Комментарии:
Very helpful 😊
ОтветитьExcellent Video! Thank you ! Very easy to understand!
ОтветитьThank you!
ОтветитьBest explanation of this!
ОтветитьA big fan of your content Sir. You keep it simple.
ОтветитьAsymmetric keys are .... BEAUTIFUL
ОтветитьThank you SO much.
ОтветитьSince we can make symmetric keys out of asymmetric keys (second Bob and Alice example where they use their own private keys and other's public keys to come up with the exact same symmetric key), can this not be used to spoof your identity ? The procedure sounds a little flawed to me and if you could explain in a video why this is a good method to get a symmetric key and use it for encryption, I would highly appreciate it!
ОтветитьWhy is it always 'Alice' and 'Bob' in public key cryptography examples? This is the fifth video I've watched on the subject using those names. Is it a private joke like the 'Wilhelm Scream'?
ОтветитьThanks professor Messer.Youbare the best
ОтветитьYou sir are a genius, outstanding breakdown 👌🏾👌🏾👌🏾
ОтветитьProfessor Messor has to be the best at taking a technical process and teaching it to a wide audience! Thank you for all your videos and this has finally lifted the cloud of confusion for me on Symmetric and Asymmetric Encryption.
ОтветитьExcellent and simple breakdown. Crypto always seemed like voodoo to me until I started watching these 6.0 domain vids. I hope to get a better crypto score now when I take Sec+! Thank U!
Ответить