Public Key Cryptography - Computerphile

Public Key Cryptography - Computerphile

Computerphile

9 лет назад

879,439 Просмотров

Ссылки и html тэги не поддерживаются


Комментарии:

shitposting is my city
shitposting is my city - 13.10.2023 06:14

so this NEEDS then one way encryption? Like there's no wsy for this to work without it

Ответить
Alap J
Alap J - 24.09.2023 21:16

Thank you

Ответить
doveshouse
doveshouse - 15.09.2023 01:58

I understand that the more complicated explanation for this and yet fully appreciate your simplified description. Even when they full description of how it works is provided in chinhoyi start with your simplified description and then move on from there. Perfect perfect. Nice work!

Ответить
Joep Bosveld
Joep Bosveld - 28.08.2023 17:50

iIcan't for the life of me find the most commonly used functions for asymmetric encryption. Can somebody help me out?

Ответить
Student99
Student99 - 30.07.2023 15:50

This is so clever and a very nice explanation as well

Ответить
Jacek Gruchalski
Jacek Gruchalski - 16.07.2023 01:33

i still don't understand how it works.

Ответить
John Agapi
John Agapi - 08.07.2023 13:05

Gold this Video is!! Making sense of the PKI within 3 minutes!!! So great to be alive at this time!

Ответить
Victory Adugbo
Victory Adugbo - 19.06.2023 08:19

thank you for the gem! , easily explained !

Ответить
Icraft Crafts
Icraft Crafts - 14.06.2023 17:05

the force is with this one

Ответить
Sheila Dikshit
Sheila Dikshit - 02.06.2023 04:32

absolutely brilliant presentation. a clear, concise overview of the technology anyone can understand, in just five minutes.

Ответить
JOE peeer
JOE peeer - 29.04.2023 22:19

🙏

Ответить
Mikael
Mikael - 06.04.2023 20:37

But if you use the same public key every time people will be able to crack it? So you need to make a new every time.

Ответить
Random BS
Random BS - 05.04.2023 01:58

If I'm there right from the beginning, when you and X exchanged your public keys, wouldn't I be able to read what you send to one another?

i can't find a concrete example. Everyone explains the process, no one offers an example.

Ответить
Syed Mustahsan Ali Shah
Syed Mustahsan Ali Shah - 28.03.2023 12:53

Amazing Explanation Bro

Ответить
Uncle Benny
Uncle Benny - 20.03.2023 19:27

Thank you for simplifying

Ответить
Max Max
Max Max - 06.03.2023 02:23

Nice explanation! 😃

Ответить
David Mustac
David Mustac - 02.03.2023 23:51

Awesome explaination, keep it up!

Ответить
Florian Schmid
Florian Schmid - 01.03.2023 19:05

You know you’ve come to the right person to learn about Bitcoin and Cryptocurrency, when he started to explain how money works. There’s respect in explaining something that might be common sense to some, but not to others

Ответить
ɾσƈԋҽʅʅҽ Michele
ɾσƈԋҽʅʅҽ Michele - 01.03.2023 17:13

Investing is a way to set aside money while you are busy with life and have that money work for you so that you can fully reap the rewards of your labor in the future. Invest wisely.

Ответить
Noor Eldali
Noor Eldali - 19.02.2023 15:16

wooow now that's interesting!! I'm taking a university course on Cryptography almost finished with it, and I just understand this concept now haha. Well explained thank you so much!

Ответить
Jose Maria
Jose Maria - 18.02.2023 21:56

something encrypted with the pubkey can't be decrypted with the pubkey?

Ответить
Humberto Rayashi
Humberto Rayashi - 17.02.2023 16:37

The best explanation of the basic concepts ever! Thank you

Ответить
teafanyii_
teafanyii_ - 12.02.2023 07:59

this was super easy to follow -- thank you!!

Ответить
Teslimat Okanlawon
Teslimat Okanlawon - 08.02.2023 01:28

This is a beautiful explanation

Ответить
mike
mike - 05.02.2023 21:21

what does the G in PGP mean?

Ответить
Manuel Duran
Manuel Duran - 30.01.2023 23:23

brilliant.... thanks

Ответить
btcnk
btcnk - 15.01.2023 07:51

They've made crypto easy to buy and greed rules

Ответить
Sameer Shahid
Sameer Shahid - 07.01.2023 19:29

Well explained in a simple, easy to grasp format!

Ответить
Rohit Nayak
Rohit Nayak - 07.01.2023 08:42

Interesting 😇

Ответить
Critical Spaghetti
Critical Spaghetti - 01.01.2023 15:49

This made my day.

Ответить
Atas Lapenas
Atas Lapenas - 02.12.2022 19:11

Genius and brilliant

Ответить
Madhav Anand
Madhav Anand - 28.11.2022 12:00

Before this video, I didn't know that I didn't know what is Public/Asymmetric Encryption. Beautiful Explanation.

Ответить
Gurinder Sahota
Gurinder Sahota - 21.11.2022 08:29

just marvelous... Effortless learning...

Ответить
Paul
Paul - 11.11.2022 06:23

amazing and clear explanation

Ответить
Linden
Linden - 29.10.2022 14:41

Appreciate your video a lot! Now I got the AHA moment

Ответить
El Barto
El Barto - 27.10.2022 03:41

el barto was here

Ответить
TimeTalesX
TimeTalesX - 14.10.2022 17:42

I really appreciate the maker. It awesome

Ответить
TimeTalesX
TimeTalesX - 14.10.2022 17:42

I love this video

Ответить
Nobloat
Nobloat - 14.10.2022 16:02

Great explanation!

Ответить
Rutger Broekhuizen
Rutger Broekhuizen - 06.10.2022 10:59

Thank you for this explanation. Really, really helpful, especially because the digital signing part is also clearly explained.

Ответить
blockchainT
blockchainT - 15.09.2022 05:14

Genius

Ответить
Анатолий Анатолий
Анатолий Анатолий - 12.09.2022 14:02

Wish I've found this before I've tortured some poor tech souls to death with my questions about PKE. But it would have been also nice if you told about public key fingerprint and the common practical ways of veryfying it. Because it's not so obvious, for those who hasn't used PKE before the problem of how to send it so that no one could tamper with the fingerprint if you need to verify fingerprint (and for that - to send it) in order to be sure that there's no tampering. Or, what's the point of sending your PK fingerprint in text in the same message where you send the PK itself if the bad actor can theoretically switch the real PK with this own and also change the fingerprint for it in that same message?

Ответить
Felipe M Barros
Felipe M Barros - 12.08.2022 03:31

I didnt get it...

Ответить
Mike Hunt
Mike Hunt - 16.07.2022 08:27

Algorithm.

Ответить
TVTV VTVT
TVTV VTVT - 12.07.2022 03:54

Encrypted comment complimenting you on a job well done: "xyadkn;oiu0184i4\][sh[pisjeer[t9ipo"

Ответить
TVTV VTVT
TVTV VTVT - 12.07.2022 03:53

28th Constitutional Amendment: Right to Encryption
Kidding, you already have that right
...or do you?

Ответить
Afroj Ahmad
Afroj Ahmad - 24.06.2022 21:41

now i can safely say i know symmetric and asymmetric key cryptography

Ответить
Arnab Chakraborty
Arnab Chakraborty - 21.06.2022 15:24

This is the best explanation on the internet.

Ответить
S C
S C - 28.05.2022 05:03

Great video. When I don't understand something, I look for a different explanation and then I usually find it was very simple, but bad explained the first time.

Ответить