответить
@finnral
@finnral - 16.11.2020 13:22

KEYS

Ответить
@wheelchairslayer3569
@wheelchairslayer3569 - 09.04.2020 01:56

"every user, who wishes to participate in the discussion, must register with and be authenticated by the group leader to become a member of the group", how do I apply this to a cryptography protocol? I need help!

Ответить
@annnormon7038
@annnormon7038 - 17.03.2020 15:03

He bypass all locks and got me 5btc to my wallet contact him at: +1(440) 363-1686

Ответить
@cherryjordan8614
@cherryjordan8614 - 13.02.2020 17:37

an expert that got me an active private key, reach him at Bureau2705 on insta, I earn 3.5BTC daily now

Ответить
@marythomas7280
@marythomas7280 - 01.02.2020 14:52

I got the private key from jarred0009 on
♜🐻 Ꭵℕ𝕊ţ𝕒𝐆ŘⒶм 💚🐯

Ответить
@jenniferwillams9647
@jenniferwillams9647 - 22.01.2020 18:46

I strongly recommend Mystery_hacker99 on !g. he’s an expert

Ответить
@robinyianacopolus3510
@robinyianacopolus3510 - 28.12.2019 17:27

Hi everyone contact @official_cyber_services on IG , +15817023691 on whatsapp he helped me, he's good and trustworthy

Ответить
@martinyable
@martinyable - 03.12.2019 14:54

very useful, thank you. Are certificates always used with keys? ( do you have to have a certificate store somewhere to use encyption?) Thanks !

Ответить
@anilreddy7087
@anilreddy7087 - 22.04.2019 12:30

What is the key size of public and private keys

Ответить
@omarpilgrim8541
@omarpilgrim8541 - 14.01.2019 19:46

you should change the title of this video for new beginners trying to understand this concept to Private Key Encryption and Public Key Encryption OR Symmetric Key and Asymmetric Key

Ответить
@amirsyafiq5761
@amirsyafiq5761 - 22.11.2018 06:52

Tutorial 8 hands up pls ✋🏻

Ответить
@mahbubahmed2828
@mahbubahmed2828 - 08.10.2018 16:17

for a particular secure communication scenario between sender and receiver using a symmetric cipher, is it possible to use keys with different lengths on both sides?

Ответить
@arunprasadchief
@arunprasadchief - 20.07.2018 11:34

Thanks man , you are awesome.

Ответить
@souravpal2556
@souravpal2556 - 27.04.2018 21:43

''Download the PDF handout'' --> not found

Ответить
@syedfaizyab2136
@syedfaizyab2136 - 14.02.2018 09:14

safaa kaa waahiyat video bari thav choraa safaa ke way






zzzzzlololololololjaani baa

Ответить
@syedfaizyab2136
@syedfaizyab2136 - 14.02.2018 09:08

nice and interesting video about symmetric encryption par mukhe kuj samaj mein hi kon aayo cho je kare aawaaz kon hui jaani bro

Ответить
@purpleturkey6633
@purpleturkey6633 - 08.02.2018 05:20

What a headache.

Ответить
@dipenpatel5226
@dipenpatel5226 - 25.01.2018 22:11

calling someone to transfer a symmetric key lol

Ответить
@ziakhokhar6914
@ziakhokhar6914 - 24.12.2017 21:11

Explain symmetric key distribution using asymmetric encryption?

Ответить
@go2274
@go2274 - 31.10.2017 09:20

I still don't understand how private key works :/

Ответить
@rmsoft
@rmsoft - 23.08.2017 01:02

great

Ответить
@rogergurman1570
@rogergurman1570 - 08.08.2017 18:02

Nicely explained. Thanks, I finally got the basics of it.

Ответить
@empeaTV
@empeaTV - 03.07.2017 20:23

Nice .. thanks for this tutorial.

Ответить
@stewiegriffin6503
@stewiegriffin6503 - 09.04.2017 19:52

good video sir

Ответить
@ravikiranbasuthkar2818
@ravikiranbasuthkar2818 - 29.03.2017 18:23

Thanks a lot

Ответить
@vishalkumarvishwakarma3776
@vishalkumarvishwakarma3776 - 08.03.2017 12:43

Suppose of an account with one user name and multiple one-time password (exactly like crypto card).

Lets suppose I have given ID (which is same everytime) and password ( which vary every time). Now my question is, how they verify that this password belongs to the same user ID. If a crypto card can generate over millions of password for a particular ID. Is it mean that there are millions of passwords stored in the server for that particular ID ?

Ответить
@c.danielpremkumar8495
@c.danielpremkumar8495 - 23.02.2017 18:42

Why should you use Public Key encryption when the Hacker does not know whether the message being sent is Encrypted or not. Further, why should the hacker always assume that the message being sent is always encrypted ? Any message could always be encrypted to form an understandable sentence in any Language which could mean something other than the intended message. So what's the big deal ?

Ответить
@Games4LifeSWE
@Games4LifeSWE - 11.02.2017 21:21

Something that I've never quite comprehended about asymmetric cryptography is how any message sent by the entity with the private key can be seen as secure?
What I mean by this is that since anyone with the corresponding public key can decrypt what has been encrypted with the private key, it's not secure at all? An example of this would be if a server uses its private key to encrypt a message containing a user's new password for a website. An attacker could then use his/her public key used by that server to decrypt that message.

What am I missing here? :)

Ответить
@rawhaosman2099
@rawhaosman2099 - 11.02.2017 16:08

thanks a lot ... it was very useful
جزاك الله خير

Ответить
@benotsintsadze
@benotsintsadze - 10.02.2017 21:32

what do you mean by key...what is this key

Ответить
@worldofd12
@worldofd12 - 24.01.2017 17:41

anybody who gives a "dislike", would you please explain what is wrong with these fabulous vids?

Ответить
@getahunabera9771
@getahunabera9771 - 19.12.2016 12:18

nice job, could you please help me by IBC(identity based cryptography)? thanks

Ответить
@qtreels1096
@qtreels1096 - 25.10.2016 09:01

can u guide me how to make an android application to encrypt videos

Ответить
@hanyadelksa7239
@hanyadelksa7239 - 19.09.2016 16:52

Perfect Explanation Thanks very much

Ответить