Комментарии:
Please assist to give key length & block size of following Asymmetric Encryption Algorithms: RSA - ECC- ELGANAL - DSA -Diffie-Hellman. Thank you
ОтветитьWhat a wonderful explanation
Thank you so much
Very easy to understand. Thanks a lot!
ОтветитьThis is still a great video to understand Symmetric and Asymmetric key encryption, Thankyou for this.
ОтветитьAre those Bob, Alice and Trudy?
Ответитьit may also be helpful to talk about diffie hellman key exchange. It allows symmetric keys to be sent from one party to another without the key being revealed, and without it being encrypted. Suppose two parties want to agree on a symmetric key. One party pick a large prime number n and a generator g that are made publicly available. then, both parties pick a private secret, party 1's will be a and party 2's will be b. To agree on a key, party 1 takes g^a mod n and sends it to party 2. party 2 takes g^b mod n and sends it to party 1. each party takes what they received and raises it to their own private secret, mod n. After this, both parties are left with an identical symmetric key that can be use with aes to send messages. Someone snooping around would not be able to get the symmetric key, as they would need one of the parties' private secret which is never sent.
Ответитьi enjoyed this video a lot 💚
ОтветитьCould you explain why you would transfer the symmetric key through telephone? Is telephone line the safest and most trusted for deliver information?
ОтветитьRonaldhacks01_ on ||•πsta his indeed a life changer cos he provided me an active private key software.
ОтветитьRonaldhacks01_ on ||•πsta his indeed a life changer cos he provided me an active private key software.
ОтветитьRonaldhacks01_ on ||•πsta his indeed a life changer cos he provided me an active private key software..
ОтветитьRonaldhacks01_ on ||•πsta his indeed a life changer cos he provided me an active private key software
..
Ronaldhacks01_ on ||•πsta his indeed a life changer cos he provided me an active private key software..
ОтветитьYou're an absolute genius, thank you for a fascinating video.
Could you tell me if it is possible to find the encryption key for an Android photo file
if the owner mistakenly wiped the encryption key from the phone?.
Yes it happened to me and so far nobody has been able to shed some light on this
commonly occurring problem with Android phones.
By default from Android 6 upwards all data is encrypted.
KEYS
Ответить"every user, who wishes to participate in the discussion, must register with and be authenticated by the group leader to become a member of the group", how do I apply this to a cryptography protocol? I need help!
ОтветитьHe bypass all locks and got me 5btc to my wallet contact him at: +1(440) 363-1686
Ответитьan expert that got me an active private key, reach him at Bureau2705 on insta, I earn 3.5BTC daily now
ОтветитьI got the private key from jarred0009 on
♜🐻 Ꭵℕ𝕊ţ𝕒𝐆ŘⒶм 💚🐯
I strongly recommend Mystery_hacker99 on !g. he’s an expert
ОтветитьHi everyone contact @official_cyber_services on IG , +15817023691 on whatsapp he helped me, he's good and trustworthy
Ответитьvery useful, thank you. Are certificates always used with keys? ( do you have to have a certificate store somewhere to use encyption?) Thanks !
ОтветитьWhat is the key size of public and private keys
Ответитьyou should change the title of this video for new beginners trying to understand this concept to Private Key Encryption and Public Key Encryption OR Symmetric Key and Asymmetric Key
ОтветитьTutorial 8 hands up pls ✋🏻
Ответитьfor a particular secure communication scenario between sender and receiver using a symmetric cipher, is it possible to use keys with different lengths on both sides?
ОтветитьThanks man , you are awesome.
Ответить''Download the PDF handout'' --> not found
Ответитьsafaa kaa waahiyat video bari thav choraa safaa ke way
zzzzzlololololololjaani baa
nice and interesting video about symmetric encryption par mukhe kuj samaj mein hi kon aayo cho je kare aawaaz kon hui jaani bro
ОтветитьWhat a headache.
Ответитьcalling someone to transfer a symmetric key lol
ОтветитьExplain symmetric key distribution using asymmetric encryption?
ОтветитьI still don't understand how private key works :/
Ответитьgreat
ОтветитьNicely explained. Thanks, I finally got the basics of it.
ОтветитьNice .. thanks for this tutorial.
Ответитьgood video sir
ОтветитьThanks a lot
ОтветитьSuppose of an account with one user name and multiple one-time password (exactly like crypto card).
Lets suppose I have given ID (which is same everytime) and password ( which vary every time). Now my question is, how they verify that this password belongs to the same user ID. If a crypto card can generate over millions of password for a particular ID. Is it mean that there are millions of passwords stored in the server for that particular ID ?
Why should you use Public Key encryption when the Hacker does not know whether the message being sent is Encrypted or not. Further, why should the hacker always assume that the message being sent is always encrypted ? Any message could always be encrypted to form an understandable sentence in any Language which could mean something other than the intended message. So what's the big deal ?
ОтветитьSomething that I've never quite comprehended about asymmetric cryptography is how any message sent by the entity with the private key can be seen as secure?
What I mean by this is that since anyone with the corresponding public key can decrypt what has been encrypted with the private key, it's not secure at all? An example of this would be if a server uses its private key to encrypt a message containing a user's new password for a website. An attacker could then use his/her public key used by that server to decrypt that message.
What am I missing here? :)
thanks a lot ... it was very useful
جزاك الله خير
what do you mean by key...what is this key
Ответитьanybody who gives a "dislike", would you please explain what is wrong with these fabulous vids?
Ответитьnice job, could you please help me by IBC(identity based cryptography)? thanks
Ответитьcan u guide me how to make an android application to encrypt videos
ОтветитьPerfect Explanation Thanks very much
Ответить